TROJ_PIDIEF.YNLC
Troj/20132729-H (Sophos) ,Trojan horse Exploit_c.AAOD (AVG) ,PDF/CVE_2013_2729.A!exploit (Fortinet) ,JS/Exploit (exact, not disinfectable) (Fprot) ,Exploit.PDF (Ikarus) ,HEUR:Exploit.PDF.Generic (Kaspersky) ,Exploit:Win32/CVE-2013-2729 (Microsoft) ,RDN/Generic Exploit!1m3 (McAfee) ,PDF/Exploit.CVE-2013-2729.E trojan (Eset) ,Trojan.Pidief (Symantec)
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)
Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
TECHNICAL DETAILS
Arrival Details
This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.
Download Routine
This Trojan saves the files it downloads using the following names:
- %Temporary Internet Files%\1.exe
(Note: %Temporary Internet Files% is the Temporary Internet Files folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temporary Internet Files on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Microsoft\Windows\Temporary Internet Files on Windows Vista and 7.)
Other Details
This Trojan attempts to access the following websites to download files, which are possibly malicious:
- http://{BLOCKED}eam.eu/images/1.exe