Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:14/03/2012
In the wild:No
Reported Infections:Low to medium
Distribution Potential:Low
Damage Potential:Low to medium
VDF version:
IVDF version:

 General Method of propagation:
   • No own spreading routine

   •  Kaspersky: Trojan-Downloader.JS.Expack.hc
   •  Bitdefender: Exploit.JS.AK
   •  Microsoft: Exploit:JS/Blacole.DC
   •  Grisoft: JS/Obfuscated
   •  GData: Exploit.JS.AK

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7

Side effects:
   • Can be used to execute malicious code
   • Downloads a file
   • Drive-by download
   • Drops a file

 Files It tries to download a file:

– The location is the following:
   • http://**********.**********.com/content/**********.jar
It is saved on the local hard drive under: %temp%\**********.class Furthermore this file gets executed after it was fully downloaded. Further investigation pointed out that this file is malware, too. Detected as: EXP/JAVA.Ternub.Gen

 Miscellaneous Accesses internet resources:
   • http://**********.**********.com/content/**********.php?f=5e91c
   • http://**********.**********.com/content/**********.jar

 File details Programming language:
 • JavaScript

Description inserted by Wensin Lee on Friday, March 16, 2012
Description updated by Wensin Lee on Friday, March 16, 2012

Back . . . .