Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:WORM/YahLover.D
Date discovered:18/01/2011
Type:Worm
In the wild:Yes
Reported Infections:Low
Distribution Potential:Low
Damage Potential:Medium
File size:1.235.420 Bytes
MD5 checksum:d9ffcf008eea91b395b54b661b2b12e5
VDF version:7.10.07.249
IVDF version:7.11.01.174 - Tuesday, January 18, 2011

 General Method of propagation:
   • No own spreading routine


Aliases:
   •  Mcafee: W32/YahLover.worm
   •  Kaspersky: Worm.Win32.AutoIt.ql
   •  Bitdefender: Win32.Worm.YahLover.D
   •  Grisoft: Worm/AutoRun.HY
   •  Eset: Win32/Autoit.CM worm
   •  GData: Win32.Worm.YahLover.D
   •  Norman: New unknown virus W32/Obfuscated.H3!genr


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003
   • Windows Vista
   • Windows Server 2008
   • Windows 7


Side effects:
   • Drops files
   • Records keystrokes
   • Registry modification

 Files It copies itself to the following locations:
   • %SYSDIR%\regsvr.exe
   • %WINDIR%\regsvr.exe



The following files are created:

– Non malicious files:
   • %WINDIR%\winhelp.ini
   • %SYSDIR%\rundll.exe
   • %SYSDIR%\COMCTL32.OCX
   • %SYSDIR%\ijl11pro.dll
   • %SYSDIR%\MSINET.OCX
   • %SYSDIR%\winhelp.exe
   • %SYSDIR%\setup.ini

 Registry The following registry keys are added in order to load the services after reboot:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]
   • "NofolderOptions"="dword:0x00000000"

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "Yahoo Messengger"="%SYSDIR%\regsvr.exe"



The following registry key is added:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System]
   • "DisableRegistryTools"="dword:0x00000001"
   • "DisableTaskMgr"="dword:0x00000000"



The following registry key is changed:

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
   Old value:
   • "Shell"="Explorer.exe"
   • "System"=""
   New value:
   • "Shell"="Explorer.exe , rundll.exe"
   • "System"="Winhelp.exe"

 Miscellaneous  Checks for an internet connection by contacting the following web sites:
   • http://www.**********spider.net/**********.doc
   • http://www.**********spider.net/**********.xls

Description inserted by Wensin Lee on Wednesday, May 23, 2012
Description updated by Wensin Lee on Wednesday, May 23, 2012

Back . . . .