Threat Description

Exploit:W32/Ani.C

Details

Aliases: Trojan-Downloader.Win32.Ani.g, Exploit.Win32.IMG-ANI.c
Category: Malware
Type: Exploit
Platform: W32

Summary



This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.



Removal



Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.



Technical Details



Exploit:W32/Ani.C is a trojan that exploits a vulnerability in Windows' animated cursor handling of .ANI files in order to download and install other malware to the system.

Distribution

These malicious animated cursor (.ANI) files can be hosted on websites and can trigger code execution upon visiting such sites. They can also be embedded in specially crafted e-mails or attachments within the e-mail that upon reading or previewing can cause the system to execute the code.

This trojan was seen hosted at the following site:

  • http://newasp.com.cn/[REMOVED].jpg

Other sites found also links or loads the malicious .ANI file:

  • http://newasp.com.cn/[removed].htm
  • http://bc0.cn/[removed].js

Execution

Upon successful execution, this trojan may download other malware via the Internet and execute it on the system. Below are the download sites used:

  • http://newasp.com.cn/[removed].exe - Trojan-PSW:W32/Agent.IM
  • http://61.218.38.35/images/[removed].exe - Trojan-Downloader:Win32/Tiny.GG
  • http://220.71.76.xxx/wincf.exe - Trojan-Downloader:W32/Small.EKV

More information about this malware can be found from our weblog post.






SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More