A program or technique that takes advantage of a vulnerability to remotely access or attack a program, computer or server.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
Detailed instructions for F-Secure security products are available in the documentation found in the Downloads section of our Home - Global site.
You may also refer to the Knowledge Base on the F-Secure Community site for further assistance.
Exploit:W32/XDropper.BR identifies malware that exploits the CVE-2007-0030 vulnerability, using a specially-crafted malicious Excel file.
This malware is also mentioned in our Weblog.
Exploit:W32/Xdropper.BR will drop the following file upon execution:
- %temp%\svchost.exe - detected as Trojan-Dropper:W32/Agent.DJGD
The dropper will drop additional binaries that will download and executes malicious files from:
The URLs are dead during the investigation.