The file - named 2.4.exe - is equipped with the well-known Panda icon but, once run, installs the DarkAngle Trojan on the victim's computer.
The Trojan is capable of logging all commands entered by the users into the affected computer - including, of course, personal, financial and login information - and send it to a remote server controlled by cyber crooks.
It is also able to load itself up after every computer reboot, and uses stealth techniques to prevent being detected by antivirus products.
In order to prevent being infected by this and other malware, users should get used to downloading all software from the developers' official of Facebook pages, and from reputable download sites.
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.