Malware -

Úvod  2019  2018  2017  2016  2015  2014  Bankovní  Databáze  Mobil  Ransom  Znalosti  Programy  Virus Calendar  Virus Articles  Malware Categorie 

 

2019

Datum

Název

Info 

17.7.19

Trojan.Burtopinam Trojan.Burtopinam is a Trojan horse that may perform malicious activities on the compromised computer. 

15.7.19

Backdoor.Hannotog

Backdoor.Hannotog is a Trojan horse that opens a backdoor on the compromised computer. 

15.7.19

Win32/TrojanDownloader.Small.PET

Win32/TrojanDownloader.Small.PET is a trojan which tries to download other malware from the Internet.

15.7.19

Win32/Exploit.CVE-2018-0802.A

Win32/Exploit.CVE-2018-0802.A is a trojan designed to deliver various malware to the user's systems.

15.7.19

Win64/GoBot2

Win64/GoBot2 serves as a backdoor. It can be controlled remotely.

15.7.19

Win64/GoBot2

Win64/GoBot2 serves as a backdoor. It can be controlled remotely.

12.7.19

Trojan.Fenkrib

Trojan.Fenkrib is a Trojan horse that downloads potentially malicious files. 

10.7.19

Infostealer.Astaroth

Infostealer.Astaroth is a Trojan horse that steals information from the compromised computer. 

3.7.19

OSX.Netwire

OSX.Netwire is a Trojan horse that opens a backdoor on the compromised computer. 

25.6.19

Trojan.Amadey

Trojan.Amadey is a Trojan horse that steals information from the compromised computer. 

25.6.19

Trojan.Malmsi

Trojan.Malmsi is a heuristic detection for Windows Installer (.msi) files that contain malicious scripts. 

25.6.19

Backdoor.Powerton

Backdoor.Powerton is a Trojan horse that opens a backdoor, steals information, and downloads potentially malicious files onto the compromised computer. 

25.6.19

Exp.CVE-2019-0888

Exp.CVE-2019-0888 is a heuristic detection for files attempting to exploit the Microsoft ActiveX Data Objects Remote Code Execution Vulnerability (CVE-2019-0888). 

6.6.19

OSX.Keysteal

OSX.Keysteal is a heuristic detection used to detect malware that can steal credentials from Apple's Keychain via a vulnerability in macOS 10.14.3 and below. 

28.5.19

Exp.CVE-2019-0752

Exp.CVE-2019-0752 is a heuristic detection for files attempting to exploit the Microsoft Internet Explorer Remote Memory Corruption Vulnerability (CVE-2019-0752). 

27.5.19

Backdoor.Whisperer

Backdoor.Whisperer is a Trojan horse that opens a backdoor on the compromised computer. 

27.5.19

Backdoor.Tavroigu

Backdoor.Tavroigu is a Trojan horse that opens a backdoor on the compromised computer. 

16.5.19

Ransom.Robbinhood

Ransom.Robbinhood is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. 

16.5.19

W32.Bulehero

W32.Bulehero is a worm that uses the compromised computer's resources to mine cryptocurrency. 

14.5.19

Ransom.Ryuk

Ransom.Ryuk is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. 

8.5.19

Ransom.MegaCortex

Ransom.MegaCortex is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. 

18.4.19

Infostealer.Scranos

Infostealer.Scranos is a Trojan horse that steals information from the compromised computer. It may also download potentially malicious files. 

10.4.19

VBS.Rosekernel

VBS.Rosekernel is a worm that spreads via removable drives and network shares. It opens a backdoor on the compromised computer and downloads potentially malicious files. 

10.4.19

Backdoor.Darkteq

Backdoor.Darkteq is a Trojan horse that opens a backdoor on the compromised computer. 

10.4.19

Exp.CVE-2019-0803

Exp.CVE-2019-0803 is a heuristic detection for files attempting to exploit the Microsoft Windows Kernel 'Win32k.sys' Local Privilege Escalation Vulnerability (CVE-2019-0803). 

10.4.19

Exp.CVE-2019-0859

Exp.CVE-2019-0859 is a heuristic detection for files attempting to exploit the Microsoft Windows Win32k Local Privilege Escalation Vulnerability (CVE-2019-0859). 

9.4.19

Infostealer.Glitchpos

Infostealer.Glitchpos is a Trojan horse that steals information from the compromised computer. 

5.4.19

Backdoor.Vexdoor

Backdoor.Vexdoor is a Trojan horse that opens a backdoor on the compromised computer. 

5.4.19

Android.RemoteCode
.152.origin

Android-Trojan that runs on devices working on Android OS. It is a renewed version of the Android.RemoteCode.106.origin Trojan.
It is a software module that can be integrated in any application. The applications with Android.RemoteCode.152.origin were distributed through the Google Play catalog.

5.4.19

Android.RemoteCode
.127.origin

A Trojan for Android included in SDK 呀呀云 (Ya Ya Yun). It is used in software development. This SDK provides users with an opportunity to exchange text,
voice and video messages. The main purpose of 
Android.RemoteCode.127.origin
 is a covert download and launch of additional malicious modules.

5.4.19

Trojan.DownLoad4.11892

The malware has a valid digital signature and is distributed among cryptocurrency enthusiasts. Upon launch it downloads and compiles source code using the .Net framework. Using the same code, it then downloads Trojan.PWS.Stealer.24943. The malware creators also use the 2n****.co service to collect information on the number of installs

5.4.19

Android.HiddenAds.1008

Executes code of the following detected threats

4.4.19

W32.Beapy

W32.Beapy is a worm that spreads via SMB, MS SQL, or by exploiting vulnerabilities in the Windows operating system. 

29.3.19

W97M.Astraunlock

W97M.Astraunlock is a Trojan horse that downloads potentially maliciious files onto the compromised computer. 

28.3.19

Backdoor.Tinimeti

Backdoor.Tinimeti is a Trojan horse that opens a backdoor on the compromised computer. 

28.3.19

Hacktool.Gobrut

Hacktool.Gobrut is a tool that works as a brute-forcing module. It tries to log into target services using credentials retrieved from a remote server. 

26.3.19

Trojan.Susafone

Trojan.Susafone is a Trojan horse that opens a backdoor on the compromised computer. It may also download potentially malicious files. 

25.3.19

Backdoor.Picigail

Backdoor.Picigail is a Trojan horse that opens a backdoor on the compromised computer. 

25.3.19

Ransom.Ploc

Ransom.Ploc is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them. 

14.3.19

Backdoor.Filensfer

Backdoor.Filensfer is a Trojan horse that opens a backdoor on the compromised computer. 

14.3.19

Backdoor.Fakeslic

Backdoor.Fakeslic is a Trojan horse that opens a backdoor on the compromised computer. 

13.3.19

Exp.CVE-2019-0808

Exp.CVE-2019-0808 is a heuristic detection for files attempting to exploit the Microsoft Windows Win32k Local Privilege Escalation Vulnerability (CVE-2019-0808). 

13.3.19

Exp.CVE-2019-0797

Exp.CVE-2019-0797 is a heuristic detection for files attempting to exploit the Microsoft Windows Win32k Local Privilege Escalation Vulnerability (CVE-2019-0797). 

13.3.19

W32.Extrat.C

W32.Extrat.C is a Trojan horse that opens a backdoor on the compromised computer. It may also download other potentially malicious files and steal information. 

12.3.19

Backdoor.Sarhus

Backdoor.Sarhus is a Trojan horse that opens a backdoor on the compromised computer. It may also download potentially malicious files.

12.3.19

Backdoor.Xoratag

Backdoor.Xoratag is a Trojan horse that opens a backdoor on the compromised computer. It may also download potentially malicious files.

9.3.19

Trojan.Bitartra

Trojan.Bitartra is a Trojan horse that may perform malicious activities on the compromised computer.

7.3.19

Win32/Filecoder
.LockedFile.I

Win32/Filecoder.LockedFile.I is a trojan that encrypts files on fixed and network drives. To decrypt files the
user is requested to comply with given conditions in exchange for a password/instructions.

1.3.19

Exp.CVE-2018-20250

Exp.CVE-2018-20250 is a heuristic detection for files attempting to exploit the WinRAR Multiple Security Vulnerabilities (CVE-2018-20250).

18.2.19

Trojan.Tinukebot.B

Trojan.Tinukebot.B is a Trojan horse that opens a backdoor and may perform malicious activities on the compromised computer. 

17.2.19

Infostealer.Powtief

Infostealer.Powtief is a Trojan horse that steals information from the compromised computer. 

