Home > Threat descriptions >

Trojan-Downloader:W32/Agent.EYA

Classification

Category: Malware

Type: Trojan-Downloader

Aliases: Trojan-Downloader:W32/Agent.EYA, Agent.EYA

Summary


This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.

Removal


Automatic action

Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.

Knowledge Base

Find the latest advice in our Community Knowledge Base.

About the product

See the manual for your F-Secure product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details


Trojan-Downloader:W32/Agent.EYA obtains malware from several links and executes them into the infected system.

This malware is related to Trojan-Spy:W32/Banker.

Activity

Upon execution, this Trojan downloads files from several links with the following format:

  • http://bl.fgs.org.tw/icons/.dat/[removed].exe

The files are saved in the Windows system directory with the following file names:

  • datta.exe - detected as Trojan-Spy.Win32.Banker.cxk
  • info1.exe - detected as Trojan-Spy.Win32.Banker.cxu
  • spoolsvw.exe - detected as Trojan-Spy.Win32.Banker.cxj
  • temp32.exe - detected as Trojan-Spy.Win32.Banker.cxu

The files are then executed.