Search
Keyword: unauthorized file encryption
Description Name: HTTP PROXY EXPLOIT - HTTP (Request) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromised by malwa...
Description Name: Identified Usage Of RC4 Cipher Suite - HTTPS . This is Trend Micro detection for HTTPS network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compromise...
Description Name: Identified Usage Of TLS/SSL EXPORT Cipher Suite . This is Trend Micro detection for HTTPS network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely comprom...
Description Name: JBOSS JMX CONSOLE MAIN DEPLOYER EXPLOIT - HTTP (Request) - Variant 2 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavi...
Description Name: ANGLER - Exploit Kit - HTTP (Request) - Variant 7 . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for N/A.The host exhibiting this type of network behavior is likely compro...
Description Name: PURPLE FOX ROOTKIT DOWNLOAD - HTTP(REQUEST) . This is Trend Micro detection for HTTP network protocol that manifests exploit activities and can be used for Command and Control Communication.The host exhibiting this type of network b...
This file infector arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It inserts its codes into unused space in files.
routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. Arrival Details This spyware arrives on a system as a file dropped by other
This ZEUS/ZBOT variant is found to be distributed via spam campaign in mid-2014. The spammed messages in the said campaign used a certain file storage service. To get a one-glance comprehensive view
commands: {Malware File Name}.exe /C iexplore.exe -nohome It does not proceed with its encryption routine if the following kernel-mode AV components are found in the victim's machine: klif.sys kl1.sys
exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. It attempts to access a website to download a file which contains information where the Trojan can
unauthorized use of the stolen data. It checks for the presence of the following processes which are related to Outpost Personal Firewall and ZoneLabs Firewall Client : outpost.exe zlclient.exe It terminates if
This routine risks the exposure of the user's account information, which may then lead to the unauthorized use of the stolen data. Arrival Details This spyware may be dropped by other malware.
the user's account information, which may then lead to the unauthorized use of the stolen data. It attempts to steal information, such as user names and passwords, used when logging into certain banking
unauthorized use of the stolen data. It accesses the following site to download its configuration file: http://{BLOCKED}sile.land.ru/bktr2cz http://{BLOCKED}r.land.ru/bktr2cz The downloaded file contains
the unauthorized use of the stolen data. It attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This
the user's account information, which may then lead to the unauthorized use of the stolen data. It attempts to steal information, such as user names and passwords, used when logging into certain banking
which may then lead to the unauthorized use of the stolen data. It accesses the following site to download its configuration file: http://{BLOCKED}ool.net/pr/server/config.bin The downloaded file contains
the user's account information, which may then lead to the unauthorized use of the stolen data. It attempts to steal information, such as user names and passwords, used when logging into certain banking
the unauthorized use of the stolen data. It attempts to steal information, such as user names and passwords, used when logging into certain banking or finance-related websites. Arrival Details This