Threat Description

Needy.G

Details

Category: Malware
Platform: W32
Aliases: Needy.G, Java/Needy.G

Summary


Needy.G is a Java applet based trojan that changes the Internet Explorer start page changes search settings to ones contained in the trojan and downloads a trojan downloader. Needy activates when user views a web page or HTML E-mail that contains reference to the trojan file.

Needy.G is otherwise identical to Needy.F except it downloads the instructions from a different address.



Removal


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More scanning & removal options

More information on scanning or removal options is available in the documentation for your F-Secure security product on the Downloads section of our Home - Global site.

You may also refer to the Knowledge Base on the F-Secure Community site for more information.

Contact Support

For further assistance, F-Secure customers can request support online via the Request support or the Chat forms on our Home - Global site.



Technical Details


The Needy.G is activated when a web site containing the trojan is loaded with unpacthed Microsoft Internet Explorer browser. When the JAR file containing the trojan is executed it uses Microsoft Internet Explorer VerifierBug vulnerability to get full privileges by escaping the Java security, and execute its code.

When executed the trojan downloads a list of instructions from a web site, by which the trojan trojan modifies the Internet Explorer start page to point to the site where the trojan is downloaded from, changes search settings and adds addresses to the visited pages history.

Like Needy.F, Needy.G is directed by instructions downloaded from a web page. The web page can specify what to which page the trojan changes the Internet start page and search settings. Also the page contains a list of web sites that are copied into the Internet Explorer page history, to make it appear that user would have been visiting certain pornographic services.

In addition to changing the Internet Explorer settings the trojan tries to download a trojan from a website and execute it. Although this page seems no longer to contain the trojan executable.



Detection


Detection in F-Secure Anti-Virus was published on April 2nd, 2004 in update:

Detection Type: PC
Database: 2004-04-02_01



Description Details: Jarno Niemela
Description Last Modified: April 2nd, 2004


SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More