Trojan-Downloader:W32/Agent.JRY

Classification

Category :

Malware

Type :

Trojan-Downloader

Aliases :

Trojan-Downloader:W32/Agent.JRY

Summary

Agent.JRY connects to a website to download additional malware, as well as opens a legitimate PDF file from a legitimate site.

Removal

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

Agent.JRY is trojan-downloader. It attempts to secretly download and run other files from remote Web or FTP sites.Usually, trojan-downloaders attempt to download various trojans and backdoors and activate them on the infected system. Some worms and backdoors have downloader capabilities.Trojan-Downloader.Win32.Agent.jry arrives on the system through spammed emails as an attachment, typically named complaint.scr with the icon of a pdf file.

Registry Changes

Trojan-Downloader.Win32.Agent.jry will create the following registry entry:

  • HKLM\Software\Classes\.key

Payload

When executed, this trojan-downloader will download files from:

  • http://www.[removed].at/cms/modules/EZCMS/pictures/defailt/irs_efill.php

The file is downloaded to %WINDIR%\svchost.exe and run. The site was active and hosts Trojan-Spy.Win32.Agent.bnb as of March 6, 2008.Additionally, it will download a legitimate PDF file from:

  • http://www.irs.gov/pub/irs-pdf/f3949a.pdf

It opens the PDF file to disguise its intentions.