|Detected||Jul 03 2011 06:16 GMT|
|Released||Jul 03 2011 08:50 GMT|
|Published||Sep 26 2011 08:20 GMT|
A trojan program that downloads files from the Internet without the user's knowledge. This is a batch file command interpreter (BAT-file). 8326 bytes.
Using the "wget" utility, the trojan downloads a file from the internet from the following link:
http://tinyurl.com/6***9bcThe link did not work when creating the description.
The downloaded file is copied by the trojan under the following names:
c:\WINDOWS\system32\drivers\etc\hosts d:\WINDOWS\system32\drivers\etc\hosts e:\WINDOWS\system32\drivers\etc\hosts f:\WINDOWS\system32\drivers\etc\hosts g:\WINDOWS\system32\drivers\etc\hostsThe trojan therefore replaces the "hosts" system file if the operating system is installed on one of the indicated drives.
If your computer has not been protected with anti-virus software and has been infected with malware, you will need to take the following actions to delete this:
# (C) Microsoft Corp., 1993-1999 # # It is a sample HOSTS file using Microsoft TCP/IP for Windows. # # This file contains the mappings for the IP-address to the host names. # Each element should be located within a separate string. The IP-address should # be located in the first column, followed by the relevant name. # The IP-address and host name should be separated by at least one space. # # Moreover, some strings may contain comments # (details of the string). These should follow the name of the host and should be separated # from it by the '#' symbol. # # For example: # # 22.214.171.124 rhino.acme.com # source server # 126.96.36.199 x.acme.com # client host x 127.0.0.1 localhost
Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up.
Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page).
This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.