Threat Description

Exploit:W32/Ani.C

Details

Aliases:Trojan-Downloader.Win32.Ani.g, Exploit.Win32.IMG-ANI.c
Category:Malware
Type:Exploit
Platform:W32

Summary



This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.



Removal


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More

You may wish to refer to the Support Community for further assistance. You also may also refer to General Removal Instructions for a general guide on alternative disinfection actions.



Technical Details



Exploit:W32/Ani.C is a trojan that exploits a vulnerability in Windows' animated cursor handling of .ANI files in order to download and install other malware to the system.

Distribution

These malicious animated cursor (.ANI) files can be hosted on websites and can trigger code execution upon visiting such sites. They can also be embedded in specially crafted e-mails or attachments within the e-mail that upon reading or previewing can cause the system to execute the code.

This trojan was seen hosted at the following site:

  • http://newasp.com.cn/[REMOVED].jpg

Other sites found also links or loads the malicious .ANI file:

  • http://newasp.com.cn/[removed].htm
  • http://bc0.cn/[removed].js

Execution

Upon successful execution, this trojan may download other malware via the Internet and execute it on the system. Below are the download sites used:

  • http://newasp.com.cn/[removed].exe - Trojan-PSW:W32/Agent.IM
  • http://61.218.38.35/images/[removed].exe - Trojan-Downloader:Win32/Tiny.GG
  • http://220.71.76.xxx/wincf.exe - Trojan-Downloader:W32/Small.EKV

More information about this malware can be found from our weblog post.






SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More