English
The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

Trojan-Downloader.HTML.Agent.wc

Detected Jun 17 2011 15:37 GMT
Released Jun 17 2011 17:35 GMT
Published Sep 26 2011 09:24 GMT

Technical Details
Payload
Removal instructions

Technical Details

A trojan program that downloads other software to the computer without the user's knowledge and launches this software for execution. It is Java Script (JS), located in an HTML document. 6184 bytes.


Payload

After opening the infected page in the browser, the trojan uses the Java Script to decipher its code. The trojan then opens the web resources located at the following URL in hidden frames:

http://p0***o.com/protektor/in.cgi?dogm1
http://195.***.13.98/alex/index.php
http://1-2times.com/check/versionl.php?t=578
The link did not work when creating the description.


Removal instructions

If your computer has not been protected with anti-virus software and has been infected with malware, you will need to take the following actions to delete this:

  1. Delete the original trojan file (its location on the infected computer will depend on how the program got onto the computer).
  2. Clear the Temporary Internet Files directory containing the infected files (How to delete infected files in the Temporary Internet Files folder?):
    %Temporary Internet Files%
  3. Run a full Kaspersky Antivirus scan of the computer with updated antivirus databases (download trial version).


    [MD5: adc50f5a8973cb81ad95ffc6c180f411] [SHA1: a6766ec494953d50ee1f0d6b70d963d4d8883159]


Bookmark and Share
Share
Trojan-Downloader

Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up.

Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page).

This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.


Other versions