Need help? Ask the community or hire an expert.
Go to Avira Answers
Date discovered:20/01/2009
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low to medium
Damage Potential:Low to medium
Static file:No
File size:~8.000 Bytes
IVDF version: - Tuesday, January 20, 2009

 General Method of propagation:
   • Mapped network drives

   •  Mcafee: VBS/Autorun.worm.zo
   •  Kaspersky:
   •  F-Secure:
   •  Sophos: VBS/AutoRun-UC
   •  Eset: VBS/AutoRun.BQ
   •  Bitdefender: Worm.VBS.AO

Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003

Side effects:
    Access to floppy disk
   • Drops files
   • Registry modification

 Files It copies itself to the following locations:
   • %all directories%\Thumbs.db
   • %home%\My Documents\database.mdb
   • %WINDIR%\:Microsoft Office Update for Windows XP.sys

The following files are created:

Non malicious files:
   • %all directories%\New Folder.lnk
   • %all directories%\Microsoft.lnk
   • %all directories%\%all subdirectories%.lnk

%all directories%\autorun.inf This is a non malicious text file with the following content:
   • %code that runs malware%

 Registry The following registry keys are added in order to run the processes after reboot:

   • Wscript.exe //e:VBScript "%home%\My Documents\database.mdb"

   • Wscript.exe //e:VBScript "%WINDIR%\:Microsoft Office Update for Windows XP.sys"

The value of the following registry key is removed:

–  HKCR\lnkfile
   • IsShortcut

The following registry key is changed:

   New value:
   • DisableRegistrytools = 1

Beschrijving ingevoegd door Andrei Gherman op maandag 26 januari 2009
Beschrijving bijgewerkt door Andrei Gherman op maandag 26 januari 2009

Terug . . . .
https:// Dit venster is voor uw veiligheid gecodeerd.