Skip to content

6 results in Threat Encyclopedia: “EXPL_EXECOD.A”
Showing Results : 1 - 6
     
Alias:No Alias FoundDescription:This exploit may be dropped by other malware. It may also be embedded in .PDF files. It contains the exploit to theAdobe zero-day vulnerability.
...following capabilities: It contains an obfuscated JavaScript that when deobfuscated is detected by Trend Micro as EXPL_EXECOD.A. As a result, malicious routines of the deobfuscated script are exhibited on the affected system. This deobfuscated...
...It access several URLs to execute certain malware, including those detected by Trend Micro as JS_AGENT.ZV, EXPL_EXECOD.A, JS_AGENT.ABJM, JS_AGENT.ABJP, JS_REALEXPLOIT.A, and EXPL_ANICMOO.GEN. It also accesses a certain...
...iFrame tag, to several URLs to download the following malware: JS_SENGLOT.C HTML_DLOADR.CJ JS_REPL.CB EXPL_EXECOD.A This malicious HTML script also connects to another URL to download JS_AGENT.ALIG. As a result, routines of...
...to download the following files: EXPL_ANICMOO.GEN JS_DLOADER.AAFV HTML_IFRAME.BCF JS_DLOADER.VSV EXPL_EXECOD.A It uses the Microsoft.XMLHTTP Object and ADODB.Stream Object to download, save, and execute other malicious...
...zero-day exploits can be used by malware authors to get inside users' computers and steal their critical information. EXPL_EXECOD.A, the Trend Micro detection for this threat, is being used to take advantage of a weak DLL file inside a Chinese...

Connect with us on