Keyword: js_nindya.a
99731 Total Search   |   Showing Results : 1701 - 1720
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be dropped by other malware. It may be unknowingly downloaded by a user while
This malware spreads via the <i>Facebook</i> chat feature. It entices users to click a link by saying that it leads to an execution video of Osama bin Laden. To get a one-glance
This Trojan may be hosted on a website and run when a user accesses the said website. It may be downloaded from remote sites by other malware. Arrival Details This Trojan may be hosted on a website
This spyware may be hosted on a website and run when a user accesses the said website. Arrival Details This spyware may be hosted on a website and run when a user accesses the said website. Other
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It executes the downloaded files. As a result, malicious routines of the downloaded files
This ransomware is written in Jscript, a scripting language designed for Windows. Particularly, it is for Internet Explorer. Note that it requires Windows Script Host execution. To get a one-glance
shortcut files (.LNK) dropped as a component by JS_BONDAT malware family to execute JS_BONDAT copies in removable drives. It executes the following file: {removable drive}\.Trashes\{random number}\{random
arrives through a DOC file. It is embedded and will execute its routine upon activation by the user. However, as of this writing, the said sites are inaccessible. TrojanDownloader:JS/Nemucod (Microsoft);
This Trojan arrives as attachment to mass-mailed email messages. Arrival Details This Trojan arrives as attachment to mass-mailed email messages. Installation This Trojan drops the following files:
following website(s) to download and execute a malicious file: http://{BLOCKED}achviettech.com/system/logs/98yg7b It saves the files it downloads using the following names: %User Temp%\hQI6niJ7Pj.exe (Note:
not have any propagation routine. Backdoor Routine This Trojan does not have any backdoor routine. Download Routine This Trojan connects to the following website(s) to download and execute a malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. Arrival Details This Trojan arrives as an attachment to email messages spammed by other
As of this writing, the said sites are inaccessible. It arrives as attachment to mass-mailed email messages. Installation This Trojan drops the following files: %User Temp%\{Random String} %User Temp
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be hosted on a website and run when a user accesses the said website. It inserts an
Haiti earthquake as a spam lure. The spammed messages written in Portuguses tricked users into clicking a link that supposedly contains photos of the earthquake. This led to a malicious website that
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. Arrival Details This Trojan may be hosted on a
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a
This Trojan may be hosted on a website and run when a user accesses the said website. It inserts an IFRAME tag that redirects users to certain URLs. However, as of this writing, the said sites are
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be hosted on a website and run when a user accesses the said website. It inserts an
This Trojan may be hosted on a website and run when a user accesses the said website. It redirects browsers to certain sites. Arrival Details This Trojan may be hosted on a website and run when a