Search
Keyword: worm_scar.go
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan connects to certain URLs. It may do this to remotely inform a malicious user of its installation. It may also do this to download possibly malicious files onto the computer, which puts
This Trojan adds registry entries to enable its automatic execution at every system startup. Installation This Trojan drops the following copies of itself into the affected system: %System%
Installation This Trojan drops the following copies of itself into the affected system and executes them: %User Profile%\cisvc.exe (Note: %User Profile% is the current user's profile folder, which is
This Trojan checks for the presence of the following processes which are related to Outpost Personal Firewall and ZoneLabs Firewall Client . It terminates if either of the said processes exist. This
As of this writing, the said sites are inaccessible. Installation This Trojan drops the following copies of itself into the affected system: %System%\{random file name}.exe (Note: %System% is the
Installation This Trojan drops the following copies of itself into the affected system: %System%\{random filename}.exe (Note: %System% is the Windows system folder, which is usually C:\Windows\System
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
TSPY_PINCAV.GEK is the Trend Micro detection for the new banking Trojan family known as Tatanga. According to media reports, it is capable of hijacking the user’s banking session to automatically
This Trojan executes then deletes itself afterward. Installation This Trojan drops the following copies of itself into the affected system: %System%\PROset.exe (Note: %System% is the Windows system
This Trojan deletes itself after execution. Installation This Trojan drops the following copies of itself into the affected system: %System%\{random filename}.exe (Note: %System% is the Windows
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This backdoor arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a