新增病毒特征名 |
病毒类型 |
病毒特征描述 |
|
Html.Exploit.CVE_2015_6072-1 |
Exploit |
这些特征均提取自实验室捕捉到的漏洞利用攻击样本,通过分析核心算法和漏洞原因,基于攻击模式提取通杀性较高的特征! |
|
Win.Dropper.ZeroAccess-122 |
Dropper |
|
Win.Trojan.ZeroAccess-123 |
Trojan |
|
Win.Trojan.Hicrazyk-12 |
Trojan |
|
Html.Exploit.CVE_2015_6081-1 |
Exploit |
|
Pdf.Exploit.CVE_2015_5100-1 |
Exploit |
|
Win.Trojan.DropBear-1 |
Trojan |
|
Html.Exploit.CVE_2015_6148-1 |
Exploit |
|
Html.Exploit.CVE_2015_6149-1 |
Exploit |
|
Swf.Exploit.CVE_2015_8042-1 |
Exploit |
|
Swf.Exploit.CVE_2015_8647-1 |
Exploit |
|
Win.Trojan.Dynamer-104 |
Trojan |
|
Win.Trojan.Dynamer-105 |
Trojan |
|
Win.Exploit.CVE_2015_6109-1 |
Exploit |
|
Html.Exploit.CVE_2016_0012-1 |
Exploit |
|
Html.Exploit.CVE_2015_6160-1 |
Exploit |
|
Pdf.Exploit.CVE_2016_0931-1 |
Exploit |
|
Html.Exploit.CVE_2015_6080-1 |
Exploit |
|
Win.Trojan.Sovfo-1 |
Trojan |
|
Html.Exploit.CVE_2015_6049-1 |
Exploit |
|
Win.Exploit.CVE_2015_2432-1 |
Exploit |
|
Php.Malware.ProPOS-3 |
Malware |
|
Swf.Exploit.CVE_2015_5558-3 |
Exploit |
|
Win.Trojan.Objchk-1 |
Trojan |
|
Win.Exploit.CVE_2016_0034-1 |
Exploit |
|
Html.Exploit.CVE_2015_6139-1 |
Exploit |
|
Unix.Trojan.Ekoms-1 |
Trojan |
|
Vbs.Trojan.Infosteal-1 |
Trojan |
|
Php.Trojan.Agent-1388761 |
Trojan |
|
Win.Adware.ELEX-1 |
Adware |
|
Win.Adware.ELEX-2 |
Adware |
|
Php.Trojan.Anonghost-1 |
Trojan |
|
Win.Trojan.Qbot-1282 |
Trojan |
|
Html.Exploit.CVE_2016_0083-1 |
Exploit |
|
Doc.Trojan.Melissa-7 |
Trojan |
|
Doc.Dropper.Agent-1383204 |
Dropper |
|
Xls.Trojan.Locky-2 |
Trojan |
|
Rtf.Exploit.CVE_2012_0158-24 |
Exploit |
|
Js.Trojan.Nemucod-2-1 |
Trojan |
|
Js.Trojan.Nemucod-1 |
Trojan |
|
Win.Ransomware.Teslacrypt-21 |
Ransomware |
|
Js.Trojan.Nemucod-2 |
Trojan |
|
Doc.Trojan.Troll-9 |
Trojan |
|
Doc.Dropper.Agent-1399074 |
Dropper |
|
Unix.Trojan.Gafgyt-1 |
Trojan |
|
Win.Trojan.Lorozoad-1 |
Trojan |
|
Win.Downloader.Inffinity-2 |
Downloader |
|
Osx.Trojan.Eleanor-1 |
Trojan |
|
Osx.Trojan.Eleanor-2 |
Trojan |
|
Osx.Trojan.Eleanor-3 |
Trojan |
|
Win.Adware.Agent-1541594 |
Adware |
|