JS/Generic Exploit.j

This page shows details and results of our analysis on the malware JS/Generic Exploit.j

Download Current DAT

Threat Detail

  • Malware Type: Trojan
  • Malware Sub-type: Script
  • Protection Added: 2009-01-07

This is a trojan detection. Unlike viruses, trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include email, malicious or hacked web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.

Minimum Engine


File Length

Description Added


Description Modified


Malware Proliferation

At the time of writing, the following list of Internet Explorer vulnerabilities are being targeted by the detected JS/Generic Exploit.j webpage:

  • Pointer Reference Memory Corruption Vulnerability - CVE-2008-4844 
  • Microsoft Access Snapshot Viewer ActiveX Control Vulnerability - CVE-2008-2463

We have seen cases in which When successfully penetrated, the W32/Virut.n.gen virus is installed on the victim's machine.

Upon execution, the trojan attempts to download files from a variety of website. We have recently come across some variants trying to download files from

This trojan can get installed while browsing compromised websites where it has been hosted.

All Users:
Use current engine and DAT files for detection and removal.

Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).