Keyword: bkdr_bifrose.dli
9709 Total Search   |   Showing Results : 281 - 300
This worm arrives via removable drives. It drops an AUTORUN.INF file to automatically execute the copies it drops when a user accesses the drives of an affected system. It takes advantage of software
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It disables Task Manager, Registry Editor, and Folder
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware may arrive bundled with malware packages as a malware component. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
Installation This backdoor creates the following folders: %Application Data%\{random existing folder}\{random folder name} (Note: %Application Data% is the current user's Application Data folder,
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/112201193825.jpegThe Trend Micro 2011 Threat Predictions includes the growth of targeted attacks, and it seems like cybercriminals are already
One of the Windows malware related to the Careto attack known for encoding its configuration data and encrypting its network traffic thus making analysis difficult. To get a one-glance comprehensive
This backdoor may be dropped by other malware. It executes commands from a remote malicious user, effectively compromising the affected system. Arrival Details This backdoor may be dropped by the
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,
This backdoor is executed every system startup. In turn, it executes a file detected as BKDR_REDSIP.B. As a result, the malicious routines of said backdoor are also exhibited on the infected system.
http://SJC1-TE-CMSAP1.sdi.trendnet.org/dumpImages/154201341250.jpeg In a reported incident , cybercriminals took advantage of note-taking service, Evernote , thus demonstrating their continued
This is the Trend Micro detection for damaged variants of the BKDR_PAPRAS family. Files detected as BKDR_PAPRAS.DAM are not capable of executing and cannot perform any malicious routines. This
This backdoor may be downloaded by other malware/grayware from remote sites. It executes commands from a remote malicious user, effectively compromising the affected system. It connects to a website
This backdoor terminates processes which can compromise system security. It also patches a file that subsequently becomes malicious. This backdoor arrives via peer-to-peer (P2P) shares. It arrives on
This backdoor may be manually installed by a remote user. It is able to receive commands from said remote user. When executed, it gathers information and downloads files. It also drops the malware
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes commands from a remote malicious user,