Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:10/04/2012
In the wild:No
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Low to medium
VDF version: - Tuesday, April 10, 2012
IVDF version: - Tuesday, April 10, 2012

 General Method of propagation:
   • No own spreading routine

   •  Mcafee: JS/Exploit-Blacole.q!htm
   •  Kaspersky: Trojan-Downloader.JS.Expack.ks
   •  Bitdefender: Trojan.JS.Agent.FPY
   •  Grisoft: Script/Exploit.Kit
   •  Eset: JS/Kryptik.MK trojan
     GData: Trojan.JS.Agent.FPY
     DrWeb: Exploit.BlackHole.16

Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
    Windows Vista
    Windows Server 2008
    Windows 7

Side effects:
    Can be used to execute malicious code
   • Downloads malicious files
    Redirects to an infected website

 Files It tries to download a file:

The location is the following:
   • http://**********.**********.218.181/data/**********.jar?a=1

 Miscellaneous Internet connection:
In order to check for its internet connection the following DNS server is contacted:
   • jmservice.**********.ws

 File details Programming language:
 • JavaScript

Description inserted by Wensin Lee on Monday, April 16, 2012
Description updated by Wensin Lee on Monday, April 16, 2012

Back . . . .