Home Malware Programs Trojans Trojan horse Exploit_c.VRA

Trojan horse Exploit_c.VRA

Posted: October 18, 2012

Threat Metric

Threat Level: 9/10
Infected PCs: 426
First Seen: October 18, 2012
Last Seen: January 4, 2023
OS(es) Affected: Windows

Trojan horse Exploit_c.VRA is a malicious PDF file that's used to install other malware – with current Trojan horse Exploit_c.VRA payloads being set to install spyware programs. Updating Adobe software can prove to be an easy defense against Trojan horse Exploit_c.VRA, which leans on outdated exploits for attacking your PC. Since Trojan horse Exploit_c.VRA should be detectable by most well-designed anti-malware programs, SpywareRemove.com malware researchers also recommend that you pay attention to suspicious e-mail message and use anti-malware programs to scan file attachments before you open them. Trojan horse Exploit_c.VRA also may be configured to install other types of PC threats, and scanning your overall PC is highly encouraged if you think that you may have opened Trojan horse Exploit_c.VRA accidentally.

Trojan horse Exploit_c.VRA Gives You a Reason to Fear Old Exploits as Well as New Ones

Trojan horse Exploit_c.VRA is an interesting case of malware using outdated exploits to attack PCs, apparently with the hope that many PC users haven't bothered to update the affected software. Programs that are vulnerable to Trojan horse Exploit_c.VRA, which uses e-mail-based distribution methods, include both Adobe Reader and Adobe Acrobat 9.3 (as well as previous versions). Trojan horse Exploit_c.VRA is disguised as an invoice file, and SpywareRemove.com malware experts would like to take the time to remind readers that legitimate e-mail invoices never will request that you open a file attachment, particularly for an often-exploited file type like PDF.

Trojan horse Exploit_c.VRA uses its exploit to install other malware onto your computer, and the type of software that's installed can vary with the URL address that's included in a specific variant of Trojan horse Exploit_c.VRA. This attack doesn't show visible symptoms of the installation and also may display a normal PDF document as a distraction from its malicious actions. However, Adobe software that's been updated isn't vulnerable to Trojan horse Exploit_c.VRA's exploit – although SpywareRemove.com malware researchers recommend using anti-malware products to defend your PC against zero-day (unpatched) exploits from similar vectors.

Opening Up the Spy That Trojan horse Exploit_c.VRA Slips into Your Hard Drive

Trojan horse Exploit_c.VRA can install any type of malware that Trojan horse Exploit_c.VRA is instructed to, but current versions of Trojan horse Exploit_c.VRA files have been found to install a variant of the Zbot Trojan. This Zbot variant specializes in stealing private information, and SpywareRemove.com malware researchers consider the following data types to be especially at risk after a Trojan horse Exploit_c.VRA attack:

  • Account passwords.
  • Login/user names.
  • E-mail addresses.
  • Credit card information.
  • Information submitted through highly-targeted websites (such as bank sites).

Although anti-malware programs should be able to detect and block Trojan horse Exploit_c.VRA before Trojan horse Exploit_c.VRA downloads anything in the first place, both Trojan horse Exploit_c.VRA and the Zbot variant can be removed by said software if necessary.

Loading...