Worm_yahlover.az


 
Thread Tools Search this Thread
Special Forums Cybersecurity Malware Advisories (RSS) Worm_yahlover.az
# 1  
Old 07-17-2008
Worm_yahlover.az

This worm may be downloaded unknowingly by a user when visiting malicious Web sites.

This worm drops copies of itself. It also drops component files which Trend Micro detects as MAL_OTORUN2.

This worm creates registry entries to enable its automatic execution at every system startup. It also uses Windows Task Scheduler to create a scheduled task that it uses to executes a dropped copy.

This worm sends messages to target recipients using instant messaging applications. This worm drops copies of itself in all removable drives. It drops an AUTORUN.INF file to automatically execute dropped copies when the drives are accessed.

This worm accesses Web sites to download files which Trend Micro detects as the following malware:

  • WORM_YAHLOVER.BH
  • TROJ_AGENT.ADZE
  • BKDR_POISON.DS
This worm terminates a certain process, if found running in memory.



More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question