This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
More information on scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
Exploit:W32/Ani.C is a trojan that exploits a vulnerability in Windows' animated cursor handling of .ANI files in order to download and install other malware to the system.
These malicious animated cursor (.ANI) files can be hosted on websites and can trigger code execution upon visiting such sites. They can also be embedded in specially crafted e-mails or attachments within the e-mail that upon reading or previewing can cause the system to execute the code.
This trojan was seen hosted at the following site:
Other sites found also links or loads the malicious .ANI file:
Upon successful execution, this trojan may download other malware via the Internet and execute it on the system. Below are the download sites used:
- https://newasp.com.cn/[removed].exe - Trojan-PSW:W32/Agent.IM
- https://18.104.22.168/images/[removed].exe - Trojan-Downloader:Win32/Tiny.GG
- https://220.71.76.xxx/wincf.exe - Trojan-Downloader:W32/Small.EKV
More information about this malware can be found from our weblog post.