HackTool.Win32.APT- PS

Technical details 1.1 Modules and malware operation sequences This malware includes many modules, including executable programs and various scripts, each of which has its small task. The following is a list of malware files with a brief description of how they work. File Name Description HackTool.Win32.PS_Backdoor the malware Backdoor file is used to execute the…

Trojan.Win32.NetWire

Overview Type: Trojan Destruction Level: Moderate Prevalence: Moderate Malware names Trojan.Win32.NetWire.a (Padvish) Backdoor: Win32/Netwire.GG! MTB (Microsoft) A Variant Of Win32/Kryptik.HLLV (ESET-NOD32) What is a Trojan? Trojans are malware types that introduce themselves as healthy and legal software and act similarly to practical and applicable software but cause many destructions to the system when executing. The…

Trojan.Win32.Andromeda

Overview Type: Trojan Destruction Level: Moderate Prevalence: High Malware names • Trojan.Win32.Andromeda • Downloader.Win32.Andromeda What is a Trojan? Trojans are malware types that introduce themselves as healthy and legal software and act similarly to practical and applicable software but cause many destructions to the system when executing. The downloaded software from the internet, placing HTML text,…

Implant.ARM.iLOBleed.a

  Download full report in English (PDF)  Download full report in Persian (PDF)  1 Technical Abstract HP servers provide a management module called iLO (a.k.a. Integrated Lights-Out), which turns on as soon as the power cable is connected, loading a full-blown proprietary operating system. This module has full access to all the firmware, hardware, software, and…

Hacktool.Win32.Xwo.a

Overview Type: Hacktool Destruction Level: High Prevalence: Low   What is Hacktool? Hacktools are tools designed to facilitate intrusion. These tools can be used by a hacker to siphon data from the victim organization’s network. These tools are commonly used to retrieve the validation information of sensitive victim servers. For example, a hacker can use…

Trojan.Android.SmsSpy.ApkeditorsIrhack

General explanation Type: Trojan Degree of destruction: average Prevalence: average Malware names: Trojan.Android.SmsSpy.ApkeditorsIrhack (Padvish) Trojan.Android.SmsSend.ApkeditorsIrhack (Padvish) HEUR:Trojan-SMS.AndroidOS.Agent.abr (Kaspersky) Android.Trojan.SMSSend.AQT (BitDefenderFalx) A Variant Of Android/TrojanSMS.Agent.BZW (ESET-NOD32) Android.SmsSend.28203 (DrWeb) ANDROID/TrojanSMS.IBAV.Gen (Avira) What is the Trojan? Trojans are malware types that introduce themselves as healthy and legal software and act similarly to practical and applicable software but cause…

Trojan.Win32.AgentTesla.a

General Explanation Type: Trojan Degree of destruction: low Prevalence: high Used Vulnerability: CVE-2017-8570 and CVE-2017-11882 Names of the malware: Trojan.Win32.AgentTesla.a(Padvish) Trojan.Win32.AgentTesla.cG(Padvish) Trojan:MSIL/AgentTesla.AL!MTB(Microsoft) AgentTesla-FCYX!72D3FB6A5E15(McAfee) What is a Trojan? Trojans are malware types that introduced themselves as healthy and legal software and act similarly to practical and applicable software but cause many destructions to the system when…

Trojan.Android.SmsPay.Caco333

General Explanation Type: Trojan Degree of destruction: average Prevalence: average What is a Trojan? Trojans are malware types that introduced themselves as healthy and legal software and act similarly to practical and applicable software but cause many destructions to the system when executing. The downloaded software from the internet, placing HTML text, attaching it to…