Threat Description

Trojan-Downloader: W32/Agent.EYA


Category: Malware
Type: Trojan-Downloader
Platform: W32
Aliases: Trojan-Downloader:W32/Agent.EYA, Agent.EYA


This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More scanning & removal options

More information on scanning or removal options is available in the documentation for your F-Secure security product on the Downloads section of our Home - Global site.

You may also refer to the Knowledge Base on the F-Secure Community site for more information.

Contact Support

For further assistance, F-Secure customers can request support online via the Request support or the Chat forms on our Home - Global site.

Technical Details

Trojan-Downloader:W32/Agent.EYA obtains malware from several links and executes them into the infected system.

This malware is related to Trojan-Spy:W32/Banker.


Upon execution, this Trojan downloads files from several links with the following format:


The files are saved in the Windows system directory with the following file names:

  • datta.exe - detected as Trojan-Spy.Win32.Banker.cxk
  • info1.exe - detected as Trojan-Spy.Win32.Banker.cxu
  • spoolsvw.exe - detected as Trojan-Spy.Win32.Banker.cxj
  • temp32.exe - detected as Trojan-Spy.Win32.Banker.cxu

The files are then executed.


Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More