Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:Worm/Joleee.eyz
Date discovered:04/07/2010
Type:Worm
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low to medium
Damage Potential:Low to medium
Static file:Yes
File size:55.808 Bytes
MD5 checksum:0c21ee5daff9fc0698028f958f7faee7
IVDF version:7.10.08.249 - Sunday, July 4, 2010

 General Method of propagation:
   • Email


Aliases:
   •  Sophos: Mal/FakeAV-CZ
   •  Bitdefender: Trojan.Generic.4379117
   •  Panda: Bck/Bredolab.AZ
   •  Eset: Win32/SpamTool.Tedroo.AF


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Downloads a malicious file
   • Drops malicious files
   • Registry modification

 Files It overwrites a file.
%WINDIR%\explorer.exe



It deletes the initially executed copy of itself.



The following file is created:

%WINDIR%\explorer.exe:userini.exe



It tries to download a file:

The location is the following:
   • http://91.207.6.134/forum/**********

 Registry The following registry keys are added in order to run the processes after reboot:

[HKCU\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\
   Run]
   • "userini"="%WINDIR%\explorer.exe:userini.exe"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "userini"="%WINDIR%\explorer.exe:userini.exe"

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "userini"="%WINDIR%\explorer.exe:userini.exe"

[HKLM\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\
   Run]
   • "userini"="%WINDIR%\explorer.exe:userini.exe"



The following registry key is added:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer]
   • "id"="9E7C01C66934"
   • "remove"="%executed file%"

 Email It contains an integrated SMTP engine in order to send Spam emails. A direct connection with the destination server will be established. The characteristics are described in the following:


From:
The sender address is spoofed.


To:
– Email addresses found in specific files on the system.
– Generated addresses


Subject:
The subject of the email is constructed out of the following:

    It starts with one of the following:
   • %receiver's email address%

    Continued by one of the following:
   • VIAGRA Official Site

    Continued by one of the following:
   • ID %number%


Body:
– Contains HTML code.

 File details Programming language:
The malware program was written in MS Visual C++.


Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Petre Galan on Friday, October 29, 2010
Description updated by Petre Galan on Friday, October 29, 2010

Back . . . .