Class
Trojan
Platform
Win32

Parent class: TrojWare

Trojans are malicious programs that perform actions which are not authorized by the user: they delete, block, modify or copy data, and they disrupt the performance of computers or computer networks. Unlike viruses and worms, the threats that fall into this category are unable to make copies of themselves or self-replicate. Trojans are classified according to the type of action they perform on an infected computer.

Class: Trojan

A malicious program designed to electronically spy on the user’s activities (intercept keyboard input, take screenshots, capture a list of active applications, etc.). The collected information is sent to the cybercriminal by various means, including email, FTP, and HTTP (by sending data in a request).

Read more

Platform: Win32

Win32 is an API on Windows NT-based operating systems (Windows XP, Windows 7, etc.) that supports execution of 32-bit applications. One of the most widespread programming platforms in the world.

Description

Technical Details

This text was written by Alexey Podrezov, F-Secure Corp.

This Trojan horse installs a screensaver and doesn't allow it to be removed. This is quite annoying, and the screensaver should be detected as a Trojan.

Upon being run, it will unpack several files and run the BAT installer. The BAT file copies the WAV file to the Temp directory and plays it with Media Player. At the same time, the HOT.EXE file is run. This file copies the screensaver DIVJA.SCR, ACTIVE.EXE, ACTIVE.LNK, ANIGIF.OCX and MSVBVM60.DLL to WindowsSystem folder, registers DIVJA.SCR as a default screensaver (in SYSTEM.INI) and adds an execution of ACTIVE.LNK to the Windows Registry so it will run each time. The files are also backed up as MNZ?.DLL.

Even if you remove the screensaver from the Control Panel, upon next system reboot, the LNK file will start an ACTIVE.EXE file and the screensaver will be active again.

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.