![]() It delivers a version of the VisIT remote administration tool, which is used to hijack the infected system. ![]() The downloader malware's payloads (TROJ_SPYSIVIT.A and JAVA_ SPYSIVIT.A) are what make it notable. Trend Micro detects this malware as JS_DLOADR and W2KM_DLOADR. It appears they are working on a new malware that - based on how they were coded - is most likely intended to spread through spam emails embedded with malicious attachments. ![]() ![]() We noticed a series of testing submissions in VirusTotal that apparently came from the same group of malware developers in Moldova, at least based on the filenames and the submissions' source.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |