live casino online

HTML_JVOBFUS.SM

October 09, 2012

 ALIASES:

Symantec_Beta: Trojan.Malscript; Microsoft: Exploit:JS/Mult.DL; Kaspersky: Trojan-Downloader.JS.Agent.fxu

 PLATFORM:

Windows 2000, Windows XP, Windows Server 2003

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted: Yes

  • In the wild: Yes

  OVERVIEW

This is the live casino online detection for files that exhibit certain behaviors.

This Trojan may be downloaded by other malware/grayware/spyware from remote sites. It may be hosted on a website and run when a user accesses the said website.

  TECHNICAL DETAILS

File Size:

87,925 bytes

File Type:

Script

Memory Resident:

No

Arrival Details

This Trojan may be downloaded by other malware/grayware/spyware from remote sites.

It may be hosted on a website and run when a user accesses the said website.

NOTES:

Other Details

This is the live casino online detection for:

  • malicious obfuscated JavaScript
This malware displays a 404-error message upon access.

It connects to the following sites in order to execute a malicious code:
  • http://{BLOCKED}ing.info/games/java_trust.php?f={parameter} - detected as HTML_DLOAD.HBM
  • http://{BLOCKED}ing.info/games/java_skyline.php?f={parameter} - detected as JAVA_EXPLOIT.HBM
As a result, malicious routines of the executed malware are exhibited on the infected system.

  SOLUTION

Minimum Scan Engine:

8.900

Step 1

For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you to allow full scanning of your computer.

Step 2

Remove malware files dropped/downloaded by HTML_JVOBFUS.SM

Step 3

Close all opened browser windows

Step 4

Scan your computer with your live casino online product to delete files detected as HTML_JVOBFUS.SM. If the detected files have already been cleaned, deleted, or quarantined by your live casino online product, no further step is required. You may opt to simply delete the quarantined files. Please check this for more information.