Analysis by: JasperM


Windows 2000, XP, Server 2003


  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes


This malicious HTMl file uses social engineering methods to lure users into performing certain actions that may, directly or indirectly, cause malicious routines to be performed. Specifically, it makes use of spammed email messages that contains text alleging the death of a certain famous celebrity.

To get a one-glance comprehensive view of the behavior of this Trojan, refer to the Threat Diagram shown below.

This Trojan may be downloaded by other malware/grayware from remote sites.


File Size: 314 bytes
File Type: Script
Memory Resident: No
Initial Samples Received Date: 22 Aug 2010
Payload: Redirects to other sites

Arrival Details

This Trojan may be downloaded by the following malware/grayware from remote sites:


It may be downloaded from the following remote sites:

  • http://{BLOCKED}

Other Details

This Trojan does the following:

  • It connects to two URLs by using an IFRAME and a meta refresh tag. When using an IFRAME, the browser is not redirected to the website. Instead, it connects to the site and displays the site's contents in the specified frame. When using a meta refresh tag, however, the entire browser is redirected to the site. The site, which the meta refresh tag redirects to, is the final landing page.
  • The IFRAME tag redirects users to http://{BLOCKED}
  • The meta refresh tag redirects users to http://{BLOCKED}


Minimum Scan Engine: 8.900
VSAPI OPR PATTERN File: 7.403.00
VSAPI OPR PATTERN Date: 22 Aug 2010

Step 1

For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.

Step 2

Remove malware files dropped/downloaded by HTML_REDIR.BA


Step 3

Scan your computer with your Trend Micro product to delete files detected as HTML_REDIR.BA. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.

Did this description help? Tell us how we did.

Related Malware