TROJ_ARTIEF.EDX
Posted: May 15, 2012
Threat Metric
The following fields listed on the Threat Meter containing a specific value, are explained in detail below:
Threat Level: The threat level scale goes from 1 to 10 where 10 is the highest level of severity and 1 is the lowest level of severity. Each specific level is relative to the threat's consistent assessed behaviors collected from SpyHunter's risk assessment model.
Detection Count: The collective number of confirmed and suspected cases of a particular malware threat. The detection count is calculated from infected PCs retrieved from diagnostic and scan log reports generated by SpyHunter.
Volume Count: Similar to the detection count, the Volume Count is specifically based on the number of confirmed and suspected threats infecting systems on a daily basis. High volume counts usually represent a popular threat but may or may not have infected a large number of systems. High detection count threats could lay dormant and have a low volume count. Criteria for Volume Count is relative to a daily detection count.
Trend Path: The Trend Path, utilizing an up arrow, down arrow or equal symbol, represents the level of recent movement of a particular threat. Up arrows represent an increase, down arrows represent a decline and the equal symbol represent no change to a threat's recent movement.
% Impact (Last 7 Days): This demonstrates a 7-day period change in the frequency of a malware threat infecting PCs. The percentage impact correlates directly to the current Trend Path to determine a rise or decline in the percentage.
Threat Level: | 9/10 |
---|---|
Infected PCs: | 91 |
First Seen: | May 15, 2012 |
---|---|
OS(es) Affected: | Windows |
TROJ_ARTIEF.EDX is a malicious .rtf file that exploits a buffer overflow vulnerability to install a backdoor Trojan onto your computer. Because TROJ_ARTIEF.EDX also drops a safe text document and is distributed by an e-mail that claims to offer Tibet-specific advice for operating Apple products, victims of TROJ_ARTIEF.EDX attacks may fail to realize that their computers have been attacked at all. TROJ_ARTIEF.EDX spam e-mail attacks bear a strong resemblance to similar attacks by similar Trojan droppers like TROJ_ARTIEF.LIN, TROJ_ARTIEF.ZIGS, TROJ_SCRIPBRID.A and TROJ_PIDIEF.EGQ, all of which use similar exploits and e-mail-based scams to encourage you to install harmful software. You can avoid both TROJ_ARTIEF.EDX attacks and similar PC threats by avoiding any contact with suspicious e-mail file attachments, and SpywareRemove.com malware research team encourages you to scan any e-mail file via suitable anti-malware software before you download it onto your computer.
TROJ_ARTIEF.EDX – When Text Documents Attack!
Although TROJ_ARTIEF.EDX really is an .rtf file, this format isn't chosen for its harmlessness, but rather, for its ability to exploit vulnerabilities in Microsoft Office and Open XML File Format Converter. In particular, the following versions of Microsoft Office are vulnerable to TROJ_ARTIEF.EDX's attack: Service Pack 3 for XP/2003, Service Pack 2 for 2007, 2010, and 2004/2008/2011 for Mac. Like similar PC threats, TROJ_ARTIEF.EDX is distributed in spam e-mail messages; in TROJ_ARTIEF.EDX's case, these messages pretend to offer advice on how to implement a newly-developed 'Input Method' for Tibetans that want to use Apple iOS 4.2 products. TROJ_ARTIEF.EDX, as an attached file, can be avoided by deleting the e-mail message without any further interaction on your part.
If you do fall victim to launching TROJ_ARTIEF.EDX, TROJ_ARTIEF.EDX will proceed to install a variant of the backdoor Trojan BKDR_RILER.SV that also includes the virus PE_SALITY.AC. These PC threats are designed to enable backdoor access to your computer for high-level security attacks and may also infect .exe files on your hard drive. Since the danger and sophistication of any successful TROJ_ARTIEF.EDX attack is quite high, SpywareRemove.com malware researchers suggest detecting and deleting TROJ_ARTIEF.EDX's payload with appropriately powerful anti-malware scanners. It should also be noted that TROJ_ARTIEF.EDX also drops a completely safe Word document (entitled 'document.doc') to keep your eyes off of its real payload.
What You Can Do About TROJ_ARTIEF.EDX and Its Intrusive Friends
Besides infecting other files, PC threats that are installed by TROJ_ARTIEF.EDX can also insert their code into normal system processes to guarantee their clandestine and automatic operation. Due to the advanced nature of TROJ_ARTIEF.EDX's payload, manual detection or deletion of a TROJ_ARTIEF.EDX-associated PC threat is inadvisable if any other options are available. However, if your PC doesn't use a vulnerable type of word processor software (as noted earlier in this article), TROJ_ARTIEF.EDX will be unable to complete its attack even if TROJ_ARTIEF.EDX is launched. Since very similar PC threats can use different exploits, SpywareRemove.com malware experts recommend that you scan any file attachment before you attempt to download or open it.
Ignoring a successful TROJ_ARTIEF.EDX attack can have severe consequences for your computer, and, depending on the files that are infected, may even result in damage to your operating system. The primary risks that SpywareRemove.com malware researchers have associated with TROJ_ARTIEF.EDX's payload include loss of control over your computer, the possibility of other PC threats being installed, and the potential for informational theft, all of which are standard for many types of backdoor Trojans like those that TROJ_ARTIEF.EDX installs.
Technical Details
File System Modifications
Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.
The following files were created in the system:1.exe
File name: 1.exeSize: 1.78 MB (1780792 bytes)
MD5: b3242d0afa13b543804ba6fc28c9346f
Detection count: 79
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: June 21, 2012
%User Temp%\svchost.exe
File name: %User Temp%\svchost.exeFile type: Executable File
Mime Type: unknown/exe
Group: Malware file
Leave a Reply
Please note that we are not able to assist with billing and support issues regarding SpyHunter or other products. If you're having issues with SpyHunter, please get in touch with SpyHunter customer support through your SpyHunter . If you have SpyHunter billing questions, we recommend you check the Billing FAQ. For general suggestions or feedback, contact us.