TROJ_KILLFILE.JD
TR/Poison.A.9(AntiVir)
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)
Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
TECHNICAL DETAILS
Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This Trojan drops the following files:
- %All Users Profile%\Application Data\Javame\Java\Jre\helper\Adobe Flash Updated { {random characters}}.lnk
- %All Users Profile%\Application Data\F1ash Update Back\1sass.exe
- %All Users Profile%\Application Data\F1ash Update Back\chrome_frame_helper.dll
- %All Users Profile%\Application Data\Sun Orcal\Java\Jre\DATA\chrome_frame_helper.dll
- %All Users Profile%\Application Data\Sun Orcal\Java\Jre\DATA\services.exe
- %All Users Profile%\Application Data\uperror.log
(Note: %All Users Profile% is the All Users or Common profile folder, which is C:\Documents and Settings\All Users in Windows 2000, XP, and Server 2003, and C:\ProgramData in Windows Vista and 7.)
It creates the following folders:
- %All Users Profile%\Application Data\F1ash Update Back
- %All Users Profile%\Application Data\Sun Orcal
- %All Users Profile%\Application Data\Sun Orcal\Java
- %All Users Profile%\Application Data\Sun Orcal\Java\Jre
- %All Users Profile%\Application Data\Sun Orcal\Java\Jre\DATA
- %All Users Profile%\Application Data\Javame
- %All Users Profile%\Application Data\Javame\Java
- %All Users Profile%\Application Data\Javame\Java\Jre
- %All Users Profile%\Application Data\Javame\Java\Jre\helper
(Note: %All Users Profile% is the All Users or Common profile folder, which is C:\Documents and Settings\All Users in Windows 2000, XP, and Server 2003, and C:\ProgramData in Windows Vista and 7.)
NOTES:
It continuously deletes the files and/or folders inside the malware path.