Keyword: worm_bropia
11018 Total Search   |   Showing Results : 161 - 180
This worm drops .LNK files to all removable drives, which are shortcut files to the dropped copy of this worm. It does this to automatically run the worm copy whenever the removable drives are
Trend Micro has flagged this worm as noteworthy due to the increased potential for damage, propagation, or both, that it possesses. Specifically, it deletes important files that are needed during
This worm attempts to access a certain URL where its copy is hosted. It then copies this file as {random}.exe in removable drives. It may also receive a command from a remote server to initiate
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This worm arrives via removable drives. It may be downloaded by other malware/grayware/spyware from remote sites. It modifies registry entries to hide files with System and Read-only attributes. It
This worm arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This worm arrives by connecting affected removable drives to a system. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious
This description is based is a compiled analysis of several variants of WORM_TATERF. Note that specific data such as file names and registry values may vary for each variant. This worm arrives via
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This worm attempts to steal user credentials, such as user names and passwords, related to online games. It does this by monitoring processes/services in the memory that contains certain strings. It
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF file to automatically execute the
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops copies of itself
This worm arrives by connecting affected removable drives to a system. It arrives via removable drives. It may be dropped by other malware. It drops an AUTORUN.INF file to automatically execute the
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This worm arrives by connecting affected removable drives to a system. It may be downloaded by other malware/grayware from remote sites. It is injected into all running processes to remain memory
This description is based is a compiled analysis of several variants of WORM_SILLY. Note that specific data such as file names and registry values may vary for each variant. This worm arrives as an
This worm arrives via removable drives. It arrives by accessing affected shared networks. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when
This worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder