This is a Trojan detection. Unlike viruses, Trojans do not self-replicate. They are spread manually, often under the premise that they are beneficial or wanted. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. Distribution channels include e-mail, malicious or hacked Web pages, Internet Relay Chat (IRC), peer-to-peer networks, etc.
Indication of Infection
Typically this exploit is used to execute other programs. Those programs can be whatever the author chooses to run on the vulnerable system. Therefore it is not possible to provide specific information as one attack can vary from the next. This detection covers the underlying exploit code, rather than any one specific attack incident.
Methods of Infection
Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, email spam, etc.