This is a Trojan detection. Unlike viruses, trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include email, malicious or hacked web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.
Indication of Infection
Presence of the above mentioned activities.
Methods of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels
include IRC, peer-to-peer networks, newsgroup postings, email spam, etc.
Upon execution the Trojan tries to connect to URLs & IPs such as:
Samples were not downloaded as the above URLs were down. The URLs and IPs frequently change as the sites are taken down.