This is a Trojan detection. Unlike viruses, Trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include e-mail, malicious or hacked Web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.
Microsoft - Exploit:JS/Blacole.GB
Drweb - Exploit.BlackHole.129
Avast - JS:Decode-AGV
Avira - JS/Blacole.GB.155 Java script
is detection for malicious Java code that exploits like CVE2012-1723, CVE2012-0507.
is a generic detection for malicious Java code that exploits a vulnerability that allows the execution of arbitrary code. Also it will checks for the OS, browser and installed components such as Java, PDF and flash plug-in and it looks for vulnerable version of java.
The "Backhole" exploit kit may exploit vulnerabilities in certain software that may be installed in the victim computer. After the successful exploitation, it may lead to the download and execution of other malicious files.
Upon execution, tries to load the java script and redirect the user to the following website with help of hidden iframe
Upon successful exploitation it also tries to connect the following URL to download other payloads
The following are the payloads download by the Trojan
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, e-mail, etc.