CME-711 | Aladdin:
Win32.Small.dam
Authentium:
W32/Downloader.AYDY
AVIRA:
TR/Dldr.Small.DBX
CA:
Win32/Pecoan
ClamAV:
Trojan.Downloader-647
ESET:
Win32/Fuclip.A
Fortinet:
W32/Small.DAM!tr
F-Secure:
Small.DAM
Grisoft:
Downloader.Tibs
Kaspersky:
Trojan-Downloader.Win32.Small.dam
McAfee:
Downloader-BAI!M711
Microsoft:
Win32/Nuwar.N@MM!CME-711
Norman:
W32/Tibs.gen12
Panda:
Trj/Alanchum.NX!CME-711
Sophos:
Troj/DwnLdr-FYD
Symantec:
Trojan.Peacomm
Trend Micro:
TROJ_SMALL.EDW | CME-711 is a Trojan Downloader that is spread as an attachment to emails with news headlines as the subject lines which downloads additional security threats, | 2007-01-19 |
CME-416 | Authentium:
W32/Warezov.GC
AVIRA:
TR/Dldr.Stration.C
CA:
Win32/Stration.Variant!Worm
ClamAV:
Worm.Stration.LY
ESET:
Win32/Stration.NO
Fortinet:
W32/Stration.DS@mm
Grisoft:
I-Worm/Stration
Kaspersky:
Email-Worm.W32.Warezov.ez
McAfee:
W32/Stration@MM
Microsoft:
Win32/Stration.DH@mm!CME-416
Norman:
W32/Stration.ATT
Panda:
W32/Spamta.KG.worm
Sophos:
W32/Strati-Gen
Symantec:
W32.Stration.DL@mm
Trend Micro:
WORM_STRAT.DR | CME-416 is a multi-component mass-mailing worm that downloads and executes files from the Internet. | 2006-11-03 |
CME-762 | Avira:
Worm/IRCBot.9374
Authentium:
W32/Ircbot.TT
CA:
Win32/Cuebot.K!Worm
ClamAV:
Trojan.IRCBot-690
ESET:
Win32/IRCBot.OO
Fortinet:
W32/Graweg.A!tr.bdr
Grisoft:
BackDoor.Generic3.GBB!CME-762
Kaspersky:
Backdoor.Win32.IRCBot.st
Microsoft:
backdoor:Win32/Graweg.B
McAfee:
IRC-Mocbot!MS06-040
Panda:
W32/Oscarbot.KD
Sophos:
W32/Cuebot-M
Symantec:
W32.Wargbot
Trend Micro:
WORM_IRCBOT.JK | CME-762 is a worm that opens an IRC back door on the compromised host. It
spreads by exploiting the Microsoft Windows Server Service Remote Buffer Overflow
Vulnerability (Microsoft Security Bulletin MS06-040). | 2006-08-14 |
CME-482 | Avira:
Worm/IRCBot.9609
Authentium:
W32/Ircbot.TU
CA:
Win32/Cuebot.J!Worm
ClamAV:
Trojan.IRCBot-689
ESET:
Win32/IRCBot.OO
Fortinet:
W32/Graweg.B!tr.bdr
Grisoft:
BackDoor.Generic3.GBC!CME-482
Kaspersky:
Backdoor.Win32.IRCBot.st
McAfee:
IRC-Mocbot!MS06-040
Microsoft:
backdoor:Win32/Graweg.A
Panda:
W32/Oscarbot.KD
Sophos:
W32/Cuebot-L
Symantec:
W32.Wargbot
Trend Micro:
WORM_IRCBOT.JL | CME-482 is a worm that opens an IRC back door on the compromised host. It
spreads by exploiting the Microsoft Windows Server Service Remote Buffer Overflow
Vulnerability (Microsoft Security Bulletin MS06-040). | 2006-08-14 |
CME-136 | Avira:
W2000M/Kukudro.C
Authentium:
W97M/Kukudro.C
CA:
W97M/Kukudro.B:trojan
ClamAV:
Trojan.Dropper.MSWord.MyNo-3
ESET:
W97M/TrojanDropper.Lafool.NAA
Fortinet:
WM/Kukudro.C
GRISOFT:
W97M/Kukudro
H+BEDV:
W2000M/Kukudro.C
Kaspersky:
Trojan-Dropper.MSWord.Lafool.j
McAfee:
W97M/Kukudro.c
Microsoft:
W97M/Kukudro.C!CME-136
