Trojan-Downloader:W32/Kavala contacts a remote server and downloads additional files onto the affected machine.
Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
Trojan-Downloader:W32/Kavala variants are distributed via file attachments to e-mail messages. The malware itself is a Windows executable program compressed into a ZIP file that is attached to the e-mail messages.
Both the ZIP file and the contents of the email follow typical social engineering patterns (e.g, using file names such as RE: Payment Pending or RE:Attachment Shipping Document) to deceive and lure users into extracting and running the attached program.
When the trojan-downloader program contained in the ZIP file is extracted and run on a user's machine, it will attempt to contact a remote server and download additional files onto the affected machine.