The Internet threat alert status is currently normal. At present, no major epidemics or other serious incidents have been recorded by Kaspersky Lab’s monitoring service. Internet threat level: 1


Detected Jul 15 2011 05:41 GMT
Released Jul 15 2011 07:36 GMT
Published Sep 19 2011 09:21 GMT

Technical Details
Removal instructions

Technical Details

An exploit that uses the vulnerabilities in Adobe – Reader and Acrobat products for its implementation on the user's computer. The file is an XFA (XML Forms Architecture) containing malicious Java Script. 71226 bytes.


The malicious XFA form content is initialized and launched after opening a specially created infected PDF document containing this form. As the "initialize" event handler in the XFA form, it uses obfuscated malicious Java Script. After removing the obfuscation, the trojan uses the vulnerability which arises on account of over-filling the buffer when incorrectly processing arguments in "libtiff.dll" (CVE-2010-0188) to download the file located at the following link:

http://879y2384g***z.cc/k.php?f=23&e=6<recurring_symbols_in an_unknown_encoding>
The trojan then saves the file in the browser's temporary file directory:
%Temporary Internet Files%\<name of_temporary_file>
After successfully saving the file, the infected file is then launched for execution. The link did not work when creating the description. Vulnerable products include Adobe Reader and Acrobat 8 (up to version 8.2.1) and 9 (up to version 9.3.1).

Removal instructions

If your computer has not been protected with anti-virus software and has been infected with malware, you will need to take the following actions to delete this:

  1. Delete the original exploit file (its location on the infected computer will depend on how the program got onto the computer).
  2. Clear the Temporary Internet Files directory containing the infected files (How to delete infected files in the Temporary Internet Files folder?):
    %Temporary Internet Files%
  3. Update Adobe Reader and Acrobat or install updates:
  4. Run a full Kaspersky Antivirus scan of the computer with updated antivirus databases (download trial version).

MD5: 77fe4c4517cf658cd092de5d9aace1f9M
SHA1: d57fb13ac129dd8ad2c9ccaa992bd779c378c9fd

Bookmark and Share

Exploits are programs that contain data or executable code which take advantage of one or more vulnerabilities in software running on a local or remote computer for clearly malicious purposes.

Often, malicious users employ an exploit to penetrate a victim computer in order to subsequently install malicious code (for example, to infect all visitors to a compromised website with a malicious program). Additionally, exploits are commonly used by Net-Worms in order to hack a victim computer without any action being required from the user.

Nuker programs are notable among exploits; such programs send specially crafted requests to local or remote computers, causing the system to crash.

Other versions


Exploit.JS.Pdfka.egq (Kaspersky Lab) is also known as:

  • Trojan: Exploit-PDF.qd.gen (McAfee)
  • Sus/PDFJs-K (Sophos)
  • Exploit:Win32/Pdfjsc.RF (MS(OneCare))
  • Exploit.PDF.2458 (DrWeb)
  • Exploit.PDF-JS.Gen (BitDef7)
  • JS:Pdfka-BAH [Expl] (AVAST)
  • Virus.PDF.Exploit (Ikarus)
  • Script/PDF.Exploit (AVG)
  • EXP/Pidief.hhg (AVIRA)
  • PDF/Exploit.WB (Norman)
  • PDF:Exploit.PDF-JS.DG [Aquarius] (FSecure)
  • Exploit.PDF-JS.Gen (v) (Sunbelt)