|Detected||Jul 01 2009 10:59 GMT|
|Released||Jul 22 2009 14:51 GMT|
|Published||Sep 26 2011 12:40 GMT|
A trojan program that downloads other software to the computer without the user's knowledge and launches this software for execution. It is a HTML document containing Java Script. 16506 bytes.
After opening the infected page, the trojan uses Java Script to decipher the obfuscated code and then launches the malicious script for execution. If the trojan was launched in MS Internet Explorer – using ActiveX object "Microsoft.XMLHTTP", it tries to download the file from the following URL:
http://neiro***09.com/check/vers155.phpand then, using ActiveX object "ADODB.Stream", it saves the file under the following name:
%WinDir%\Fonts\iedr.exeFurthermore, using the vulnerability in MDAC (Microsoft Data Access Components) in ActiveX object "RDS.DataSpace" (MS06-014), and using ActiveX object "Microsoft.XMLHTTP", the trojan tries to download the file from the following URL:
http://neiro***09.com/check/vers155.php?q=2Using ActiveX object "ADODB.Stream", it saves the file under the following name:
%Temp%\ieur2.exeAfter successful download, the files are launched for execution. These links did not work when creating the description. The trojan then displays the following strings in the browser:
please check url Error: fzf
If your computer has not been protected with anti-virus software and has been infected with malware, you will need to take the following actions to delete this:
Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up.
Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page).
This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.