Panda:
W97/Kukudro.C!CME-136
Sophos:
WM97/Kukudr-Fam
Symantec:
W97M.Kukudro.A | CME-136 is a Microsoft Word macro virus that drops a trojan onto the infected host. | 2006-06-29 |
CME-476 | Avira:
W2000M/Kukudro.B
Authentium:
W97M/Kukudro.B
CA:
W97M/Pricheck.B
ClamAV:
Trojan.Dropper.MSWord.MyNo-2
ESET:
W97M/TrojanDropper.Lafool.NAA
Fortinet:
WM/Kukudro.B
GRISOFT:
W97M/Kukudro
H+BEDV:
W2000M/Kukudro.B
Kaspersky:
Trojan-Dropper.MSWord.Lafool.j
McAfee:
W97M/Kukudro.b!CME-476
Microsoft:
W97M/Kukudro.B!CME-476
Panda:
W97/Kukudro.A
Sophos:
WM97/Kukudro-B
Symantec:
W97M.Kukudro.A
Trend Micro:
W97M_DLOADER.BVS | CME-476 is a Microsoft Word macro virus that drops a trojan onto the infected host. | 2006-06-28 |
CME-745 | Avira:
W2000M/Kukudro.A
Authentium:
W97M/Kukudro.A
CA eTrust InoculateIT:
W97M/Kukudr
ClamAV:
Trojan.Dropper.MSWord.MyNo-1
ESET:
W97M/TrojanDropper.Lafool.I
F-Secure:
Kukudro.A
Fortinet:
WM/Lafool.I!tr
GRISOFT:
W97/Kukudro
H+BEDV:
W2000M/Kukudro.A
Kaspersky:
Trojan-Dropper.MSWord.Lafool.i
McAfee:
W97M/Kukudro.a!CME-745
Microsoft:
W97M/Kukudro.A!CME-745
Norman:
W97M/Pricheck.A
Panda:
W97/Kukudro.A!CME-745
Sophos:
WM97/Kukudro-A
Symantec:
W97M.Kukudro.A
Trend Micro:
W97M_DLOADER.BKV | CME-745 is a Microsoft Word macro virus that drops a trojan onto the infected host. | 2006-06-28 |
CME-934 | Aladdin Knowledge Systems:
Win32.Agent.adu
Authentium:
W32/Downloader.SEL@dl
Avira:
TR/Dldr.Small.NIH
CA:
Win32/Clagger.Q
ClamAV:
Trojan.Downloader.Small-1133
ESET:
Win32/TrojanDownloader.Small.NIH
Fortinet:
W32/Small.NIJ!dldr
Grisoft:
Generic.QYK
H+BEDV:
TR/Dldr.Small.NIH
iDefense:
Agent.ACX
Kaspersky:
Trojan-Downloader:Win32.Agent.adu
McAfee:
Downloader-ATM!CME-934
Microsoft:
TrojanDownloader:Win32/Clagger.C!CME-934
Norman:
W32/Clagger.C
Panda:
Trj/Nabload.CC!CME-934
Sophos:
Troj/Clagger-K
Symantec:
PWSteal.Tarno.T
Trend Micro:
TROJ_CLAGGER.D | This is small Trojan downloader that downloads files and lowers security settings. It is spreading as an email attachment. | 2006-03-21 |
CME-4 | Authentium:
MacOS/Leap.A
Avira:
MacOS/Leap.A
CA:
OSX/Leap.A
ClamAV:
Trojan.Leap.A
ESET:
Mac/Leap.A
Fortinet:
OSX/Leap!worm
F-secure:
Leap.A
H+BEDV:
MacOS/Leap.A
Intego:
OSX/OOMP-A OR LEAP.A
McAfee:
OSX/Leap
Microsoft:
MacOS/Leap.A@mm!CME-4
Panda:
OSX/Oomp.A.worm
Sophos:
OSX/Leap-A
Symantec:
OSX.Leap.A
Trend Micro:
OSX_LEAP.A | This is a worm under Macintosh OS X that spreads via the iChat instant messaging application. | 2006-02-16 |
CME-328 | Aladdin Knowledge Systems:
Win32.Bagle.cl
Authentium:
W32/Bagle.DW@mm
AVIRA:
Worm/Bagle.FI
CA:
Win32/Bagle.DR
ClamAV:
Worm.Bagle.CP
ESET:
Win32/Bagle.FA
Fortinet:
W32/Bagle.DW-mm
F-Secure:
W32/Bagle.DW@mm
Grisoft:
I-Worm/Bagle generic
H+BEDV:
Worm/Bagle.FI
Kaspersky:
Email-Worm.Win32.Bagle.fj
