Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:16/03/2011
In the wild:No
Reported Infections:Low to medium
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:4.529 Bytes
MD5 checksum:a2ef213569671872716e955ff4f69264
VDF version:
IVDF version:

 General Method of propagation:
   • No own spreading routine

   •  Microsoft: TrojanDownloader:Java/OpenConnection.MV
   •  DrWeb: Exploit.Java.190

The file works interdependently with these components:
   •  JAVA/Exdoer.F

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7

Side effects:
   • Downloads a file
   • Lowers security settings

 Files – The location is the following:
   • %given parameter%
It is saved on the local hard drive under: %TEMPDIR%\%random numbers%\exe Furthermore this file gets executed after it was fully downloaded.

It tries to execute the following files:

– Filename:
   • l1.class

– Filename:
   • pl1.class
The file contains malicious code. Detected as: JAVA/Exdoer.F

 File details Programming language:
 • Java

Encrypted - The virus code inside the file is encrypted.

Description inserted by Alexander Bauer on Thursday, March 24, 2011
Description updated by Lutz Koch on Friday, March 25, 2011

Back . . . .