JS_DLOADR.ABO
Windows 2000, Windows XP, Windows Server 2003
Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
Downloaded from the Internet
Trend Micro has received multiple samples of this JavaScript (JS) malware from multiple, independent sources, including customer reports and internal sources. These indicate that this script poses a high risk to users due to the increased possibility of infection.
This Trojan may be hosted on a website and run when a user accesses the said website.
TECHNICAL DETAILS
5,260 bytes
Yes
26 Jun 2009
Downloads files
Arrival Details
This Trojan may be hosted on a website and run when a user accesses the said website.
It may be downloaded from the following remote sites:
- http://{BLOCKED}9.cn/d/all.htm
NOTES:
Upon execution, it attempts to connect to the following URL to download other scripts:
- http://{BLOCKED}9.cn/d/b.htm - inaccessible
It then checks if the affected system's Internet browser is Internet Explorer 7. If so, it then connects to a certain URL to download a malicious script detected as JS_DLOADR.RE. Furthermore, it connects to the following URLs to download other scripts:
- http://{BLOCKED}9.cn/d/0.htm - detected as JS_DLOADR.ACF
- http://{BLOCKED}9.cn/d/1.htm - detected as JS_DLOADR.ACE
- http://{BLOCKED}9.cn/d/5.htm - detected as JS_DLOADR.ABP
It then checks for ActiveX controls and downloads other malicious scripts based on the installed ActiveX controls:
- Ourgame 'GLIEDown2.dll' ActiveX Control:
http://{BLOCKED}9.cn/d/newlz.htm - detected as JS_DLOADR.ACC - Sina Downloader.DLoader.1 ActiveX Control:
http://{BLOCKED}9.cn/d/s.htm - detected as JS_DLOADR.ACD - Microsoft Office Snapshot Viewer ActiveX Control:
http://{BLOCKED}9.cn/d/office.htm - detected as JS_DLOADR.ABZ - Baofeng Storm MPS.StormPlayer.1 ActiveX control:
http://{BLOCKED}9.cn/d/bf.htm - detected as JS_DLOADR.ABW - SSReader Pdg2 Control ActiveX:
http://{BLOCKED}9.cn/d/cx.htm - detected as JS_DLOADR.ABY - UUUpgrade ActiveX Control:
http://{BLOCKED}9.cn/d/uu.htm - detected as JS_DLOADR.ABU - Ourgame GLWorld HanGamePluginCn18 Class ActiveX Control:
http://{BLOCKED}9.cn/d/2.htm - detected as JS_DLOADR.ABV - RealPlayer IERPCtl.IERPCtl.1 AciveX Control:
http://{BLOCKED}9.cn/d/3.htm - detected as JS_DLOADR.ABQ
http://{BLOCKED}9.cn/d/4.htm - detected as JS_DLOADR.ABS
SOLUTION
9.200
5.872.02
26 Feb 2009
5.873.00
27 Feb 2009
Step 1
For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.
Step 2
Remove malware/grayware files dropped/downloaded by JS_DLOADR.ABO
- JS_AGENT.AWMU
- JS_DLOADR.RE
- JS_DLOADR.ACF
- JS_DLOADR.ACE
- JS_DLOADR.ABP
- JS_DLOADR.ACC
- JS_DLOADR.ACD
- JS_DLOADR.ABZ
- JS_DLOADR.ABW
- JS_DLOADR.ABY
- JS_DLOADR.ABU
- JS_DLOADR.ABV
- JS_DLOADR.ABQ
- JS_DLOADR.ABS
Step 3
Close all opened browser windows
Step 4
Scan your computer with your Trend Micro product to delete files detected as JS_DLOADR.ABO. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.
Did this description help? Tell us how we did.