1. TROJ_GENERIC
Malware Type: Trojan
This is the Trend Micro generic detection for low-threat Trojans. It also installs itself as a browser helper object (BHO) by creating certain registry keys.
2. ADW_CNSMIN.G
Malware Type: Adware
This adware arrives on a system via the Internet, or bundled with other applications. It does not have a valid End-User License Agreement (EULA).
It is a plugin that can monitor or manipulate a user's Internet activity by adding itself in the Layered Service Provider (LSP). Like most adware, it generates pop-up avertisements.
3. WORM_NYXEM.E
Malware Type: Worm
This worm propagates by attaching copies of itself to email messages that it sends to target addresses, using its own SMTP engine. Through this SMTP engine, it is able to easily send the email message without using other mailing applications, such as Microsoft Outlook.
4. TROJ_GENERIC.Z
Malware Type: Trojan
This is the Trend Micro generic detection for low-threat Trojans.
5. WORM_ANIG.A
Malware Type: Worm
This memory-resident worm propagates by dropping copies of itself in shared network drives. It steals login information and saves the obtained data in a file, which can be retrieved by a remote user. Its keylogger component substitutes the standard Microsoft Graphical Identification and Authentication DLL (MSGINA.DLL) to carry out its information-stealing routine.
6. POSSIBLE_INFOSTL
Malware Type: Susupicious files
This is the Trend Micro detection for suspicious files that manifest behavior and characteristics similar to known variants of the following spyware:
TSPY_LEGMIR
TSPY_LINEAGE
TSPY_QQPASS
7. HTML_NETSKY.P
Malware Type: HTML
This HTML malware arrives as an email with an executable file attachment that is detected by Trend Micro as WORM_NETSKY.P. It exploits a known vulnerability in Internet Explorer versions 5.01 and 5.5 known as the Automatic Execution of Embedded MIME Type. This vulnerability causes Internet Explorer to automatically run executable file attachments in email messages.
8. WORM_NETSKY.DAM
Malware Type: Worm
This is Trend Micro's detection for the damaged samples of WORM_NETSKY variants. It runs on Windows 95, 98, ME, NT, 2000 and XP.
9. POSSIBLE_STRAT-2
Malware Type: Susupicious files
This is the Trend Micro detection for suspicious files that manifest behavior and characteristics similar to known STRATION variants.
10. TROJ_HORST.HF
Malware Type: Trojan
This Trojan usually arrives as a file dropped by other malware or as a file downloaded unknowingly by a user when visiting malicious Web sites.
Malware Type: Trojan
This is the Trend Micro generic detection for low-threat Trojans. It also installs itself as a browser helper object (BHO) by creating certain registry keys.
2. ADW_CNSMIN.G
Malware Type: Adware
This adware arrives on a system via the Internet, or bundled with other applications. It does not have a valid End-User License Agreement (EULA).
It is a plugin that can monitor or manipulate a user's Internet activity by adding itself in the Layered Service Provider (LSP). Like most adware, it generates pop-up avertisements.
3. WORM_NYXEM.E
Malware Type: Worm
This worm propagates by attaching copies of itself to email messages that it sends to target addresses, using its own SMTP engine. Through this SMTP engine, it is able to easily send the email message without using other mailing applications, such as Microsoft Outlook.
4. TROJ_GENERIC.Z
Malware Type: Trojan
This is the Trend Micro generic detection for low-threat Trojans.
5. WORM_ANIG.A
Malware Type: Worm
This memory-resident worm propagates by dropping copies of itself in shared network drives. It steals login information and saves the obtained data in a file, which can be retrieved by a remote user. Its keylogger component substitutes the standard Microsoft Graphical Identification and Authentication DLL (MSGINA.DLL) to carry out its information-stealing routine.
6. POSSIBLE_INFOSTL
Malware Type: Susupicious files
This is the Trend Micro detection for suspicious files that manifest behavior and characteristics similar to known variants of the following spyware:
TSPY_LEGMIR
TSPY_LINEAGE
TSPY_QQPASS
7. HTML_NETSKY.P
Malware Type: HTML
This HTML malware arrives as an email with an executable file attachment that is detected by Trend Micro as WORM_NETSKY.P. It exploits a known vulnerability in Internet Explorer versions 5.01 and 5.5 known as the Automatic Execution of Embedded MIME Type. This vulnerability causes Internet Explorer to automatically run executable file attachments in email messages.
8. WORM_NETSKY.DAM
Malware Type: Worm
This is Trend Micro's detection for the damaged samples of WORM_NETSKY variants. It runs on Windows 95, 98, ME, NT, 2000 and XP.
9. POSSIBLE_STRAT-2
Malware Type: Susupicious files
This is the Trend Micro detection for suspicious files that manifest behavior and characteristics similar to known STRATION variants.
10. TROJ_HORST.HF
Malware Type: Trojan
This Trojan usually arrives as a file dropped by other malware or as a file downloaded unknowingly by a user when visiting malicious Web sites.
Source: Trend Micro
Labels: Malware, Security, Virus Info
0 Responses to “Top 10 most prevalent global malware”