17.2.19

Trojan.Keymarble

Trojan.Keymarble is a Trojan horse that downloads potentially malicious files and may perform malicious activities on the compromised computer. 

12.2.19

Hacktool.Modlishka

Hacktool.Modlishka is a tool that is used to perform operations such as injecting and ending processes on the computer.

12.2.19

Backdoor.Scuoter

Backdoor.Scuoter is a Trojan horse that opens a backdoor on the compromised computer.

12.2.19

Downloader.Keapot

Downloader.Keapot is a Trojan horse that may download potentially malicious files onto and steal information from the compromised computer.

7.2.19

Ransom.Gogalocker

Ransom.Gogalocker is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them.

5.2.19

Linux.Speakup

Linux.Speakup is a Trojan horse that opens a backdoor on the compromised computer.

1.2.19

Trojan.Formbook

Trojan.Formbook is a Trojan horse that steals information from the compromised computer.

1.2.19

Backdoor.Chafpe

Backdoor.Chafpe is a Trojan horse that opens a backdoor on the compromised computer.

1.2.19

Backdoor.Chafanty

Backdoor.Chafanty is a Trojan horse that opens a backdoor on the compromised computer.

1.2.19

Backdoor.Chafty

Backdoor.Chafty is a Trojan horse that opens a backdoor on the compromised computer.

1.2.19

Backdoor.Chafpy

Backdoor.Chafpy is a Trojan horse that opens a backdoor on the compromised computer.

29.1.19

Trojan.Vcrodat

Trojan.Vcrodat is a Trojan horse that may perform malicious activities on the compromised computer.

29.1.19

Ransom.Anatova

Ransom.Anatova is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them.

29.1.19

Backdoor.Kirihop

Backdoor.Kirihop is a Trojan horse that opens a backdoor on the compromised computer.

28.1.19

Ransom.Pots

Ransom.Pots is a Trojan horse that encrypts files on the compromised computer and demands a payment to decrypt them.

24.1.19

Backdoor.Exemyr

Backdoor.Exemyr is a Trojan horse that opens a backdoor on the compromised computer.

23.1.19

Trojan.Cartbat

Trojan.Cartbat is a Trojan horse that downloads potentially malicious files onto the compromised computer.

19.1.19

Ransom.Mongolock

Ransom.MongoLock is a Trojan horse that deletes files from the compromised computer and then demands a payment for their return.

19.1.19

Bloodhound.RTF.15

Bloodhound.RTF.15 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.

19.1.19

Bloodhound.RTF.16

Bloodhound.RTF.16 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.

19.1.19

Bloodhound.RTF.17

Bloodhound.RTF.17 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.

19.1.19

Bloodhound.RTF.18

Bloodhound.RTF.18 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.

16.1.19

Linux.Ekcorminer

Linux.Ekcorminer is a Trojan horse that uses the compromised computer's resources to mine cryptocurrency.

15.1.19

Bloodhound.RTF.14

Bloodhound.RTF.14 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.

15.1.19

Bloodhound.RTF.13

Bloodhound.RTF.13 is a heuristic detection used to detect threats associated with the Trojan.Mdropper family of threats.

14.1.19

Infostealer.Vidar

Infostealer.Vidar is a Trojan horse that steals information from the compromised computer.

14.1.19

Trojan.Liroxod

Trojan.Liroxod is a Trojan horse that opens a backdoor on the compromised computer. It may also download potentially malicious files.

9.1.19

Exp.CVE-2019-0566

Exp.CVE-2019-0566 is a heuristic detection for files attempting to exploit the Microsoft Edge Remote Privilege Escalation Vulnerability (CVE-2019-0566).

9.1.19

Exp.CVE-2019-0569

Exp.CVE-2019-0569 is a heuristic detection for files attempting to exploit the Microsoft Windows Kernel Local Information Disclosure Vulnerability (CVE-2019-0569).

4.1.19

OSX.Windtail

OSX.Windtail is a Trojan horse that downloads potentially malicious files and may perform malicious activities on the compromised computer.

4.1.19

W64.Flobal

W64.Flobal is a Trojan horse that opens a backdoor on the compromised computer and steals information.

3.1.19

Downloader.Jumpta

Downloader.Jumpta is a Trojan horse that downloads potentially malicious files onto the compromised computer.

1.1.19

Trojan.Zleloa

Trojan.Zleloa is a Trojan horse that may perform malicious activities on the compromised computer.