Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:10/04/2012
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low to medium
VDF version:
IVDF version:

 General Method of propagation:
   • No own spreading routine

   •  Mcafee: JS/Exploit-Blacole.q!htm
   •  Kaspersky: Trojan-Downloader.JS.Expack.ks
   •  Bitdefender: Trojan.JS.Agent.FPY
   •  Grisoft: Script/Exploit.Kit
   •  Eset: JS/Kryptik.MK trojan
   •  GData: Trojan.JS.Agent.FPY
   •  DrWeb: Exploit.BlackHole.16

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7

Side effects:
   • Can be used to execute malicious code
   • Downloads malicious files
   • Redirects to an infected website

 Files It tries to download a file:

– The location is the following:
   • http://**********.**********.218.181/data/**********.jar?a=1

 Miscellaneous Internet connection:
In order to check for its internet connection the following DNS server is contacted:
   • jmservice.**********.ws

 File details Programming language:
 • JavaScript

Description inserted by Wensin Lee on Monday, April 16, 2012
Description updated by Wensin Lee on Monday, April 16, 2012

Back . . . .