Views:

Trend Micro Solutions

Trend Micro offers various solutions to prevent the spread of the infection. Click below for information on the detections:

HASHVSAPITrendX
ed040d225ee354e6f86dc602698731a0e6e41994f0385ab8b12032a64551acf1BKDR_TRICKBOT.SMTROJ.Win32.TRX.XXPE002FF018
da4e2287b1f05578aef96f8726abfb1b306721e1fc24a37b2fcda8a07f948685Mal_SageCrypt-1h-
0885905c9997f003dfac42232a2f4b38b7f6a8773bdd6cdbc6386b28d1357109TROJ_SHARIK.MVPCryp.Win32.TRX.XXPE002FF018
728789ca0a19ee54a86cb355bf75ea5ae8dd35d5e484dd2c44ce5134f4ae3926 (JS File)JS_DLOADR.AUSUCK-
71106a58801928a4dcc7322e6cbb33740017b4396c2664e5eeb7a4e245bfe4a7TSPY_EMOTET.SML3TROJ.Win32.TRX.XXPE002FF018
47e875297863768c8f763576900a6ee493728a787fe46a8a1f6dcd942c5e31f8BKDR_TRICKBOT.SMTROJ.Win32.TRX.XXPE002FF018
31ae18bc578f66569cce8cbba64ecb849e058e73e66a5bc52f7b2b4ae2a2fdacTROJ_SHARIK.MVPRansom.Win32.TRX.XXPE002FF017
6dd932f82339c6bc1b9dda85f2a385ec931526dc06d3f85f5eac368f56b90662BKDR_TRICKBOT.SMRansom.Win32.TRX.XXPE002FF018
05A51D915F316FDBED4635B3FD4126E2D1BC99771FEFA0D91F39804E54B90A26 (copy)Possible_SageCrypt-1c-
4CED511A7AEDFA4FEFE0EFB5647ABF5F2E5628453CAB0E19CC07EEC2C83A6B5D (load.exe)TSPY_ZBOT.XNITROJ.Win32.TRX.XXPE002FF018
URLClassification
http[:]//cfm.com[.]ua/awstats/load.exeDisease Vector
http[:]//nolovenolivethiiswarinworld[.]com/ico/load.exeDisease Vector
http[:]//crystalmind[.]ru/versionmaster/nova/load.exeDisease Vector
contsernmayakinternacional[.]ruDisease Vector
soyuzinformaciiimexanikiops[.]comDisease Vector
kantslerinborisinafrolova[.]ruDisease Vector

Prevention and Monitoring

Different Trend Micro products are capable of preventing the security incidents, as well as monitor them. For more information about these features, click the product that you are using below:

Below is the list of OSCE features that can monitor and prevent the threats:

  • Real-time Scan for Virus/Malware

    Real-time Scan

  • Predictive Machine Learning

    Predictive Machine Learning

  • Behavior Monitoring

    Enable Newly Encountered Program Settings - Monitor newly encountered programs downloaded through HTTP or email applications

    Behavior Monitoring

  • Suspicious File

    Enable Suspicious File List under Suspicious Object List Settings

    Suspicious File

Below is the list of DDI features that can monitor threat activity:

  • ZEUS - HTTP (Response) - TSPY_ZBOT.XNI

    TSPY_ZBOT.XNI

  • Dangerous URL in Web Reputation Services database - HTTP (Request)

    Dangerous URL

  • File with malware-related file name- HTTP (Request)

    File with malware-related file name

Blogs and Security News