English
The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

Trojan-Downloader.JS.Agent.mp

Detected Oct 12 2007 09:26 GMT
Released Oct 12 2007 09:26 GMT
Published Oct 22 2007 12:51 GMT

Technical Details
Payload
Removal instructions

Technical Details

This Trojan downloads other files via the Internet and launches them for execution on the victim machine without the user’s knowledge or consent. It is a JavaScript script. It is 9656 bytes in size.


Payload

Once launched, the Trojan injects its code into the memory of processes which have the following unique identifiers in the system registry:

{BD96C556-65A3-11D0-983A-00C04FC29E30}
{BD96C556-65A3-11D0-983A-00C04FC29E36}
{AB9BCEDD-EC7E-47E1-9322-D4A210617116}
{0006F033-0000-0000-C000-000000000046}
{0006F03A-0000-0000-C000-000000000046}
{6e32070a-766d-4ee6-879c-dc1fa91d2fc3}
{6414512B-B978-451D-A0D8-FCFDF33E833C}
{7F5B7F63-F06F-4331-8A26-339E03C0AE3D}
{06723E09-F4C2-43c8-8358-09FCD1DB0766}
{639F725F-1B2D-4831-A9FD-874847682010}
{BA018599-1DB3-44f9-83B4-461454C84BF8}
{D0C07D56-7C69-43F1-B4A0-25F5A11FAB19}
{E8CCCDDF-CA28-496b-B050-6C07C962476B}

The Trojan uses vulnerabilities in “WinZIP FileView”, “QuickTime” and “WebViewFolderIcon” (all Active X components) and in the Msdds.dll MS Internet Explorer library in order to execute random code on the victim machine.

The Trojan also uses a vulnerability in the ActiveX XMLHTTP component to download a file from the following URL:

http://69.228.192.***/file.php

At the moment of writing, this link was not working.

The Trojan exploits a vulnerability in the ADODB.Stream component in order to save the downloaded file to the C: disk as “sys.<rnd>.exe”:

Ñ:\sys<rnd>.exe

<rnd> are random Latin letters.

This file will also be saved to the Windows system directory as “~.exe”:

%System%\~.exe

and as “cpu.exe”:

%System%\cpu.exe

The file will also be saved to a directory one level higher than that where the original Trojan file is located as “tm.exe”.

The saved files are then launched for execution.


Removal instructions

If your computer does not have an up-to-date antivirus, or does not have an antivirus solution at all, follow the instructions below to delete the malicious program:

  1. Delete the original Trojan file (the location will depend on how the program originally penetrated the victim machine).
  2. Delete the following files:
    Ñ:\sys<rnd>.exe
    %System%\~.exe
    %System%\cpu.exe
    ../tm.exe
  3. Update your antivirus databases and perform a full scan of the computer (download a trial version of Kaspersky Anti-Virus).

Bookmark and Share
Share
Trojan-Downloader

Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up.

Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page).

This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.


Other versions