Home / malwarePDF  

Trojan:Java/Rowindal.D


First posted on 10 November 2010.
Source: SecurityHome

Aliases :

Trojan:Java/Rowindal.D is also known as Java.Siggen.27 (Dr.Web), Java/Exploit.CVE-2010-0094.D (ESET), Trojan-Downloader.Java.OpenConnection.bw (Kaspersky), Mal/JavaKC-P (Sophos).

Explanation :

Trojan:Java/Rowindal.D is a detection for an obfuscated malicious Java class that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) in order to run arbitrary code. This trojan, in combination with Exploit:Java/CVE-2010-0094.A, attempts to exploit the vulnerability described in CVE-2010-0094 to run the unauthorized code in a privileged context.
Top

Trojan:Java/Rowindal.D is a detection for an obfuscated malicious Java class that attempts to exploit a vulnerability in the Java Runtime Environment (JRE) in order to run arbitrary code. This trojan, in combination with Exploit:Java/CVE-2010-0094.A, attempts to exploit the vulnerability described in CVE-2010-0094 to run the unauthorized code in a privileged context. Installation Trojan:Java/Rowindal.D may be executed when a user visits a malicious website on a computer running a vulnerable version of JRE. In the wild, this trojan may be served from a malicious website, in combination with Exploit:Java/CVE-2010-0094.A, as a Java applet, in order to download and execute arbitrary files. Payload Downloads and executes arbitrary files Once Trojan:Java/Rowindal.D is loaded, it attempts to do the following:

  • Download a file from a remote website
  • Save the downloaded file in a windows TEMP folder
  • Run the downloaded file


  • Analysis by Wei Li

    Last update 10 November 2010

     

    TOP