Parent class: TrojWare
Trojans are malicious programs that perform actions which are not authorized by the user: they delete, block, modify or copy data, and they disrupt the performance of computers or computer networks. Unlike viruses and worms, the threats that fall into this category are unable to make copies of themselves or self-replicate. Trojans are classified according to the type of action they perform on an infected computer.Class: Trojan-Downloader
Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up. Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page). This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.Read more
Platform: JS
JavaScript (JS) is a prototype-based programming language. JavaScript has traditionally been implemented as an interpreted language. The most common use is in web browsers, where it is used for scripting to add interactivity to web pages.Description
Technical Details
This Trojan downloads other malicious programs to the victim machine. It is written in Java Script, and is between 1 - 3KB in size. The program code may be encoded using Jscript.Encode.
Payload
The Trojan downloads and launches other Trojans on the victim machine without the user's knowledge or consent. In order to do this, it exploits several HTML vulnerabilities: CAN-2002-0077(Exploit.HTML.CodeBaseExec), CAN-2004-0380 (Exploit.HTML.Mht), XMLHTTP è ADODB Stream. Which vulnerability is exploited will depend on the version of the operating system used.
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!