Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:10/03/2011
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:5.313 Bytes
MD5 checksum:284d62bd1418a509b42b416fa20B2e03
VDF version:
IVDF version:

 General Method of propagation:
   • No own spreading routine

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7

Side effects:
   • Downloads a file
   • Lowers security settings

 Files It tries to download a file:

– The location is the following:
   • %given parameter%
It is saved on the local hard drive under: %TEMPDIR%\%random numbers%.exe Furthermore this file gets executed after it was fully downloaded.

It tries to execute the following files:

– Filename:
   • Stremer.class
The file contains malicious code. Detected as: JAVA/Exdoer.C

– Filename:
   • Glockner.class

– Filename:
   • purok$1.class

 File details Programming language:
 • Java

Encrypted - The virus code inside the file is encrypted.

Description inserted by Alexander Bauer on Monday, March 14, 2011
Description updated by Alexander Bauer on Monday, March 14, 2011

Back . . . .