Trojan-Downloader:W32/Agent.BOY

Classification

Category :

Malware

Type :

Trojan-Downloader

Aliases :

Trojan-Downloader:W32/Agent.BOY

Summary

Trojan-Downloader:W32/Agent.BOY attempts to download and install other malware onto the affected system.

Removal

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

Once Trojan-Downloader:W32/Agent.BOY has been executed, it drops the following driver components:

  • %sysdir%\drivers\ip6fw.sys - detected as Rootkit.Win32.Agent.dp
  • %sysdir%\drivers\runtime.sys - detected as Rootkit.Win32.Agent.dw

Furthermore, it launches an instance of Microsoft Internet Explorer as a hidden process with its code injected to this process.It then attempts to connect to the following addresses to download other malicious programs:

  • 66.246.252.213
  • 67.18.114.98
  • 208.66.194.241

The downloaded files are saved as:

  • %sysdir%\[random characters]9_exception.nls
  • %temp%\ldrnt.bin