Follow:

 

TrojanDownloader:JS/Adodb.F


TrojanDownloader:JS/Adodb.F is the component detection for malicious JavaScript code that downloads and executes another malware components, for example other JavaScript or malware binaries.


What to do now

Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as Microsoft Security Essentials, or the Microsoft Safety Scanner. For more information about using antivirus software, see http://www.microsoft.com/security/antivirus/av.aspx.

Threat behavior

TrojanDownloader:JS/Adodb.F is the component detection for malicious JavaScript code that downloads and executes another malware components, for example other JavaScript or malware binaries.
Installation
In the wild, we have observed TrojanDownloader:JS/Adodb.F being downloaded by Microsoft Help and Support Center exploit Exploit:Win32/CVE-2010-1885.A.
Payload
Downloads and executes arbitrary files
TrojanDownloader:JS/Adodb.F contacts the following domain in order to download arbitrary files:
 
“php.opensourcecms.com”
 
The malware then saves the downloaded files to the following location:
 
%USERPROFILE%\<RANDOM>.js - detected as TrojanDownloader:JS/Adodb.G
 
Note: %USERPROFILE% refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the User Profile folder for Windows 2000 and NT is C:\Documents and Settings\<user> or C:\Users\<user>; and for XP, Vista, and 7 is C:\Users\<user name>.
 
Analysis by Rodel Finones

Symptoms

Alert notifications or detections of this malware from installed antivirus or security software may be the only other symptom(s).

Prevention


Alert level: Severe
First detected by definition: 1.85.140.0
Latest detected by definition: 1.85.140.0 and higher
First detected on: Jun 18, 2010
This entry was first published on: Jun 23, 2010
This entry was updated on: Apr 17, 2011

This threat is also detected as:
  • Exploit/Cve-2010-1885 (AhnLab)
  • JS/Dldr.Agent.ags (Avira)
  • Win32.SuspectCrc (Ikarus)
  • Exploit.HTML.HCP.a (Sunbelt Software)
  • JS_HCPDL.A (Trend Micro)