Description: This program provides remote access to the computer it is installed on.
Recommended action: Remove this software immediately.
containerfile:C:\Documents and Settings\PC1\My Documents\Downloads\perfmod_setup2.1.exe.zip
file:C:\Documents and Settings\PC1\My Documents\Downloads\perfmod_setup2.1.exe.zip->perfmod_setup2.1.exe
Threat in context
Java is a general-purpose programming language, but cases of this exploit are targeted against the Java plug-in for web browsers. The intent of the Java plug-in is that Java programs (or "applets") can be offered by websites, and run in a "sandbox" where the Java plug-in enforces rules on what the Java applet can do so that it cannot escape restricted environment.
What is an exploit?
Exploits are written to take advantage of weaknesses (or vulnerabilities) in legitimate software. A project called Common Vulnerabilities and Exposures (or CVE) is used by many vendors and organizations and gives each vulnerability a unique number, in this case "CVE-2013-0431". The portion "2013" refers to the year the vulnerability was discovered, and "0431" is a unique identifier. There is more information on the Common Vulnerabilities and Exposures website.
Downloads and installs files
This exploit downloads and runs files from a remote host. The list of URLs used varies and are only active for a short time. The files that are downloaded can include other malware.
The exploits can run files from a hard-coded URL, or take instructions from the HTML file that loaded them - like loading a URL to run additional malware.
Exploit:Java/CVE-2013-0431 uses a vulnerability that was first disclosed when Oracle released a patch in February 2013. The problem lies in the "com.sun.jmx.mbeanserver.Introspector" class which lets an insecure call to invoke a method of "java.lang.reflect.Method" class. An attacker can exploit this issue to bypass sandbox restrictions and run arbitrary code with elevated privileges.
The exploit attacks the security model instead of memory corruption issues. With memory corruption issues, the exploit is dependent on the specific CPU (Central Processing Unit) type and operating systems, and might be affected by mitigation technology like DEP (Data Execution Prevention) or ASLR (Address Space Layout Randomization).
Attacking the security model means that the exploit might be effective on any platform the Java interpreter is on; for example Windows, MacOS or Linux.
Usually the exploits are written using a few Java classes working together. The various class files are bundled into an archive called a JAR, which uses the ZIP file format. Every JAR contains a Manifest.MF file to identify itself to the Java Runtime Environment. Since it is usually found in every JAR, it won't be listed.
Below are some examples of files that exploit the vulnerability described in CVE-2013-0431:
The following articles explain some of the technical details of the weakness this vulnerability exploits:
Oracle Java SE Critical Patch Update Advisory - February 2013
Analysis by Tanmay Ganacharya
Alerts from your security software may be the only symptom.
Take these steps to help prevent infection on your PC.
I want to
Remove difficult malware
Remove FBI/police lock screen
See and search the latest threats
Answer common questions
Fix my software
Download and update
Submit a file
Alert level: Severe
Detected by definition: 188.8.131.52 and higher
First detected on: Feb 21, 2013
This entry was first published on: Feb 21, 2013
This entry was updated on: Dec 11, 2013
This threat is also detected as:
Java/Exploit.Agent.NIF trojan (ESET)
JAVA_EXPLOYT.BU (Trend Micro)
RDN/Generic Exploit!1mz (McAfee)
Java/Exploit.Agent.NLX trojan (ESET)
JAVA_EXPLOIT.WT (Trend Micro)