Home / malware TrojanDownloader:Java/OpenStream.BY
First posted on 26 October 2012.
Source: MicrosoftAliases :
TrojanDownloader:Java/OpenStream.BY is also known as Exploit.Java.CVE-2012-0507.bu (VirusBuster), Exploit.Java.CVE-2012-0507.ni (Kaspersky), Exploit-CVE2012-1723 (McAfee), Java/Exploit.CVE-2012-1723.J (ESET), Trojan.Maljava (Symantec).
Explanation :
TrojanDownloader:Java/OpenStream.BY is an obfuscated Java applet that attempts to download and execute files from a malicious website. The applet uses Exploit:Java/CVE-2012-1723 to exploit a vulnerability in the Java Runtime Environment (JRE) which enables the trojan to download and execute files.
For information on the exploit, including a list of the versions of Java that are affected, an explanation of Java exploits, and further technical information, please see the encyclopedia entry for Exploit:Java/CVE-2012-1723.
TrojanDownloader:Java/OpenStream.BY may be served from a malicious website as a JAR file (Java archive container).
The archive contains several Java class files, such as the following:
- arLode.class
- drithq.class
- huibe.class
- kezur.class
- oikk.class
- taralab.class
- xryak.class
If the Java applet is loaded on a vulnerable computer, it attempts to download an arbitrary file from a remote website. The file that is downloaded can vary.
Note: This detection may be triggered when you visit a website that contains the malicious code. Even if you are not using a vulnerable version of the JRE this detection may be reported when you visit a website that contains the malicious code. This does not mean that you have been compromised, rather that an attempt to compromise your computer has been made.
Related encyclopedia entries
Exploit:Java/CVE-2012-1723
Analysis by Stefan Sellmer
Last update 26 October 2012