This Trojan may be downloaded onto the compromised computer by other malware, including:
The Trojan may arrive as a file with the following names:
- %Temp%\[RANDOM CHARACTERS].exe
When the Trojan is executed, it may connect to the following remote locations:
The Trojan may download and execute more malware from the above locations.
Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":