JAVA_DLOADR.YYSPN
Windows, Linux, Mac OS
Threat Type: Trojan
Destructiveness: No
Encrypted: No
In the wild: Yes
OVERVIEW
Downloaded from the Internet
This Trojan may be hosted on a website and run when a user accesses the said website.
TECHNICAL DETAILS
1,585 bytes
Script
No
18 Apr 2016
Connects to URLs/IPs
Arrival Details
This Trojan may be hosted on a website and run when a user accesses the said website.
Installation
This Trojan adds the following processes:
- If running in Windows environment:
- cmd.exe /c taskkill /F java.exe
- cmd.exe /c taskkill /F javaw.exe
- cmd.exe /c javaw -cp %temp%\jb.jar Client
- cmd.exe /c javaw -cp %temp%\javaws.jar Client
- If running in Non-Windows environment:
- /bin/sh -c killall -9 java
- /bin/sh -c java -cp {Temporary directory}/jb.jar Client
- /bin/sh -c java -cp {Temporary directory}/javaws.jar Client
Download Routine
This Trojan connects to the following website(s) to download and execute a malicious file:
- http://{BLOCKED}.{BLOCKED}.129.106/jb.jar
- http://{BLOCKED}.{BLOCKED}.144.58/javaws.jar
It saves the files it downloads using the following names:
- %temp%\jb.jar
- %temp%\javaws.jar
- {Temporary directory}/jb.jar-For Non-Windows environment
- {Temporary directory}/javaws.jar-For Non-Windows environment
SOLUTION
9.800
12.860.06
26 Oct 2016
12.861.00
27 Oct 2016
Step 1
Before doing any scans, Windows XP, Windows Vista, and Windows 7 users must disable System Restore to allow full scanning of their computers.
Step 2
Note that not all files, folders, and registry keys and entries are installed on your computer during this malware's/spyware's/grayware's execution. This may be due to incomplete installation or other operating system conditions. If you do not find the same files/folders/registry information, please proceed to the next step.
Step 3
Search and delete these files
Step 4
Scan your computer with your Trend Micro product to delete files detected as JAVA_DLOADR.YYSPN. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.
NOTES:
For Non-Windows platform:
Step 1
Delete the files using the noted path and file name. In the same Terminal, type the following commands:
- sudo rm -R "{Temporary directory}/jb.jar”
- sudo rm -R "{Temporary directory}/javaws.jar”
If the files are not present, you may proceed to last step.
Step 2
Scan your computer with your Trend Micro product to delete files detected as JAVA_DLOADR.YYSPN. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files.
Did this description help? Tell us how we did.