Malware - Úvod  2019  2018  2017  2016  2015  2014

 

2019

Datum

Název

Info 

14.3.19 Backdoor.Filensfer Backdoor.Filensfer is a Trojan horse that opens a backdoor on the compromised computer. 
14.3.19 Backdoor.Fakeslic Backdoor.Fakeslic is a Trojan horse that opens a backdoor on the compromised computer. 
13.3.19 Exp.CVE-2019-0808 Exp.CVE-2019-0808 is a heuristic detection for files attempting to exploit the Microsoft Windows Win32k Local Privilege Escalation Vulnerability (CVE-2019-0808). 
13.3.19 Exp.CVE-2019-0797 Exp.CVE-2019-0797 is a heuristic detection for files attempting to exploit the Microsoft Windows Win32k Local Privilege Escalation Vulnerability (CVE-2019-0797). 
13.3.19 W32.Extrat.C W32.Extrat.C is a Trojan horse that opens a backdoor on the compromised computer. It may also download other potentially malicious files and steal information. 
12.3.19 Backdoor.Sarhus Backdoor.Sarhus is a Trojan horse that opens a backdoor on the compromised computer. It may also download potentially malicious files.
12.3.19 Backdoor.Xoratag Backdoor.Xoratag is a Trojan horse that opens a backdoor on the compromised computer. It may also download potentially malicious files.
9.3.19 Trojan.Bitartra Trojan.Bitartra is a Trojan horse that may perform malicious activities on the compromised computer.
7.3.19 Win32/Filecoder
.LockedFile.I
Win32/Filecoder.LockedFile.I is a trojan that encrypts files on fixed and network drives. To decrypt files the user is requested to comply with given conditions in exchange for a password/instructions.

1.3.19

Exp.CVE-2018-20250 Exp.CVE-2018-20250 is a heuristic detection for files attempting to exploit the WinRAR Multiple Security Vulnerabilities (CVE-2018-20250).

18.2.19

Trojan.Tinukebot.B Trojan.Tinukebot.B is a Trojan horse that opens a backdoor and may perform malicious activities on the compromised computer. 

17.2.19

Infostealer.Powtief

Infostealer.Powtief is a Trojan horse that steals information from the compromised computer. 

17.2.19

Trojan.Keymarble

Trojan.Keymarble is a Trojan horse that downloads potentially malicious files and may perform malicious activities on the compromised computer. 

12.2.19

Hacktool.Modlishka

Hacktool.Modlishka is a tool that is used to perform operations such as injecting and ending processes on the computer.

12.2.19

Backdoor.Scuoter

Backdoor.Scuoter is a Trojan horse that opens a backdoor on the compromised computer.

12.2.19

Downloader.Keapot

Downloader.Keapot is a Trojan horse that may download potentially malicious files onto and steal information from the compromised computer.

7.2.19

Ransom.Gogalocker

Ransom.Gogalocker is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them.

5.2.19

Linux.Speakup

Linux.Speakup is a Trojan horse that opens a backdoor on the compromised computer.

1.2.19

Trojan.Formbook

Trojan.Formbook is a Trojan horse that steals information from the compromised computer.

1.2.19

Backdoor.Chafpe

Backdoor.Chafpe is a Trojan horse that opens a backdoor on the compromised computer.

1.2.19

Backdoor.Chafanty

Backdoor.Chafanty is a Trojan horse that opens a backdoor on the compromised computer.

1.2.19

Backdoor.Chafty

Backdoor.Chafty is a Trojan horse that opens a backdoor on the compromised computer.

1.2.19

Backdoor.Chafpy

Backdoor.Chafpy is a Trojan horse that opens a backdoor on the compromised computer.

29.1.19

Trojan.Vcrodat

Trojan.Vcrodat is a Trojan horse that may perform malicious activities on the compromised computer.

29.1.19

Ransom.Anatova

Ransom.Anatova is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them.

29.1.19

Backdoor.Kirihop

Backdoor.Kirihop is a Trojan horse that opens a backdoor on the compromised computer.

28.1.19

Ransom.Pots

Ransom.Pots is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them.

24.1.19

Backdoor.Exemyr

Backdoor.Exemyr is a Trojan horse that opens a backdoor on the compromised computer.

23.1.19

Trojan.Cartbat

Trojan.Cartbat is a Trojan horse that downloads potentially malicious files onto the compromised computer.

19.1.19

Ransom.Mongolock

Ransom.MongoLock is a Trojan horse that deletes files from the compromised computer and then demands a payment for their return.

19.1.19

Bloodhound.RTF.15

Bloodhound.RTF.15 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.

19.1.19

Bloodhound.RTF.16

Bloodhound.RTF.16 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.

19.1.19

Bloodhound.RTF.17

Bloodhound.RTF.17 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.

19.1.19

Bloodhound.RTF.18

Bloodhound.RTF.18 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.

16.1.19

Linux.Ekcorminer

Linux.Ekcorminer is a Trojan horse that uses the compromised computer's resources to mine cryptocurrency.

15.1.19

Bloodhound.RTF.14

Bloodhound.RTF.14 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.

15.1.19

Bloodhound.RTF.13

Bloodhound.RTF.13 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.

14.1.19

Infostealer.Vidar

Infostealer.Vidar is a Trojan horse that steals information from the compromised computer.

14.1.19

Trojan.Liroxod

Trojan.Liroxod is a Trojan horse that opens a backdoor on the compromised computer. It may also download potentially malicious files.

9.1.19

Exp.CVE-2019-0566

Exp.CVE-2019-0566 is a heuristic detection for files attempting to exploit the Microsoft Edge Remote Privilege Escalation Vulnerability (CVE-2019-0566).

9.1.19

Exp.CVE-2019-0569

Exp.CVE-2019-0569 is a heuristic detection for files attempting to exploit the Microsoft Windows Kernel Local Information Disclosure Vulnerability (CVE-2019-0569).

4.1.19

OSX.Windtail

OSX.Windtail is a Trojan horse that downloads potentially malicious files and may perform malicious activities on the compromised computer.

4.1.19

W64.Flobal

W64.Flobal is a Trojan horse that opens a backdoor on the compromised computer and steals information.

3.1.19

Downloader.Jumpta

Downloader.Jumpta is a Trojan horse that downloads potentially malicious files onto the compromised computer.

1.1.19

Trojan.Zleloa

Trojan.Zleloa is a Trojan horse that may perform malicious activities on the compromised computer.