JAVA_EXPLOIT.NZ

 Analysis by: Abraham Latimer Camba

 ALIASES:

Exploit:Java/CVE-2012-1723.AC (Microsoft), Exploit.Java.CVE-2012-0507.nh (Kaspersky), Java/Exploit.CVE-2012-0507.DA trojan (ESET), Troj/Java-GX (Sophos)

 PLATFORM:

Windows 2000, Windows XP, Windows Server 2003

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This Trojan may be hosted on a website and run when a user accesses the said website.

It requires its main component to successfully perform its intended routine.

  TECHNICAL DETAILS

File Size:

Varies

File Type:

Java Class

Initial Samples Received Date:

20 Jul 2012

Arrival Details

This Trojan may be hosted on a website and run when a user accesses the said website.

Download Routine

This Trojan saves the files it downloads using the following names:

  • %User Temp%\{Random File Name}.exe

(Note: %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003.)

Other Details

This Trojan requires its main component to successfully perform its intended routine.

NOTES:

This is a Java class file that is used to execute an exploit code. Once successful, it may download a possibly malicious file from a certain URL.

The URL where this malware downloads the said file depends on the parameter passed on to it by its components.