McAfee:
W32/Bagle.dp@MM
Microsoft:
Win32/Bagle.X@mm!CME-328
Norman:
W32/Mitglied.PR
Panda:
W32/Bagle.GS.worm
Sophos:
Troj/BagleDl-BZ
Symantec:
W32.Beagle.DL@mm
TrendMicro:
WORM_BAGLE.CL | This is a "Bagle" mass-mailer which demonstrates typical "Bagle" behavior: it has a .ZIP file attachment, it contains a simple message subject/body, and it spreads to others. | 2006-02-06 |
CME-24 | Aladdin Knowledge Systems:
Win32.Blackmal.e
Authentium:
W32/Kapser.A@mm
AVIRA:
Worm/KillAV.GR
CA:
Win32/Blackmal.F
ESET:
Win32/VB.NEI
Fortinet:
W32/Grew.A!wm
F-Secure:
Nyxem.E
Grisoft:
Worm/Generic.FX
H+BEDV:
Worm/KillAV.GR
Kaspersky:
Email-Worm.Win32.Nyxem.e
McAfee:
W32/MyWife.d@MM
Microsoft:
Win32/Mywife.E@mm!CME-24
Norman:
W32/Small.KI
Panda:
W32/Tearec.A.worm
Sophos:
W32/Nyxem-D
Symantec:
W32.Blackmal.E@mm
TrendMicro:
WORM_GREW.A | This worm will destroy certain data files on an infected user's machine on Friday, February 3, 2006. Additional information can be found at: http://blogs.securiteam.com http://isc.sans.org/blackworm http://www.lurhq.com/blackworm.html | 2006-01-24 |
CME-503 | Authentium:
W32/Downloader.MQT
AVIRA:
TR/Dldr.Delf.qx
CA:
W32/Clagger Family
Fortinet:
W32/Ewojim!tr
Grisoft:
Downloader.Generic.POS
H+BEDV:
TR/Dldr.Delf.qx
Kaspersky:
Trojan-Downloader.Win32.Agent.ado
McAfee:
Downloader-ATM
Microsoft:
TrojanDownloader:Win32/Clagger.A!CME-503
Norman:
W32/DLoader.QSE
Panda:
Trj/Downloader.HGN!CME-503
Sophos:
Troj/Clagger-D
Symantec:
PWSteal.Tarno.R
TrendMicro:
TROJ_AGENT.APS | Trojan downloader that is spread as an attachment to a spam email and tries to download a password stealer. | 2006-01-20 |
CME-681 | CA:
Win32.Sober.W
F-Secure:
Sober.Y
Kaspersky:
Email-Worm.Win32.Sober.y
McAfee:
W32/Sober@MM!M681
Microsoft:
Win32/Sober.Z@mm!CME-681
Norman:
W32/Sober.AA@mm
Panda:
W32/Sober.AH.worm
Sophos:
W32/Sober-Z
Symantec:
W32.Sober.X@mm
Trend Micro:
WORM_SOBER.AG | A new variant of the Sober mass-mailing worm. | 2005-11-22 |
CME-157 | CA:
Win32.Sober.Q
F-Secure:
Sober.U
Kaspersky:
Email-Worm.Win32.Sober.u
McAfee:
W32/Sober.t
Microsoft:
Win32/Sober.V@mm!CME-157
Norman:
W32/Sober.T@mm
Panda:
W32/Sober.AD.worm
Sophos:
W32/Sober-U
Symantec:
W32.Sober.V@mm
Trend Micro:
WORM_SOBER.AD | A new variant of the Sober mass-mailing worm. | 2005-11-15 |
CME-589 | CA:
Win32.OutsBot.U
F-Secure:
Breplibot.b
Kaspersky:
Backdoor.Win32.Breplibot.b
McAfee:
W32/Brepibot!CME-589
Microsoft:
Backdoor:Win32/Ryknos.A!CME-589
Norman:
W32/Ryknos.A
Panda:
Bck/Ryknos.A
Sophos:
Troj/Stinx-E
Symantec:
Backdoor.Ryknos
Trend Micro:
BKDR_BREPLIBOT.C | A backdoor Trojan that is remotely controlled via Internet Relay Chat (IRC). It exploits Sony BMG Digital Rights Management (DRM) software to hide its presence. | 2005-11-10 |
CME-151 | CA:
Win32.Sober.P
