Skip to main content
Skip to main content
575 entries found. Displaying page 3 of 29.
Updated on Aug 27, 2010
Trojan:Win32/Resmu.A!rootkit is a kernel-mode rootkit that is installed by TrojanDropper:Win32/Resmu.A.
Alert level: severe
Updated on Sep 03, 2010
Trojan:WinNT/Bubnix.J is a trojan that installs itself as a system driver. It injects code into legitimate processes, connects to remote servers, and sends out spammed email messages.
Alert level: severe
Updated on Sep 24, 2010
TrojanDropper:Win32/Otlard.A is a trojan that drops and registers Trojan:WinNT/Otlard.B as a service.
Alert level: severe
Updated on Sep 24, 2010
Trojan:WinNT/Kapa.A is a detection for a kernel-mode trojan that may be directed by other malware to terminate services.
Alert level: severe
Updated on Nov 03, 2010
TrojanDropper:Win32/Festi.C is a trojan that installs Backdoor:WinNT/Festi.C, a trojan backdoor that allows backdoor access and control to an infected computer.
Alert level: severe
Updated on Nov 12, 2010
Backdoor:WinNT/Festi.C is a backdoor trojan that allows limited remote access and control. The trojan connects to a remote website and retrieves instructions and commands from a remote attacker. The commands could instruct Backdoor:WinNT/Festi.C to distribute spam.
Alert level: severe
Updated on Dec 23, 2010
VirTool:WinNT/Rootkitdrv.HU is a kernel-mode rootkit that attempts to capture keystrokes entered by a user on the affected computer.
Alert level: severe
Updated on Jan 17, 2011
Trojan:WinNT/KillAV.E is a kernel mode rootkit, which is used to terminate processes related to antivirus and security software. It may also perform other functions, such as deleting files, overwriting registry entry data, and others.
Alert level: severe
Updated on May 23, 2011

VirTool:WinNT/Popureb.A is a component of Win32/Popureb. It uses a low level disk driver hook to prevent a malicious Master Boot Record (MBR) and other malicious data stored as disk sectors from being changed.

Alert level: severe
Updated on Jul 12, 2011

Trojan:DOS/Alureon.C is the detection name for infected Master Boot Records (MBR) produced by certain variants of the Win32/Alureon rootkit family. The rootkit infects 32-bit and 64-bit systems.

Alert level: severe
Updated on Aug 03, 2011

HackTool:WinNT/Tcpz.C is a device driver that modifies the Windows TCP/IP stack device driver to change the concurrent TCP connection attempts limit.

Alert level: high
Updated on Sep 07, 2011

Trojan:WinNT/Diskhide.A is a trojan installed as a kernel-mode driver that attempts to hide modifications to the Master Boot Record (MBR), detected as Trojan:DOS/Wador.A.

Alert level: severe
Updated on Jun 03, 2012

Trojan:Win64/Sirefef.W is the 64-bit user-mode component of Win32/Sirefef - a multi-component family of malware that moderates your Internet experience by modifying search results, and generating pay-per-click advertising revenue for its controllers. The family consists of multiple parts that perform different functions, such as downloading updates and additional components, hiding existing components or performing a payload.

Alert level: severe
Updated on Jan 03, 2013

Windows Defender Antivirus detects and removes this threat. 

This hacktool can be used to activate a pirated versions of Microsoft Windows and Microsoft Office.

We recommend you don't use hacktools as they can be associated with malware or unwanted software. We have seen malware distributed with these tools.

Alert level: high
Updated on Feb 28, 2005
Backdoor:Win32/Rbot.EE is a backdoor Trojan that connects to an IRC server to receive commands from remote attackers. Commands could include instructions to spread to other computers via open network shares or by exploit of a security vulnerability, or to launch a denial of service (DoS) attack against specified targets.
 
Backdoor:Win32/Rbot.EE may be identified as Backdoor:Win32/Rbot!1939.
Alert level: severe
Updated on Jun 21, 2016

Mimikatz is a well-known hacktool used to extract Windows passwords in plain-text from memory, perform pass-the-hash attacks, inject code into remote processes, generate golden tickets, and more. This tool is used by red teams and real threat actors alike due to its powerful toolset and open-source nature allowing for easy modification. This tool is still regularly maintained and kept up to date with latest changes in Windows. Mimikatz is often delivered and executed without writing to disk (fileless) in an attempt to avoid detection. 

Alert level: high
Updated on Jan 27, 2010
Trojan:Win32/Alvabrig.A is a trojan that modifies certain Windows files. It may also drop other malware, steal sensitive data and download arbitrary files from certain Web sites. In some instances it also disables System Restore.
Alert level: severe
Updated on Nov 29, 2004
VirTool:Win32/HiddenRun.B is a utility application that can hide a running program's display windows.
Alert level: severe
Updated on Mar 02, 2012

Exploit:JS/ShellCode.AL is a malicious JavaScript file that downloads and runs arbitrary files when certain vulnerabilities in the browser are exploited, usually by other malware.

Alert level: severe
Updated on Dec 08, 2006
Alert level: high