English
The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

Trojan-Downloader.Win32.VB.aiqx

Detected May 27 2011 21:45 GMT
Released May 28 2011 03:08 GMT
Published Sep 09 2011 16:19 GMT

Manual description Auto description
This description was created by experts at Kaspersky Lab. It contains the most accurate information available about this program.

Technical Details
Payload
Removal instructions

Technical Details

A trojan program that downloads files from the internet without the user's knowledge and launches them. It is a Windows application (PE-EXE file). 7680 bytes. UPX packed. Its unpacked size is around 20 kB. Written in Visual Basic.


Payload

When launching, the trojan downloads a file from the internet using the following link:


http://<rnd>.***heker.com
Where <rnd> is a random sequence of digits.

The link did not work when creating the description. The downloaded file is saved in the current user's temporary file directory under the following name:

%Temp%\98281981358936404.exe
The downloaded file is then launched and the trojan shuts down.


Removal instructions

If your computer has not been protected with anti-virus software and has been infected with malware, you will need to take the following actions to delete this:

  1. Delete the original program file (its location on the infected computer will depend on how the program got onto the computer).
  2. Delete the following file:
    %Temp%\98281981358936404.exe
  3. Run a full Kaspersky Antivirus scan of the computer with updated antivirus databases (download trial version).


Bookmark and Share
Share
Trojan-Downloader

Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up.

Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page).

This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.


Other versions