JAVA_EXPLOIT.NZ
Exploit:Java/CVE-2012-1723.AC (Microsoft), Exploit.Java.CVE-2012-0507.nh (Kaspersky), Java/Exploit.CVE-2012-0507.DA trojan (ESET), Troj/Java-GX (Sophos)
Windows 2000, Windows XP, Windows Server 2003
Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Trojan may be hosted on a website and run when a user accesses the said website.
It requires its main component to successfully perform its intended routine.
TECHNICAL DETAILS
Arrival Details
This Trojan may be hosted on a website and run when a user accesses the said website.
Download Routine
This Trojan saves the files it downloads using the following names:
- %User Temp%\{Random File Name}.exe
(Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003.)
Other Details
This Trojan requires its main component to successfully perform its intended routine.
NOTES:
This is a Java class file that is used to execute an exploit code. Once successful, it may download a possibly malicious file from a certain URL.
The URL where this malware downloads the said file depends on the parameter passed on to it by its components.