Attention: We have transitioned to a new AAD or Microsoft Entra ID from the week of May 20, 2024. In case your tenant requires admin consent, please refer to this document located at Overview of user and admin consent - Microsoft Entra ID | Microsoft Learn and grant access to App ID: 6ba09155-cb24-475b-b24f-b4e28fc74365 with graph permissions for Directory.Read.All and User.Read for continued access. While the app may appear unverified, you can confirm its legitimacy by verifying the App ID provided.
10 entries found.
Win32/Bredolab
Win32/Bredolab is a downloader which is able to download and execute arbitrary files from a remote host.
Alert level:
severe
TrojanDownloader:Win32/Bredolab.G
TrojanDownloader:Win32/Bredolab.G is a detection of malware that connects to a remote server to download and execute files.
Alert level:
severe
PWS:Win32/Daurso.gen!A
PWS:Win32/Daurso.gen!A is a generic detection for a group of trojans that attempt to steal FTP credentials.
Alert level:
severe
Worm:Win32/Prolaco.gen!E
Worm:Win32/Prolaco.gen!E is a generic detection of a worm that spreads via e-mail message attachments, removable drives and shared folders of P2P applications. This worm also lowers security settings and disables certain security software and services.
Alert level:
severe
TrojanDropper:Win32/Oficla.J
TrojanDropper:Win32/Oficla.J is a detection for a trojan that installs and executes Trojan:Win32/Oficla.M, a trojan that attempts to inject code into a running process to download a rogue security program identified as TrojanDownloader:Win32/FakeScanti.
Alert level:
severe
Trojan:Win32/Mooplids.A
Trojan:Win32/Mooplids.A is a detection for a trojan that downloads additional malware.
Alert level:
severe
Trojan:Win32/Oficla.AI
Trojan:Win32/Oficla.AI is a trojan that attempts to download and execute arbitrary files.
Alert level:
severe
TrojanDownloader:Win32/Dofoil.D
TrojanDownloader:Win32/Dofoil.D is a trojan that may arrive as a spammed email attachment. It downloads arbitrary files from a remote server.
On March 6, 2018, behavior monitoring and machine learning technologies in Microsoft Defender Antivirus stopped a Dofoil variant (also known as Smoke Loader) that tried to infect more than 400,000 computers. The massive campaign aimed to install a cryptocurrency miner that uses victim computers' resources for coin mining purposes. Learn how artificial intelligence stopped the attack within minutes:
Behavior monitoring combined with machine learning spoils a massive Dofoil coin mining campaign
Alert level:
severe
TrojanDownloader:Win32/Bredolab
TrojanDownloader:Win32/Bredolab is a detection for malware that connects to a remote server to download and execute other files.
Alert level:
severe
TrojanDropper:Win32/Bredolab
TrojanDropper:Win32/Bredolab is a trojan that injects another malware code into its process. The other malware may be detected as TrojanDownloader:Win32/Bredolab.X.
Alert level:
severe