|Detected||Feb 07 2011 12:18 GMT|
|Released||Feb 07 2011 19:54 GMT|
|Published||Mar 25 2011 10:46 GMT|
This Trojan downloads files from the Internet and launches them without the user's knowledge. It is a Java class file. It is 4588 bytes in size.
The malware is a component of a Trojan downloader from the "Trojan-Downloader.Java.OpenConnection" family and includes a class file named "bear", which downloads a file from the Internet, from a link sent to it, and launches the downloaded file for execution. The downloaded file is saved in the current user's temporary files directory as
The Trojan constitutes a Java applet. It is launched from an infected HTML page using an "<APPLET>" tag, for which an encrypted link to a downloadable file is sent in parameter named "pid".
As well as the above-mentioned class file, the Trojan contains "Unicode" and "UTF" class files. The "Unicode" class file includes "lopiyo" function, which is used to decrypt the link to a downloadable file. The "UTF" class file contains a code designed to exploit a vulnerability (CVE-2010-0840).
If your computer does not have antivirus protection and has been infected by this malicious program, follow the instructions below to delete it:
%Temporary Internet Files%
Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up.
Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page).
This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.