To get a one-glance comprehensive view of the behavior of this malware, refer to the Behavior Diagram shown below.
This malicious JavaScript may be dropped by other malware. It may be hosted on a Web site and run when a user accesses the said Web site.
This malicious JavaScript searches for target recipients in a compromised
Orkut account. It then sends a scrap object to its target recipients.
When an affected user views the said scrap object, this malicious JavaScript automatically executes itself by performing the same routine mentioned above. However, it can only execute when an affected user logs into an
Orkut scrapbook to view the scrap object sent by this malicious JavaScript.
More...