Ichitaro Exploits Progress | Malware Blog | Trend Micro(情報元のブックマーク数)

ってことで、日本のリージョナルトレンドラボさん、お疲れ様でした。見つけたって書いてありますよね!
まぁリージョナルアプリケーションなので、しょうがないですがw

On March 11, Regional TrendLabs in Japan found a zero-day exploit attack that targeted Just System’s well-known Japanese word-processor, Ichitaro. The malware exploting the vulnerability was noticed to arrive via spam and via malicious websites using the Ichitaro file extension name, .JTD.

The malware ( TROJ_TARODROP.BA) drops a file {random letters}.tmp ( TROJ_DROPPER.PAO) that in turn drops another file named beer80.exe ( TROJ_AGENT.KLQW).

http://blog.trendmicro.com/ichitaro-exploits-progress/

screenshot