F-Secure:
Sober.S
Kaspersky:
Email-Worm.Win.Sober.s
McAfee:
W32/Sober.r@MM
Microsoft:
Win32/Sober.S@mm!CME-151
Norman:
W32/Sober.R@mm
Panda:
Sober.Y
Sophos:
W32/Sober-O
Symantec:
W32.Sober.Q@mm
Trend Micro:
WORM_SOBER.AC | This is a mass-mailing worm that uses its own SMTP engine to spread. It sends itself as an email attachment that mimics an image file. | 2005-10-06 |
CME-15 | CA:
Win32.Tpbot.B
F-Secure:
Bozori.B
Kaspersky:
Net-Worm.Win32.Bozori.b
McAfee:
W32/Bozori.worm.b
Microsoft:
Worm:Win32/Zotob.F!CME-15
Norman:
W32/Bozori.B
Panda:
IRCbot.KD
Sophos:
W32/Zotob-F
Symantec:
W32.Zotob.F
Trend Micro:
WORM_ZOTOB.F | A worm that opens a back door and exploits the Microsoft Windows Plug and Play Buffer Overflow Vulnerability (described in Microsoft Security Bulletin MS05-039 at http://www.microsoft.com/technet/security/Bulletin/MS05-039.mspx) on TCP port 445. | 2005-08-25 |
CME-164 | CA:
Win32.Zotob.B
F-Secure:
Zotob.B
Kaspersky:
Net-Worm.Win32.Mytob.cf
McAfee:
W32/Zotob.worm.b
Microsoft:
Worm:Win32/Zotob.B!CME-164
Norman:
W32/Zotob.B
Panda:
Zotob.B
Sophos:
W32/Zotob-B
Symantec:
W32.Zotob.B
Trend Micro:
WORM_ZOTOB.B | A worm that spreads by exploiting Microsoft Windows Plug and Play Buffer Overflow Vulnerability (described in ). | 2005-08-25 |
CME-243 | CA:
Win32.Zotob.A
F-Secure:
Zotob.A
Kaspersky:
Net-Worm.Win32.Mytob.cd
McAfee:
W32/Zotob.worm
Microsoft:
Worm:Win32/Zotob.A!CME-243
Norman:
W32/Zotob.A
Panda:
Zotob.A
Sophos:
W32/Zotob-A
Symantec:
W32.Zotob.A
Trend Micro:
WORM_ZOTOB.A | A worm that opens a back door and exploits the Microsoft Windows Plug and Play Buffer Overflow Vulnerability (described in Microsoft Security Bulletin MS05-039 at http://www.microsoft.com/technet/security/Bulletin/MS05-039.mspx) on TCP port 445. | 2005-08-25 |
CME-284 | CA:
Win32.Esbot.C
F-Secure:
IRCBot.ex
Kaspersky:
Backdoor.Win32.IRCBot.ex
McAfee:
W32/Sdbot.worm.gen.by
Microsoft:
Worm:Win32/Esbot.B!CME-284
Norman:
W32/Esbot.B
Panda:
IRCbot.KG
Sophos:
W32/Hwbot-B
Symantec:
W32.Esbot.B
Trend Micro:
WORM_ESBOT.C | A worm that spreads by exploiting the Microsoft Windows Plug and Play Buffer Overflow Vulnerability (described in Microsoft Security Bulletin MS05-039 at http://www.microsoft.com/technet/security/Bulletin/MS05-039.mspx). | 2005-08-25 |
CME-354 | CA:
Win32.Esbot.A
Kaspersky:
Backdoor.Win32.IRCBot.es
McAfee:
W32/IRCbot.gen
Microsoft:
Worm:Win32/Esbot.A!CME-354
Norman:
Win32/IRCbot.BR
Panda:
IRCbot.KI
Sophos:
W32/Sdbot-ACG
Symantec:
W32.Esbot.A
Trend Micro:
WORM_ESBOT.A | A worm that spreads by exploiting the Microsoft Windows Plug and Play Buffer Overflow Vulnerability (described in Microsoft Security Bulletin MS05-039 http://www.microsoft.com/technet/security/Bulletin/MS05-039.mspx). | 2005-08-25 |
CME-419 | CA:
Win32.Qweasy.A
