Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:16/03/2011
In the wild:No
Reported Infections:Low to medium
Distribution Potential:Low
Damage Potential:Low to medium
Static file:Yes
File size:4.529 Bytes
MD5 checksum:a2ef213569671872716e955ff4f69264
VDF version:
IVDF version: - Wednesday, March 16, 2011

 General Method of propagation:
   • No own spreading routine

     Microsoft: TrojanDownloader:Java/OpenConnection.MV
     DrWeb: Exploit.Java.190

The file works interdependently with these components:

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows Server 2008
    Windows 7

Side effects:
   • Downloads a file
   • Lowers security settings

 Files  The location is the following:
   • %given parameter%
It is saved on the local hard drive under: %TEMPDIR%\%random numbers%\exe Furthermore this file gets executed after it was fully downloaded.

It tries to execute the following files:

   • l1.class

   • pl1.class
The file contains malicious code. Detected as: JAVA/Exdoer.F

 File details Programming language:
 • Java

Encrypted - The virus code inside the file is encrypted.

Description inserted by Alexander Bauer on Thursday, March 24, 2011
Description updated by Lutz Koch on Friday, March 25, 2011

Back . . . .