|Detected||Mar 19 2010 12:33 GMT|
|Released||Mar 19 2010 17:05 GMT|
|Published||Dec 22 2010 13:18 GMT|
When an infected page is opened, the Trojan decrypts itself using Java Script tools and launches its malicious code for execution. The HTML document that opens contains an embedded hidden frame in which the Trojan attempts to open the following web resource:
If your computer does not have an up-to-date antivirus, or does not have an antivirus solution at all, follow the instructions below to delete the malicious program:
Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up.
Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page).
This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.