Kaspersky:
Backdoor.Win32.Surila.x
McAfee:
W32/Mydoom.bv@MM
Microsoft:
Win32/Bobax.O@mm!CME-419
Norman:
W32/Bobax.Q
Panda:
Antiemule.A
Sophos:
W32/MyDoom-Gen
Symantec:
W32.Bobax.AF@mm
Trend Micro:
WORM_BOBAX.AD | A mass-mailing worm that opens a back door, downloads remote files, and lowers security settings on the compromised computer. The worm spreads by exploiting the Microsoft Windows Plug and Play Buffer Overflow Vulnerability (as described in Microsoft Security Bulletin MS05-039 at http://www.microsoft.com/technet/security/Bulletin/MS05-039.mspx) and by sending a copy of itself to email addresses gathered. | 2005-08-25 |
CME-581 | CA:
Win32.Zotob.C
Kaspersky:
Net-Worm.Win32.Mytob.ch
McAfee:
W32/Zotob.worm.c
Microsoft:
Worm:Win32/Zotob.C!CME-581
Norman:
W32/Zotob.C
Panda:
Zotob.C
Sophos:
W32/Zotob-C
Symantec:
W32.Zotob.C@mm
Trend Micro:
WORM_ZOTOB.C | A mass-mailing worm that opens a back door and exploits the Microsoft Windows Plug and Play Buffer Overflow Vulnerability (as described in Microsoft Security Bulletin MS05-039 at http://www.microsoft.com/technet/security/Bulletin/MS05-039.mspx) on TCP port 445. | 2005-08-25 |
CME-637 | CA:
Win32.Drugtob.B
Kaspersky:
Backdoor.Win32.IRCBot.et
McAfee:
W32/Sdbot.worm!MS05-039
Microsoft:
Worm:Win32/Zotob.Q!CME-637
Norman:
W32/Zotob.D
Panda:
IRCbot.KE
Sophos:
W32/Dogbot-B
Symantec:
W32.Zotob.D
Trend Micro:
WORM_ZOTOB.D | A worm that opens a back door and exploits the Microsoft Windows Plug and Play Buffer Overflow Vulnerability (described Microsoft Security Bulletin MS05-039 at in http://www.microsoft.com/technet/security/Bulletin/MS05-039.mspx) on TCP port 445. | 2005-08-25 |
CME-702 | CA:
Win32.Drugtob.A
Kaspersky:
Backdoor.Win32.IRCBot.et
McAfee:
W32/Sdbot.worm.gen
Microsoft:
Worm:Win32/Zotob.D!CME-702
Norman:
SDBot.RTC
Panda:
IRCbot.JZ
Sophos:
W32/Sdbot-ACI
Symantec:
W32.Zotob.G
Trend Micro:
WORM_DRUDGEBOT.A | A worm that opens a back door and exploits the Microsoft Windows Plug and Play Buffer Overflow Vulnerability (described in Microsoft Security Bulletin MS05-039 http://www.microsoft.com/technet/security/Bulletin/MS05-039.mspx) on TCP port 445. | 2005-08-25 |
CME-540 | CA:
Win32.Tpbot.A
Kaspersky:
Net-Worm.Win32.Bozori.a
McAfee:
W32/Bozori.worm.a!CME-540
Microsoft:
Worm:Win32/Zotob.E!CME-540
Norman:
W32/Bozori.A
Panda:
IRCBot.KC
Sophos:
W32/Tpbot-A
Symantec:
W32.Zotob.E
Trend Micro:
WORM_ZOTOB.E | A worm that opens a back door and exploits the Microsoft Windows Plug and Play Buffer Overflow Vulnerability (described in Microsoft Security Bulletin MS05-039 at http://www.microsoft.com/technet/security/Bulletin/MS05-039.mspx) on TCP port 445. | 2005-08-17 |
CME-477 | CA:
Win32.Bagle.BP
Kaspersky:
Email-Worm.Win32.Bagle.bw
McAfee:
W32/Bagle.cb@MM
Microsoft:
