JS_REDIR.YUZ

 Analysis by: Jasen Sumalapao

 ALIASES:

Trojan:JS/BlacoleRef.W (Microsoft), Trojan-Downloader.JS.Agent.gte, Trojan-Downloader.JS.Agent.gtg, Trojan-Downloader.JS.Agent.gtg (Kaspersky), JS/Downloader (NAI), Troj/Redir-P (Sophos), JS/IFrame.HC (Authentium), Trojan.JS.Agent.GQS (Bitdefender), Trojan.Blackhole-506 (Clamav), JS/Iframe.W!tr (Fortinet), JS/IFrame.HC (exact) (Fprot), Trojan.JS.Blacole (Ikarus), JS/Iframe.FC trojan (NOD32), Trojan JS/Blacole.KK (Norman)

 PLATFORM:

Windows 2000, Windows XP, Windows Server 2003

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It may be unknowingly downloaded by a user while visiting malicious websites. It may be hosted on a website and run when a user accesses the said website.

It executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system. As of this writing, the said sites are inaccessible.

This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME tag. Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.

  TECHNICAL DETAILS

File Size:

4,029 bytes

File Type:

HTML, HTM, JS

Initial Samples Received Date:

31 Jul 2012

Arrival Details

This Trojan arrives as an attachment to email messages spammed by other malware/grayware or malicious users.

It may be unknowingly downloaded by a user while visiting malicious websites.

It may be hosted on a website and run when a user accesses the said website.

Download Routine

This Trojan connects to the following website(s) to download and execute a malicious file:

  • http://online-{BLOCKED}ity.ru:8080/forum/showthread.php?page=3ff54f2d2ccf3428

It then executes the downloaded files. As a result, malicious routines of the downloaded files are exhibited on the affected system.

As of this writing, the said sites are inaccessible.

Other Details

This is the Trend Micro detection for Web pages that were compromised through the insertion of a certain IFRAME tag.

Once a user visits an affected Web page, this HTML script launches a hidden IFRAME that connects to a malicious URL.