TrojanDownloader:Java/OpenConnection.MW is the detection for a malicious Java applet trojan that exploits a vulnerability described in CVE-2010-0840. Successful exploitation may lead to the downloading and execution of arbitrary files under the user's security context.
Installation
TrojanDownloader:Java/OpenConnection.MW is an obfuscated Java applet trojan 4514 bytes in size. The applet is referenced by the name 'jilo3',and is distributed as a part of a Java archive (.jar) package 8833 bytes in size. In the wild, we have observed the package being distributed with the name "plugins.jar", however the name is irrelevant for the trojan's functionality and may vary. The package also contains the following Java Class files:
- kript1
- kript2
- kript3
- kript4
- jilo1
- jilo2
- jilo3
- jilo4
When executed, the trojan attempts to exploit a vulnerability described in CVE-2010-0840 to gain the user's account security privileges on the targeted computer. The vulnerability affects Java Runtime Environment (JRE) up to version 6 update 18.
If successful, the trojan downloads, writes and executes an arbitrary file stored within the Windows %TEMP% folder. The arbitrary file is referred by an encrypted URL string stored in a parameter 'blift' which is specified inside, referencing the applet HTML file. The downloaded file is executed under the user's security context. The applet consists of the following member functions:
- jilo3
- ler0
- ler2
- ler4
- ler7
- start
When the applet is opened within a browser, the 'jilo3' function is executed first. If the exploit is successful, the 'start' function facilitates downloading and execution of an arbitrary file. The other functions serve to aid in exploiting the vulnerability and to obfuscate the Java applet and the strings within.
Additional information
It is not uncommon for antivirus software to detect malicious Java applets in a web browser's cache. It doesn’t necessarily mean that the system is compromised. Most of the time it reflects the fact that at some stage, a webpage with a malicious applet had been visited and cached internally. To thwart such a notification, it is often enough to purge the cache using a web browser's configurable security options.
Analysis by Oleg Petrovsky