Keyword: usoj_artief.doc
2924 Total Search   |   Showing Results : 1 - 20
   Next  
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
It takes advantage of vulnerabilities in Microsoft Office that could allow remote code execution (MS10-087). After successfully exploiting the said vulnerability, it drops a file detected as
This Trojan arrives as an attachment to email messages purportedly promoting Tibetan culture. It drops a file that is a backdoor and is infected by a file infector. To get a one-glance comprehensive
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It executes the dropped file(s). As a result,
the dropped files are exhibited on the affected system. NOTES: Upon execution, it opens its dropped non-malicious DOC file, %User Temp%\document.doc, in order to hide its malicious routines from the
This Trojan opens its dropped file %User Temp%\document.doc in order to hide its malicious routines from the user. This Trojan arrives as an attachment to email messages spammed by other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the dropped file(s). As a result, malicious routines of the dropped files are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This malware exploits a software vulnerability in order to drop a malicious file onto the affected system. It also drops and opens a document file in order to hide its malicious routines. Once a
This Trojan takes advantage of software vulnerabilities in certain software to drop malicious files. Installation This Trojan drops the following non-malicious files: %User Temp%\{malware file name
This Trojan takes advantage of the RTF Stack Buffer Overflow Vulnerability in order to drop malicious files into an affected system. Once it exploits the said vulnerability, it drops a file, which is
This Trojan takes advantage of the following software vulnerabilities to drop malicious files: Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (2423930) It also drops files
malicious file: %Program Files%\Common Files\Microsoft Shared\Winword.exe - detected by Trend Micro as TROJ_STRIGY.A It then creates a non malicious DOC file and opens it to avoid suspicion: %User Temp%
This Trojan takes advantage of software vulnerabilities in certain software to drop malicious files. Installation This Trojan drops the following non-malicious files: %User Temp%\{malware filename
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It does not have any backdoor routine. It
Once a malware successfully exploits the vulnerability, it causes certain actions to be done on the system. This Trojan arrives as an attachment to email messages spammed by other malware/grayware or