Win32/Bagle.BA@mm!CME-477
Norman:
W32/Bagle.BO@mm
Panda:
Bagle.DO
Sophos:
W32/Bagle-BW
Symantec:
W32.Beagle.BY@mm
Trend Micro:
WORM_BAGLE.BM | A mass-mailing worm that uses its own SMTP engine to email copies of itself to addresses gathered from the compromised computer. The worm also opens a back door on TCP Port 9030 on the compromised computer. | 2005-08-04 |
CME-875 | CA:
Win32.Reatle.A
Kaspersky:
Net-Worm.Win32.Lebreat.c
McAfee:
W32/Reatle.gen@MM
Microsoft:
Win32/Reatle.A@mm!CME-875
Norman:
W32/Breatel.A
Panda:
Lebreat.C
Sophos:
W32/Lebreat-C
Symantec:
W32.Reatle@mm
Trend Micro:
WORM_REATLE.B | A mass-mailing worm that opens a back door and attempts to propagate by exploiting the Microsoft Windows Local Security Authority Service Remote Buffer Overflow (as described in Microsoft Security Bulletin MS04-011) on TCP port 445. | 2005-07-15 |
CME-96 | Kaspersky:
Trojan-Downloader.Win32.Delf.ri
McAfee:
Downloader-ACY
Microsoft:
Trojan:Win32/Delf.M!CME-96
Norman:
W32/DLoader.HIE
Panda:
Downloader.DNN
Sophos:
Troj/Dloader-QK
Trend Micro:
TROJ_DLOADER.UX | A trojan downloader. | 2005-07-14 |
CME-323 | CA:
Win32.Conferox
Kaspersky:
Trojan-Downloader.Win32.Small.arf
McAfee:
Downloader-YZ
Microsoft:
TrojanDownloader:Win32/Zayaho.A!CME-323
Norman:
W32/DLoader.GKR
Panda:
Downloader.DKC
Sophos:
Troj/Dloader-PZ
Symantec:
Download.Trojan
Trend Micro:
TROJ_SMALL.ALT | A password stealing trojan that downloads a dll, which is used to intercept user keystrokes. The collected data is posted to another web site. | 2005-07-08 |
CME-746 | CA:
Win32.SillyDl.RW
Kaspersky:
Trojan-Downloader.Win32.Small.bcf
McAfee:
Downloader-ABC
Microsoft:
TrojanDownloader:Win32/Small.BCF!CME-746
Norman:
W32/DLoader.GKV
Panda:
Downloader.DKD
Sophos:
Troj/Dloader-OQ
Symantec:
Download.Trojan
Trend Micro:
TROJ_SMALL.AME | A trojan downloader that downloads an executable from a malware Web site. | 2005-07-08 |
CME-402 | CA:
Win32.DlWreck
Kaspersky:
Trojan-Downloader.Win32.Vidlo.p
McAfee:
Downloader-ACS
Microsoft:
TrojanDownloader:Win32/Vildo.P!CME-402
Norman:
W32/Vidlo.P
Panda:
Agent.AAW
Sophos:
Troj/Vidlo-P
Symantec:
Download.Trojan
Trend Micro:
TROJ_DLOADER.RY | A trojan that downloads adware and spyware programs on the infected system. | 2005-07-04 |
CME-978 | Kaspersky:
Trojan-Downloader.Win32.Small.aon
McAfee:
Downloader-ACQ
Microsoft:
TrojanDownloader:Win32/Small.AON!CME-978
Panda:
Mitglieder.DV
Sophos:
Troj/Cifond-A
Trend Micro:
TROJ_SMALL.ALP | A trojan downloader that downloads malware from several different Internet addresses. | 2005-07-04 |
CME-766 | CA:
Win32.Glieder.AG
Kaspersky:
Email-Worm.Win32.Bagle.bo
McAfee:
W32/Bagle.dldr.gen
Microsoft:
TrojanDropper:Win32/Bagle.BK!CME-766
Microsoft:
TrojanDropper:Win32/Bagle.BL!CME-766
Microsoft:
