Trojan-Downloader:W32/Scob was found on a number of web sites on late June 24th, 2004, appending to existing files such as jpeg and gif files. According to reports, the script was not appended by modifying the actual files on the server but by using the footer feature from Microsoft's Internet Information Server.
Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
When executed, the trojan attempts to use an invisible frame to connect to a page at a remote web site. At the time of writing, the page in the web site is not available. While the page is not currently available, there has been reports that this downloader has been used to install variants of Backdoor:W32/Padodor.
The trojan also sets a cookie on the system, causing that it will attempt to connect the remote site no often than once every week.
Further information about this case is also available from Microsoft:
In addition Microsoft has released a new KB (871277) on the Download.Ject Detection and Recovery Advisory: