The file - named 2.4.exe - is equipped with the well-known Panda icon but, once run, installs the DarkAngle Trojan on the victim's computer.
The Trojan is capable of logging all commands entered by the users into the affected computer - including, of course, personal, financial and login information - and send it to a remote server controlled by cyber crooks.
It is also able to load itself up after every computer reboot, and uses stealth techniques to prevent being detected by antivirus products.
In order to prevent being infected by this and other malware, users should get used to downloading all software from the developers' official of Facebook pages, and from reputable download sites.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.