
The SonicWALL UTM research team has seen a sudden increase in drive-by infection malware. Such infection takes place simply by visiting a website that uses a known browser exploit. Some of these websites are hosted on legitimate servers that have been compromised.
The Trojan is being actively spammed via e-mails containing malicious links:
The link in the email directs the user to a malicious website pretending to host a video that requires the XVID codec:
The website page contains an iframe HTML tag that causes the download of a malicious PDF file:
The PDF file employs a known (heap spray) exploit to run malicious code. The code decrypts and runs a script. This script downloads and runs setup.exe :
The webpage will also initiate the download of XvidSetup.exe :
The Trojan performs the following DNS queries:
The Trojan creates the following files on the filesystem:
The Trojan creates the following key in the Windows registry:
SonicWALL Gateway AntiVirus provides protection against this threat with the following signature:
Share This Article

An Article By
An Article By
Security News
Security News