Trojan.Win32.RisePro

Overview Type: Trojan Destruction Level: Medium Prevalence: Medium   Malware name(s) (Padvish) Trojan.Win32. RisePro.a ESET) A Variant Of Win32/TrojanDownloader.Agent.GNV) Kaspersky) HEUR:Trojan-PSW.Win32.RisePro) What is a Trojan? Trojans are a type of malware that masqurades themselves as legitimate and lawful software, behaving very similarly to useful and practical applications. However, when executed, they create numerous disruptions for…

Spy.Win32.SecondEye

Overview Type: Spyware Destruction Level: Moderate Prevalence: Moderate   Malware names: Spy.Win32.SecondEye (Padvish) Win32/Spy.SecondEye.A   What is spyware? This type of malware is used to steal organizational personal information and espionage purposes. With spyware installed on the system, the user’s information is under constant threat from the security point of view, and there is a…

Trojan.VBS.Neoreklami

Overview Type: Trojan Degree of destruction: Moderate Prevalence: High What is a Trojan? Trojans are malware types that introduce themselves as healthy and legal software and act similarly to practical and applicable software but cause many destructions to the system when executing. The downloaded software from the internet, placing HTML text, attaching it to an…

Trojan.Android.SmsSpy.Sinab

Overview Type: Trojan Destruction Level: Moderate What is a Trojan? Trojans are malware types that introduce themselves as healthy and legal software and act similarly to practical and applicable software but cause many destructions to the system when executing. The downloaded software from the internet, placing HTML text, attaching it to an email, etc. are…

Exploit.Win32.CVE-2022-30190.a

Overview: Type: Vulnerability Vulnerable Platform: Windows Vulnerable Versions: All Windows versions Patch release date: 14, June 2022   Vulnerable module: Microsoft Support Diagnostic Tool (MSDT) Vulnerability type: Remote Code Execution Risk Level: High (CVSS:3.1 7.8 / 7.0) What is a Vulnerability? In computer security, Vulnerability is a weak point in a platform that can be exploited by an…

HackTool.Win32.APT- PS

Technical details 1.1 Modules and malware operation sequences This malware includes many modules, including executable programs and various scripts, each of which has its small task. The following is a list of malware files with a brief description of how they work. File Name Description HackTool.Win32.PS_Backdoor the malware Backdoor file is used to execute the…

Trojan.Win32.NetWire

Overview Type: Trojan Destruction Level: Moderate Prevalence: Moderate Malware names Trojan.Win32.NetWire.a (Padvish) Backdoor: Win32/Netwire.GG! MTB (Microsoft) A Variant Of Win32/Kryptik.HLLV (ESET-NOD32) What is a Trojan? Trojans are malware types that introduce themselves as healthy and legal software and act similarly to practical and applicable software but cause many destructions to the system when executing. The…

Trojan.Win32.Andromeda

Overview Type: Trojan Destruction Level: Moderate Prevalence: High Malware names • Trojan.Win32.Andromeda • Downloader.Win32.Andromeda What is a Trojan? Trojans are malware types that introduce themselves as healthy and legal software and act similarly to practical and applicable software but cause many destructions to the system when executing. The downloaded software from the internet, placing HTML text,…

Implant.ARM.iLOBleed.a

  Download full report in English (PDF)  Download full report in Persian (PDF)  1 Technical Abstract HP servers provide a management module called iLO (a.k.a. Integrated Lights-Out), which turns on as soon as the power cable is connected, loading a full-blown proprietary operating system. This module has full access to all the firmware, hardware, software, and…