Keyword: troj_sconato.a
100675 Total Search   |   Showing Results : 121 - 140
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
email purportedly containing a footage of a certain Brazilian actor beating his ex-wife. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.
dowloaded file as RTKT_OLMARIK.EFF. It displays a fake scan for Internet Security 2011. It connects to www.yahoo.com to check for an internet connection. It adds certain registry entries to add an uninstall
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This Trojan arrives on a system as a
where it usually is C:\Windows\System32 on all Windows operating system versions.) Autostart Technique This Trojan registers its dropped component as a system service to ensure its automatic execution at
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the downloaded files. As a result, malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires being executed with a specific
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be downloaded by other malware/grayware from
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It requires its main component to successfully perform
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It executes the dropped file(s). As a result, malicious
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Trojan overwrites disk partitions, rendering the affected computer unusable and unrecoverable. To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram
as these attacks are similar to “cyber espionage.” Attackers work hard to make highly targeted attacks infiltrate a network and maintain its persistent presence to extract sensitive information. What
This malware employs a new autostart mechanism and removes users' privileges in viewing the registry’s content. As such, users won’t be able to suspect that their systems are already infected. To get
directory . It registers sumpod.sys as a system service by creating the following registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Passthru It then copies and executes the following files to