Re: Strange script tries to run when connection is down
Posted: Thu Nov 26, 2009 2:00 am
Results finally back from Avira, from the sample I sent them late Friday evening 21 November 2009 (German time):
Guess if you want something done right.... 
I'm glad that they figured out what we already figured out, after we, not they, located the files and analyzed them ourselves. And I'm glad they'll be adding it to the detection list "in the next few updates".Avira wrote: Dear Sir or Madam,
Thank you for your email to Avira's virus lab.
Tracking number: INC00399674.
We received the following archive files:
File ID Filename Size (Byte) Result
25501323 sample.zip 26.73 KB OK
A listing of files contained inside archives alongside their results can be found below:
File ID Filename Size (Byte) Result
25501324 chrome.manifest 122 Byte CLEAN
25501325 _cfg.js 1.97 KB CLEAN
25501326 overlay.xul 7.54 KB MALWARE
25501327 install.rdf 764 Byte CLEAN
25501328 live.php 308 Byte MALWARE
25501329 path.txt 197 Byte CLEAN
25501330 script attempts t...es.txt 288 Byte CLEAN
25501331 Untitled.tpp 4.39 KB CLEAN
10734900 jq.js 55.91 KB KNOWN CLEAN
Please find a detailed report concerning each individual sample below:
Filename Result
chrome.manifest CLEAN
The file 'chrome.manifest' has been determined to be 'CLEAN'. Our analysts did not discover any malicious content.
Filename Result
_cfg.js CLEAN
The file '_cfg.js' has been determined to be 'CLEAN'. Our analysts did not discover any malicious content.
Filename Result
overlay.xul MALWARE
The file 'overlay.xul' has been determined to be 'MALWARE'. Our analysts named the threat JS/Gord.A.1. The term "JS/" denotes a Java scriptvirus. Detection will be added to our virus definition file (VDF) with one of the next updates.
[[[Gee, thanks, guys. It's been out for only a month now -- that we *know* of. --- T.T]]]
Filename Result
install.rdf CLEAN
The file 'install.rdf' has been determined to be 'CLEAN'. Our analysts did not discover any malicious content.
[[[What about the "hidden" tag, <em:hidden>true</em:hidden>, found by yours truly? Is that not malicious behavior? (Per Giorgio, this "feature" is being removed from Fx, version unknown ATM, probably 3.6 -- T. T.]]]
Filename Result
live.php MALWARE
The file 'live.php' has been determined to be 'MALWARE'. Our analysts named the threat JS/Agent.hpp. The term "JS/" denotes a Java scriptvirus.Detection will be added to our virus definition file (VDF) with one of the next updates.
Filename Result
path.txt CLEAN
The file 'path.txt' has been determined to be 'CLEAN'. Our analysts did not discover any malicious content.
Filename Result
script attempts t...es.txt CLEAN
The file 'script attempts to access the following files.txt' has been determined to be 'CLEAN'. Our analysts did not discover any malicious content.
Filename Result
Untitled.tpp CLEAN
The file 'Untitled.tpp' has been determined to be 'CLEAN'. Our analysts did not discover any malicious content.
Filename Result
jq.js KNOWN CLEAN
The file 'jq.js' has been determined to be 'KNOWN CLEAN'. In particular this means that we could not find any malicious content. Please note that the file is part of ''.
Alternatively you can see the analysis result here:
http://analysis.avira.com/samples/detai ... tid=399674

