Step-by-Step Malware Removal Instructions

MLF Ransomware
Ransomware

MLF Ransomware

Our research team discovered the MLF ransomware-type program while inspecting new submissions to VirusTotal. Additionally, MLF belongs to the Phobos ransomware family. Once a sample of this ransomware was executed on our test machine, it encrypted files and altered their filenames. The titles of

TigerRAT Malware
Trojan

TigerRAT Malware

TigerRAT is a Remote Access Trojan (RAT). This malware operates by allowing attackers to remotely access and control infected machines. RATs are notoriously multifunctional programs, which can be variously used and cause a broad range of serious threats. There is proof that TigerRAT was developed

MagicRAT Malware
Trojan

MagicRAT Malware

MagicRAT is a malicious program classified as a RAT (Remote Access Trojan). This trojan is written C++ programming language and uses the Qt Framework; the latter is an uncommon choice in malware development. RATs are designed to enable remote access/control over infected devices. There is strong

TabX Browser Hijacker
Browser Hijacker

TabX Browser Hijacker

Our research team discovered a website promoting the TabX browser extension while inspecting dubious pages. After analyzing this piece of software, we determined that it operates as a browser hijacker promoting the newtaber.com fake search engine. TabX assigns newtaber.com as browsers' hom

Coinlocker Ransomware
Ransomware

Coinlocker Ransomware

While investigating new submissions to VirusTotal, we discovered the Coinlocker ransomware-type program. Malware within this classification encrypts data and demands payment for decryption. After we executed a sample of Coinlocker on our test machine, it encrypted files and appended their filenam

Tail doing Browser Hijacker
Browser Hijacker

Tail doing Browser Hijacker

Our researchers discovered the "Tail doing" browser extension while investigating suspicious software endorsing websites. After analyzing this extension, we determined that it is a browser hijacker. Tail doing modifies browsers to promote the tailsearch.com fake search engine. Additionally, this b

You Have 3 Encrypted Documents Email Scam
Phishing/Scam

You Have 3 Encrypted Documents Email Scam

After inspecting the "You Have 3 Encrypted Documents" email, we determined that it is spam. Letters of this spam campaign operate as phishing scams. By claiming that recipients have been sent secured files, the mail attempts to trick users into disclosing their email account log-in credentials.

Ourwowspot.com Ads
Notification Spam

Ourwowspot.com Ads

Our research team found the ourwowspot[.]com browser notification spam promoting webpage while inspecting untrustworthy sites. In addition to attempting to deceive visitors into allowing it to deliver notifications, this page can also redirect them to other (likely untrustworthy/malicious) website

Bobik Malware
Trojan

Bobik Malware

Bobik is a piece of malicious software classified as a RAT (Remote Access Trojan). These trojans are designed to enable remote access/control over infected machines. Bobik can perform various malicious activities, which include - causing chain infections, stealing data, and adding compromised devi

Stream-trust.xyz Ads
Notification Spam

Stream-trust.xyz Ads

Our researchers found the stream-trust[.]xyz rogue page during a routine investigation of dubious websites. This webpage is designed to push browser notification spam and redirect visitors to different (likely deceptive/malicious) sites. Users typically enter stream-trust[.]xyz and similar websit