English
The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

Trojan-Downloader.MSIL.Tiny.bs

Detected Feb 09 2011 04:57 GMT
Released Feb 09 2011 10:36 GMT
Published Apr 15 2011 09:04 GMT

Manual description Auto description
This description was created by experts at Kaspersky Lab. It contains the most accurate information available about this program.

Technical Details
Payload
Removal instructions

Technical Details

This Trojan downloads other malicious programs from the Internet and launches them for execution without the user's knowledge. It is a Windows .Net application (PE EXE file). It is 6656 bytes in size. It is written in Visual Basic .Net.


Payload

Once launched, the Trojan downloads a file from the following link:

http://active***ve.com/ActiveX.exe
At the time of writing, this link was inactive.

The downloaded file is saved in the current user's temporary directory under the name:

%Temp%\tempfile.exe
The Trojan then launches this file for execution and ceases running.


Removal instructions

If your computer does not have antivirus protection and has been infected by this malicious program, follow the instructions below to delete it:

  1. Delete the following file:
    %Temp%\tempfile.exe
  2. Delete the original Trojan file (its location will depend on how the program originally penetrated the infected computer).
  3. Perform a full scan of the computer using Kaspersky Anti-Virus with up-to-date antivirus databases (download a trial version).


MD5: 22f4b65bcd10bdd47fdab3feedfe748b
SHA1: 62b17d52912f8d5478eb1bec3c0d4738f543f701


Bookmark and Share
Share
Trojan-Downloader

Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up.

Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page).

This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.