05-19-2011, 11:42 PM
Trojan:W32/AntiAV
Detection Names : Gen:Trojan.Heur.RP.Mq0@ayDoNAeb
Trojan.Win32.AntiAV.iup
Category: Malware
Type: Trojan
Platform: W32
Summary
A trojan, or trojan horse, is a seemingly legitimate program which secretly performs other, usually malicious, functions. It is usually user-initiated and does not replicate.
Disinfection
Allow F-Secure Anti-Virus to disinfect the relevant files.
For more general information on disinfection, please see Removal Instructions.
Additional Details
This malware is distributed in a RAR archive file attached to an e-mail message.
The archive file contains an executable file which may be detected as either Gen:Trojan.Heur.RP.Mq0@ayDoNAeb or Trojan.Win32.AntiAV.iup.
Installation
The executable file uses the icon of a Microsoft Word document to appear legitimate. On execution, the malware will drop a clean Word document and open it for viewing, to further deceive the user.
Meanwhile, the malware will create a registry launchpoint so that subsequently its file will be automatically run at every Windows startup:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
common = (path of the malware)
Network connections
Once its file is active, the malware will attempt to connect to:
tokyonews.edns.biz
tokyoIP.freewww.info
The malware may also send information to an external party by a POST to an info.php page on a remote server.
Detection Names : Gen:Trojan.Heur.RP.Mq0@ayDoNAeb
Trojan.Win32.AntiAV.iup
Category: Malware
Type: Trojan
Platform: W32
Summary
A trojan, or trojan horse, is a seemingly legitimate program which secretly performs other, usually malicious, functions. It is usually user-initiated and does not replicate.
Disinfection
Allow F-Secure Anti-Virus to disinfect the relevant files.
For more general information on disinfection, please see Removal Instructions.
Additional Details
This malware is distributed in a RAR archive file attached to an e-mail message.
The archive file contains an executable file which may be detected as either Gen:Trojan.Heur.RP.Mq0@ayDoNAeb or Trojan.Win32.AntiAV.iup.
Installation
The executable file uses the icon of a Microsoft Word document to appear legitimate. On execution, the malware will drop a clean Word document and open it for viewing, to further deceive the user.
Meanwhile, the malware will create a registry launchpoint so that subsequently its file will be automatically run at every Windows startup:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
common = (path of the malware)
Network connections
Once its file is active, the malware will attempt to connect to:
tokyonews.edns.biz
tokyoIP.freewww.info
The malware may also send information to an external party by a POST to an info.php page on a remote server.