Class
Trojan-Downloader
Platform
JS

Parent class: TrojWare

Trojans are malicious programs that perform actions which are not authorized by the user: they delete, block, modify or copy data, and they disrupt the performance of computers or computer networks. Unlike viruses and worms, the threats that fall into this category are unable to make copies of themselves or self-replicate. Trojans are classified according to the type of action they perform on an infected computer.

Class: Trojan-Downloader

Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up. Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page). This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.

Read more

Platform: JS

JavaScript (JS) is a prototype-based programming language. JavaScript has traditionally been implemented as an interpreted language. The most common use is in web browsers, where it is used for scripting to add interactivity to web pages.

Description

Technical Details

This Trojan downloads other malicious programs to the victim machine. It is written in Java Script, and is between 1 - 3KB in size. The program code may be encoded using Jscript.Encode.

Payload

The Trojan downloads and launches other Trojans on the victim machine without the user's knowledge or consent. In order to do this, it exploits several HTML vulnerabilities: CAN-2002-0077(Exploit.HTML.CodeBaseExec), CAN-2004-0380 (Exploit.HTML.Mht), XMLHTTP è ADODB Stream. Which vulnerability is exploited will depend on the version of the operating system used.

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.