Keyword: unauthorized file encryption
92143 Total Search   |   Showing Results : 321 - 340
unauthorized use of the stolen data. It attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. It deletes itself after execution.
unauthorized use of the stolen data. It checks for the presence of the following processes which are related to Outpost Personal Firewall and ZoneLabs Firewall Client : outpost.exe zlclient.exe It terminates if
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It attempts to steal sensitive online banking
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Ransomware arrives on a system
Ransomware does the following: It deletes itself after encryption using the following command: %System%\cmd.exe /c timeout 1 && del {Malware File Path)\{Malware File Name} >> NUL It downloads and executes Tor
an encryption market at the end of each file penetrated by blaze ransomware!! It accepts the following parameters: -debug {log file name} - for logging -shares {network shares to encrypt} - encrypt
the following arguments: -help → display help option -file {file path} → encrypt selected file -dir {directory} → encrypt selected directory -sd → enable self-deletion after encryption -sc → delete
unauthorized use of the stolen data. It deletes the initially executed copy of itself. Arrival Details This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by
exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. NOTES: It may connect to a remote URL to download its configuration file. The said file contains
http://{BLOCKED}ammi.com/cp/server.php . The remote malicious user may then initiate unauthorized transaction without user's consent and may incur financial loss.
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It creates folders where it drops its files. Arrival
information and reports it to its servers: Appended File Extension Encryption Key Error Log GUID Malware Version Number of Encrypted Files Powershell Version Status However, as of this writing, the said sites
This Ransomware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops files as ransom note. Arrival Details This
This malware abuses a premium service number as well as sends demeaning messages to the user's contact list, causing unauthorized charges as well as potential damage to the user's reputation. To get
mails with file attachments purporting to be image (JPEG) files. To get a one-glance comprehensive view of the behavior of this Spyware, refer to the Threat Diagram shown below. This spyware arrives as an
the user's account information, which may then lead to the unauthorized use of the stolen data. It attempts to steal information, such as user names and passwords, used when logging into certain banking
unauthorized use of the stolen data. It accesses the following site to download its configuration file: http://{BLOCKED}m0001.com/xed/recover.bin The downloaded file contains information where the malware can