Search results

Jump to navigation Jump to search
Results 1 – 18 of 18
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  
  
  
  
  
  
  

Page title matches

  • ...reworks.com/cyber-threat-intelligence/threats/malware-analysis-of-the-lurk-downloader/ |Abstract=Lurk is a malware downloader that uses digital steganography: the art of hiding secret information withi
    922 bytes (123 words) - 11:30, 7 July 2015

Page text matches

  • |Infrastructure=Diffusion par [[downloader::Mocbot]]
    221 bytes (20 words) - 15:46, 8 August 2015
  • ...his new PoS malware. We will also provide evidence to demonstrate that the downloader malware and PoS malware are closely related, perhaps even written by the sa
    1 KB (148 words) - 15:52, 14 May 2016
  • ...nging to the Artro botnet are detected by Kaspersky Lab products as Trojan-Downloader.Win32.CodecPack, which has been around since early 2008. However, a full de The downloader
    1 KB (214 words) - 18:48, 8 February 2015
  • ...ader, which led to mid-September that this malware was listed as a trivial downloader designed to automate the process of downloading another piece of malware, w
    2 KB (242 words) - 22:52, 30 July 2015
  • |Introduction=Poussé par [[downloader::Pushdo]]
    741 bytes (88 words) - 06:47, 14 August 2015
  • We followed up with an analysis of the latest variant of this bot, Trojan-Downloader.OSX.Flashfake.ab. ...installs the main component of the Trojan. The main component is a Trojan-Downloader that continuously connects to one of its command-and-control (C&C) servers
    2 KB (308 words) - 18:58, 7 February 2015
  • ...le downloader infrastructures by replaying download dialogs or observing a downloader’s process activities from within the Windows kernel. With these two techn |Keyword=Malware, Downloader, Dropper, Dynamic Analysis
    2 KB (270 words) - 23:31, 30 July 2015
  • ...lications, and sensitive files from your computer. The trojan implements a downloader component that we observed being distributed via spam email as an attachmen
    845 bytes (115 words) - 23:37, 30 July 2015
  • ...executing the SCR file unleashed a little recognized variant of the Upatre downloader trojan which cloned user IDs and sent out email notifications with the subj
    794 bytes (115 words) - 01:34, 1 February 2015
  • ...reworks.com/cyber-threat-intelligence/threats/malware-analysis-of-the-lurk-downloader/ |Abstract=Lurk is a malware downloader that uses digital steganography: the art of hiding secret information withi
    922 bytes (123 words) - 11:30, 7 July 2015
  • ...e services. The threat actors later shifted to distribution via the Upatre downloader trojan. Dyre is also known as Dyreza, Dyzap, and Dyranges by the antivirus
    920 bytes (133 words) - 12:17, 19 March 2016
  • ...t one of the final payloads dropped by this operation was the Win32/Nymaim downloader/ransomware family. In this blog post, we will look at the technical details
    933 bytes (137 words) - 12:48, 31 July 2015
  • ...achments containing malicious macros). This attachment comes with a Trojan Downloader, usually from the Family detected by ESET as JS/TrojanDownloader.Nemucod, a
    1 KB (149 words) - 23:39, 19 March 2016
  • ...ally in the United States. The initial Win32/Medfos infection is usually a downloader component that is distributed in different ways; for example, by visiting a
    1 KB (165 words) - 21:50, 5 August 2015
  • * 20 kB downloader (crafted each time specifically for the attacked systems), which calculates
    1 KB (165 words) - 15:50, 8 August 2015
  • ...eer-to-peer botnet since at least 2003. It is a file infector and a trojan downloader, the latter of which is mainly used to send spam, although it has been used
    2 KB (268 words) - 12:56, 31 July 2015
  • * [[URLZone]] / [[Downloader-BQZ.a]]
    10 KB (847 words) - 12:17, 14 March 2020