Trojan-Spy applications are usually standalone programs that allow malicious individuals to monitor activity on infected computers. Trojan-Spy:Win32.Small.BSL installs a component designed to steal installed certificates.
Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.
Find the latest advice in our Community Knowledge Base.
See the manual for your F-Secure product on the Help Center.
Submit a file or URL for further analysis.
Creates the following registry entries:
It attempts to create the following registry entry:
It then drops a file into the following folder:
The dropped file is called acrobat.dll and is 51712 bytes in size.The malware sets acrobat.dll with a hidden file attribute and changes its date properties to the current system time.Small.BSL then displays the following fake/decoy dialog message:
When the dialog box is closed the malware will search for and terminate all running Internet Explorer processes. After this, it will launch Internet Explorer as a hidden process which has the malicious component attached.This malicious component acts like a Browser Helper Object (BHO).After the user has started Internet Explorer the malware will attempt to communicate with a server located at the following URL:
The BHO has the following functionality:
Description Created: 2008-04-16 15:14:11.0
Description Last Modified: 2008-04-16 17:11:49.0