TrojanDropper:Win32/Bagle.BM!CME-766
Microsoft:
TrojanDropper:Win32/Bagle.BN!CME-766
Microsoft:
TrojanDropper:Win32/Bagle.BO!CME-766
Microsoft:
TrojanDropper:Win32/Bagle.BP!CME-766
Microsoft:
TrojanDropper:Win32/Bagle.BQ!CME-766
Microsoft:
TrojanDropper:Win32/Bagle.BR!CME-766
Norman:
W32/Mitglied.HZ
Panda:
Mitglieder.DC
Sophos:
Troj/BagleDl-Q
Symantec:
Trojan.Tooso.L
Trend Micro:
TROJ_BAGLE.AR | A Trojan horse that interferes with the operation of security software by ending processes, stopping services, removing registry entries, and deleting files. | 2005-06-01 |
CME-456 | CA:
Win32.Sober.N
Kaspersky:
Email-Worm.Win32.Sober.p
McAfee:
W32/Sober.p@MM
Microsoft:
Win32/Sober.Q@mm!CME-456
Norman:
Sober.O@mm
Panda:
Sober.V
Sophos:
W32/Sober-N
Symantec:
W32.Sober.O@mm
Trend Micro:
WORM_SOBER.S | A mass-mailing worm that sends itself as an email attachment to addresses gathered from the compromised computer. It uses its own SMTP engine to spread. The email may be in either English or German. | 2005-05-02 |
CME-414 | CA:
Win32.Sober.M
Kaspersky:
Email-Worm.Win32.Sober.n
McAfee:
W32/Sober.o@MM!M414
Microsoft:
Win32/Sober.M@mm!CME-414
Norman:
Sober.N@mm
Panda:
Sober.U
Sophos:
W32/Sober-M
Symantec:
W32.Sober.N@mm
Trend Micro:
WORM_SOBER.N | A mass-mailing worm arrives in an email messages that is designed to trick users into thinking that someone else is receiving their email. | 2005-04-21 |
CME-901 | CA:
Win32.Mydoom.AZ
Kaspersky:
Email-Worm.Win32.Mydoom.am
McAfee:
W32/Mydoom.be@MM!zip
Microsoft:
Win32/Mydoom.AR@mm!CME-901
Norman:
MyDoom.AT@mm
Panda:
Mydoom.AR
Sophos:
W32/MyDoom-BC
Symantec:
W32.Mydoom.BA@mm
Trend Micro:
WORM_MYDOOM.BA | A variant of the Mydoom worm. It spreads via email through SMTP, gathering target recipients from the Windows Address Book, the Temporary Internet Files folder, and certain fixed drives. Notably, it skips email addresses that contain certain strings. | 2005-02-28 |
CME-245 | CA:
Win32.Bagle.AR
Kaspersky:
Email-Worm.Win32.Bagle.au
McAfee:
W32/Bagle.bd@MM
Microsoft:
Win32/Bagle.BD@mm!CME-245
Norman:
Bagle.AR@mm
Panda:
Bagle.BE
Sophos:
W32/Bagle-AU
Symantec:
W32.Beagle.AW@mm
Trend Micro:
WORM_BAGLE.AU | A worm that spreads as an attachment to an infected email. The worm harvests addresses from the local address book and installs a proxy server. This Bagle variant spreads either as Windows PE EXE file or a Windows Control Panel Applet (CPL) file, both about 20 KB in size. | 2004-11-22 |
CME-473 | CA:
Win32.Bagle.AQ
Kaspersky:
Email-Worm.Win32.Bagle.at
McAfee:
W32/Bagle.bb@MM
Microsoft:
Win32/Bagle.AS@mm!CME-473
Microsoft:
Win32/Bagle.AX@mm!CME-473
Norman:
Bagle.AQ@mm
Panda:
Bagle.BC
Sophos:
W32/Bagle-AU
Symantec:
W32.Beagle.AV@mm
Trend Micro:
WORM_BAGLE.AT | A variant of the Bagle worm. | 2004-11-22 |