This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
Detailed instructions for F-Secure security products are available in the documentation found in the Downloads section of our Home - Global site.
You may also refer to the Knowledge Base on the F-Secure Community site for further assistance.
Exploit:W32/Ani.C is a trojan that exploits a vulnerability in Windows' animated cursor handling of .ANI files in order to download and install other malware to the system.
These malicious animated cursor (.ANI) files can be hosted on websites and can trigger code execution upon visiting such sites. They can also be embedded in specially crafted e-mails or attachments within the e-mail that upon reading or previewing can cause the system to execute the code.
This trojan was seen hosted at the following site:
Other sites found also links or loads the malicious .ANI file:
Upon successful execution, this trojan may download other malware via the Internet and execute it on the system. Below are the download sites used:
- https://newasp.com.cn/[removed].exe - Trojan-PSW:W32/Agent.IM
- https://22.214.171.124/images/[removed].exe - Trojan-Downloader:Win32/Tiny.GG
- https://220.71.76.xxx/wincf.exe - Trojan-Downloader:W32/Small.EKV
More information about this malware can be found from our weblog post.