We're gradually updating threat actor names in our reports to align with the new weather-themed taxonomy. Learn about Microsoft threat actor names
Exploit:JS/Mult.BC
Detected by Microsoft Defender Antivirus
Aliases: Trojan-Downloader.JS.Plif.a (Kaspersky) Mal/ObfJS-BP (Sophos) JS.Psyme.GH (VirusBuster) Trojan.JS.PYA (BitDefender) JS/Generic Exploit.j (McAfee)
Summary
Exploit:JS/Mult.BC is the generic detection for obfuscated shellcode embedded in a JavaScript that downloads and executes files from a remote server. It is usually embedded in a JavaScript file hosted in a compromised or malicious Web site. When the page containing the JavaScript is accessed, for example if a user visits a compromised site, the JavaScript is executed, triggering the shellcode to run.
Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as the Microsoft Safety Scanner (http://go.microsoft.com/fwlink/?LinkId=212742). For more information, see http://www.microsoft.com/protect/computer/viruses/vista.mspx.