JS_IFRAME.WWT
Trojan-Downloader.JS.Agent.fxs, Trojan-Downloader.JS.Agent.fxs (Kaspersky), [00000c4d.js]:JS/Exploit-Blacole.cr (NAI), Mal/Iframe-W (Sophos), Trojan.JS.Obfuscator.aa (v) (Sunbelt), Exp/JS.ddd (Antivir), JS/Crypted.NW.gen (Authentium), JS/Iframe.W!tr (Fortinet), JS/Crypted.NW.gen (exact) (Fprot), Exploit.HTML.IframeRef (Ikarus)
Windows 2000, Windows XP, Windows Server 2003
Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It may be hosted on a website and run when a user accesses the said website.
As of this writing, the said sites are inaccessible.
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.
TECHNICAL DETAILS
Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It may be hosted on a website and run when a user accesses the said website.
Download Routine
This Trojan connects to the following website(s) to download and execute a malicious file:
- http://{BLOCKED}j.co.cc/count28.php
As of this writing, the said sites are inaccessible.
Other Details
This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain malicious script.
Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.