Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:18/04/2008
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low to medium
Damage Potential:Low to medium
Static file:No
File size:~18.000 Bytes
IVDF version: - Friday, April 18, 2008

 General Method of propagation:
   • Mapped network drives

   •  Mcafee: W32/
   •  Kaspersky: Worm.VBS.Autorun.r
   •  TrendMicro: VBS_AGENT.AMAF
   •  F-Secure: Worm.VBS.Autorun.r
   •  Sophos: VBS/Autorun-EC
   •  Bitdefender: Worm.VBS.Autorun.D

Platforms / OS:
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003

Side effects:
    Access to floppy disk
   • Drops files
   • Registry modification

 Files It copies itself to the following locations:
   • %SYSDIR%\.vbe
   • %SYSDIR%\wbem\.vbe
   • %drive%:\.vbe

The following files are created:

%drive%:\autorun.inf This is a non malicious text file with the following content:
   • %code that runs malware%

 Registry The following registry key is added in order to run the process after reboot:

   • %computer name% = .vbe

The following registry key is added:

[HKLM\software\%computer name%]
   • %system-dependent%

The following registry key is changed:

Various Explorer settings:
   New value:
   • showsuperhidden = 0

Description inserted by Andrei Gherman on Tuesday, June 17, 2008
Description updated by Andrei Gherman on Tuesday, June 17, 2008

Back . . . .