|Detected||Jun 26 2011 03:41 GMT|
|Released||Jun 26 2011 05:49 GMT|
|Published||Sep 08 2011 13:13 GMT|
After opening the infected page in the browser, the trojan uses Java Script tools to decipher the code and launch it for execution. Furthermore, a resource located at the following link will be opened in the hidden frame:
http://voh***h.in/index.php?tp=27a7adb6290c6b75Then, using the vulnerability in the installed browser, other malware may be downloaded from this site to the user's computer.
The link did not work when creating the description.
If your computer has not been protected with anti-virus software and has been infected with malware, you will need to take the following actions to delete this:
This type of behaviour covers malicious programs that delete, block, modify, or copy data, disrupt computer or network performance, but which cannot be classified under any of the behaviours identified above.
This classification also covers “multipurpose” Trojan programs, i.e. those that are capable of conducting several actions at once and which demonstrate several Trojan behaviours in a single program. This means they cannot be indisputably classified as having any single behaviour.