Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
The trojan's code is obfuscated using string substitutions. During much of the first half of 2009, as this malware became more widespread, its author(s) replaced the original code with more complex, dynamically generated code to make it harder for security programs to detect.Gumblar infections constituted one of the major threats of 2009. It is named after the domain (gumblar.cn) it first used to infect visitors to the site; it has since switched to other domain names. The major distribution sites have since been shut down, but infected sites that are not properly cleaned may still be active.
Websites may be infected when the attacker gains stolen FTP credentials. Gumblar.X infections were widely seen on systems running the following operating systems:
Compromised webserver will have webpage(s) that redirect to malicious webservers.
On execution, Gumblar.X drops malicious files on the system. These files are typically encrypted; the decryption is based on the cipher key's character indexes.Some representative dropped files are:
The shell code dropped by the trojan uses a PDF vulnerability to redirect the user's browser to a malicious website. For more information about the vulnerability, please see:
Date Created: -
Date Last Modified: -