Skip to content

91 results in Threat Encyclopedia: “ILOMO”
Showing Results : 1 - 10
      NextNext Page
Alias:No Alias FoundDescription:This description applies to the following variants: TROJ_ILOMO.A TROJ_ILOMO.B TROJ_ILOMO.E TROJ_ILOMO.F TROJ_ILOMO.G TROJ_ILOMO.K TROJ_ILOMO.L TROJ_ILOMO.C TROJ_ILOMO...
...automated analysis system. TrojanDropper:Win32/Ilomo.C (Microsoft); Ilomo.a (McAfee); Trojan.Clampi!gen (Symantec...Win32.Krap.v (Kaspersky); Trojan.Win32.Ilomo.c (V) (Sunbelt); Gen:Trojan.Clampi.JuW...
...downloaded from remote sites by other malware. It may be dropped by other malware. It drops component files detected sa TROJ_ILOMO.DN. It also creates registry key/entry to enable the automatic execution of its dropped component. It deletes itself...
...may be downloaded unknowingly by a user when visiting malicious Web sites. It drops a component file detected as TROJ_ILOMO.CWX. It creates registry entries to enable the execution of its dropped component file. It generates a list which contains...
Description:This virus has been renamed to MAL_ILOMO-4.
...heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_ILOMO If your Trend Micro product detects a file under this detection name, do not execute the file. Delete it immediately especially...
Description:This virus has been renamed to MAL_ILOMO-2.
...enable automatic execution of dropped malware at every system startup: This Trojan drops a file also detected as TROJ_ILOMO.CD. It then executes the dropped file. As a result, malicious routines of the dropped files are exhibited on the affected...
...heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_ILOMO If your Trend Micro product detects a file under this detection name, do not execute the file. Delete it immediately especially...
...heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware: TROJ_ILOMO If your Trend Micro product detects a file under this detection name, do not execute the file. Delete it immediately especially...

Connect with us on