English
The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1

Trojan-Downloader.JS.Agent.gdc

Detected Jul 05 2011 04:09 GMT
Released Jul 05 2011 05:48 GMT
Published Sep 26 2011 15:01 GMT

Technical Details
Payload
Removal instructions

Technical Details

A trojan program that downloads other software to the computer without the user's knowledge and launches this software for execution. It is a HTML document containing Java Script. 5369 bytes.


Payload

After opening the malicious HTML page in the browser, the user is prompted to view content of a pornographic nature. "Cookies" named "protect" and "Teen Movies" are installed on the user's browser for an indefinite period. After clicking on one of the proposed films, a file located at the following link is downloaded from the attacker's site:

http://<domain_name_of attacker's_site>/2/video/porno-rolik2.avi.exe
The link did not work when creating the description.

When trying to close or refresh the opened page, the following message is displayed:

Download speed: 571 kb/sec


Removal instructions

If your computer has not been protected with anti-virus software and has been infected with malware, you will need to take the following actions to delete this:

  1. Delete the original trojan file (its location on the infected computer will depend on how the program got onto the computer).
  2. Clear the Temporary Internet Files directory which may contain infected files (How to delete infected files in the Temporary Internet Files folder?).
  3. Run a full Kaspersky Antivirus scan of the computer with updated antivirus databases (download trial version).


MD5: e1dfcf3e0a334c2b64cc29b7d5ebd245
SHA1: 3e17367d933d7a72387508ce3bb3faeefadc1013


Bookmark and Share
Share
Trojan-Downloader

Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up.

Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page).

This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.


Other versions