JAVA_XPLOYT.WOQ
Exploit:Java/CVE-2012-1723 (Microsoft)
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)
Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Trojan may be hosted on a website and run when a user accesses the said website.
It requires its main component to successfully perform its intended routine.
TECHNICAL DETAILS
3,201 bytes
Java Class
12 Feb 2013
Arrival Details
This Trojan may be hosted on a website and run when a user accesses the said website.
Download Routine
This Trojan downloads a possibly malicious file from a certain URL. The URL where this malware downloads the said file depends on the parameter passed on to it by its components.
Other Details
This Trojan requires its main component to successfully perform its intended routine.
NOTES:
When a user accesses a website where JAVA_XPLOYT.WOQ is hosted and the affected machine is vulnerable, JAVA_XPLOYT.WOQ is loaded.
The files that are downloaded and executed may change depending on the attacker's choice. Downloaded and executed files may also be a malware.