Attention: We will be transitioning to a new AAD or Microsoft Entra ID from the week of May 20, 2024. In case your tenant requires admin consent, please refer to this document located at Overview of user and admin consent - Microsoft Entra ID | Microsoft Learn and grant access to App ID: 6ba09155-cb24-475b-b24f-b4e28fc74365 with graph permissions for Directory.Read.All and User.Read for continued access.
185 entries found.
Displaying page 7
of 10.
Trojan:DOS/Sinowal.A
Windows Defender Antivirus detects and removes this threat.
This threat is a member of the Win32/Sinowal family of password-stealing and backdoor trojans. It can install a security certificate to make you think a website is secure when it isn't.
It can also steal your personal information, such as your banking user names and passwords, and send them to a hacker.
This trojan is installed on your PC by VirTool:WinNT/Sinowal.
Alert level:
severe
VirTool:WinNT/Sinowal.A
VirTool:WinNT/Sinowal.A is a complex component associated with command and control functions and the advanced stealth features of the Win32/Sinowal family.
Win32/Sinowal is a family of password-stealing and backdoor trojans. These trojans may try to find a cryptographic certificate on the infected computer and install a certificate on the computer to mislead users in Secure Sockets Layer (SSL) Web transactions. Some Win32/Sinowal components may also use advanced stealth functionality, or try to perform certain operations from the context of a trusted process such as explorer.exe in order to bypass local software-based firewalls.
Alert level:
severe
VirTool:WinNT/Sinowal.B
VirTool:WinNT/Sinowal.B is a driver component used by the Win32/Sinowal family.
Alert level:
severe
Trojan:DOS/Sinowal.L
Trojan:DOS/Sinowal.L is a component of Win32/Sinowal - a family of password-stealing and backdoor trojans. The trojan may try to find a cryptographic certificate on the infected computer and install a certificate on the computer to mislead users in Secure Sockets Layer (SSL) Web transactions. The trojan may also capture user data such as banking credentials from various user accounts and send the data to Web sites specified by the attacker. Some Win32/Sinowal components may also open a backdoor on a TCP port. Win32/Sinowal may try to perform certain operations from the context of a trusted process such as explorer.exe in order to bypass local software-based firewalls.
Trojan:DOS/Sinowal.L is a detection for a malformed MBR (Master Boot Record) generated by VirTool:WinNT/Sinowal. It loads the driver loader code of Sinowal when the affected computer boots.
Alert level:
severe
VirTool:WinNT/Sinowal.F
Trojan:WinNT/Sinowal.F is a complex driver component associated with command and control functions and the advanced stealth features of the Win32/Sinowal family. WinNT/Sinowal.F may download other malware from a predefined Web site.
Win32/Sinowal is a family of password-stealing and backdoor trojans. These trojans may try to find a cryptographic certificate on the infected computer and install a certificate on the computer to mislead users in Secure Sockets Layer (SSL) Web transactions. Some Win32/Sinowal components may also use advanced stealth functionality, or try to perform certain operations from the context of a trusted process such as explorer.exe in order to bypass local software-based firewalls.
Alert level:
severe