Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:14/03/2012
In the wild:No
Reported Infections:Low to medium
Distribution Potential:Low
Damage Potential:Low to medium
VDF version: - Wednesday, March 14, 2012
IVDF version: - Wednesday, March 14, 2012

 General Method of propagation:
   • No own spreading routine

   •  Kaspersky: Trojan-Downloader.JS.Expack.hc
   •  Bitdefender: Exploit.JS.AK
     Microsoft: Exploit:JS/Blacole.DC
   •  Grisoft: JS/Obfuscated
     GData: Exploit.JS.AK

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows Server 2008
    Windows 7

Side effects:
    Can be used to execute malicious code
   • Downloads a file
    Drive-by download
   • Drops a file

 Files It tries to download a file:

The location is the following:
   • http://**********.**********.com/content/**********.jar
It is saved on the local hard drive under: %temp%\**********.class Furthermore this file gets executed after it was fully downloaded. Further investigation pointed out that this file is malware, too. Detected as: EXP/JAVA.Ternub.Gen

 Miscellaneous Accesses internet resources:
   • http://**********.**********.com/content/**********.php?f=5e91c
   • http://**********.**********.com/content/**********.jar

 File details Programming language:
 • JavaScript

Description inserted by Wensin Lee on Friday, March 16, 2012
Description updated by Wensin Lee on Friday, March 16, 2012

Back . . . .