This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.
Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.
More scanning & removal options
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
Trojan-Downloader:W32/Agent.EYA obtains malware from several links and executes them into the infected system.
This malware is related to Trojan-Spy:W32/Banker.
Upon execution, this Trojan downloads files from several links with the following format:
The files are saved in the Windows system directory with the following file names:
- datta.exe - detected as Trojan-Spy.Win32.Banker.cxk
- info1.exe - detected as Trojan-Spy.Win32.Banker.cxu
- spoolsvw.exe - detected as Trojan-Spy.Win32.Banker.cxj
- temp32.exe - detected as Trojan-Spy.Win32.Banker.cxu
The files are then executed.