This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.
Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.
More scanning & removal options
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
Exploit:W32/Ani.C is a trojan that exploits a vulnerability in Windows' animated cursor handling of .ANI files in order to download and install other malware to the system.
These malicious animated cursor (.ANI) files can be hosted on websites and can trigger code execution upon visiting such sites. They can also be embedded in specially crafted e-mails or attachments within the e-mail that upon reading or previewing can cause the system to execute the code.
This trojan was seen hosted at the following site:
Other sites found also links or loads the malicious .ANI file:
Upon successful execution, this trojan may download other malware via the Internet and execute it on the system. Below are the download sites used:
- https://newasp.com.cn/[removed].exe - Trojan-PSW:W32/Agent.IM
- https://220.127.116.11/images/[removed].exe - Trojan-Downloader:Win32/Tiny.GG
- https://220.71.76.xxx/wincf.exe - Trojan-Downloader:W32/Small.EKV
More information about this malware can be found from our weblog post.