Trojan:W32/AntiAV attempts to send information to a remote server.
Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.
More scanning & removal options
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
This malware is distributed in a RAR archive file attached to an e-mail message.
The archive file contains an executable file which may be detected as either Gen:Trojan.Heur.RP.Mq0@ayDoNAeb or Trojan.Win32.AntiAV.iup.
The executable file uses the icon of a Microsoft Word document to appear legitimate. On execution, the malware will drop a clean Word document and open it for viewing, to further deceive the user.
Meanwhile, the malware will create a registry launchpoint so that subsequently its file will be automatically run at every Windows startup:
- HKLM\Software\Microsoft\Windows\CurrentVersion\Run common = (path of the malware)
Once its file is active, the malware will attempt to connect to:
The malware may also send information to an external party by a POST to an info.php page on a remote server.