Detect date
06/16/2011
Class
Exploit
Platform
Java

Parent class: Malware

Malicious tools are malicious programs designed to automatically create viruses, worms, or Trojans, conduct DoS attacks on remote servers, hack other computers, etc. Unlike viruses, worms, and Trojans, malware in this subclass does not present a direct threat to the computer it runs on, and the program’s malicious payload is only delivered on the direct order of the user.

Read more

Class: Exploit

Exploits are programs that contain data or executable code which take advantage of one or more vulnerabilities in software running on a local or remote computer for clearly malicious purposes. Often, malicious users employ an exploit to penetrate a victim computer in order to subsequently install malicious code (for example, to infect all visitors to a compromised website with a malicious program). Additionally, exploits are commonly used by Net-Worms in order to hack a victim computer without any action being required from the user. Nuker programs are notable among exploits; such programs send specially crafted requests to local or remote computers, causing the system to crash.

Read more

Platform: Java

Java is a platform for developing and running programs written in the Java programming language.

Description

The malware is a component of a Trojan downloader and includes a class file named "translator", which downloads a file from the Internet, from a link sent to it, and launches the downloaded file for execution. The downloaded file is saved in the current user's temporary files directory as %Temp%<rnd>.exe where <rnd> is a random fractional decimal number between 0 and 1. Before downloading, the malware checks the name of the OS installed on the infected system. If the OS is not Windows, the download does not take place.

The Trojan constitutes a Java applet. It is launched from an infected HTML page using the "<APPLET>" tag, for which an encrypted link to a downloadable file is sent in parameter named "hint".

As well as the above-mentioned class file, the Trojan contains class files named "ISO" and "UTF". The "ISO" class file includes the "sikilda" function, which is used to decrypt the link to a downloadable file. The "UTF" class file contains a code designed to exploit a vulnerability (CVE-2010-0840). JDK and JRE up to version 6, 18th update, are vulnerable. This vulnerability appears due to improper verification when executing privileged methods in Java Runtime Environment; this enables the malicious user to execute a random code with a specially modified object, which is a subclass file of the trusted class file.

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.