Type
Trojan
SubType
Downloader
Discovery Date
05/14/2007
Length
Minimum DAT
5030 (05/14/2007)
Updated DAT
5030 (05/14/2007)
Minimum Engine
4.4.00
Description Added
05/14/2007
Description Modified
05/16/2007
Overview -
This is a trojan detection. Unlike viruses, trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include email, malicious or hacked web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.
Characteristics -
Upon execution, the trojan attempts to download files from [removed].mcboo.com, stores them under the %Windir% folder and executes them.
The downloaded file is either a file named "retadpu.exe" (which is an other variant of the Downloader-BCF trojan), either a file for which detection is covered under "Matcash" family.
Symptoms -
Presence of an executable file by name retadpu.exe under the %Windir% folder confirms the attack.
Method of Infection -
N/A. Downloaders are not viruses, and as such do not themselves contain any method to replicate. However they may themselves be downloaded by other viruses and/or Trojans to be installed on the user's system.
Many of these additionally are mass spammed by the author to entice people into double-clicking on them.
Alternatively they may be installed by visiting a malicious web page (either by clicking on a link, or by the website hosting a scripted exploit which installs the Downloader onto the user's system with no user interaction.
Removal -
AVERT recommends to always use latest DATs and engine. This threat will be cleaned if you have this combination.