Home / malware Win32.Shoho.A@mm
First posted on 21 November 2011.
Source: BitDefenderAliases :
Win32.Shoho.A@mm is also known as W32.Shoho-A, W32.Shoho@mm, I-Worm.Welyah.
Explanation :
It arrives in the following format:
Subject: Welcome to Yahoo!
Attachment: Readme.txt many spaces .pif
The worm uses the Iframe vulnerability for spreading when user is previewing the e-mail. A patch and more details for this vulnerability can be found at: http://www.microsoft.com/technet/security/bulletin/ms01-027.asp
After the virus is executed it will copies itself as Winl0g0n.exe in Windows and Windows System directory.
Then it adds the following registry keys: " HKCUSoftwareMicrosoftWindowsCurrentVersionRunWinl0g0n.exe" with value "%WINDIR%Winl0g0n.exe" and "HKLMSoftwareMicrosoftWindowsCurrentVersionRunWinl0g0n.exe" with the same value.
After that it scans on Hard Disk for files with the following extensions: Eml, wab, dbx, mbx, xls, xlt, mdb, .sys and it searches in those files for e-mail addresses.
For sending itself to those addresses the worm uses the users SMTP server, or if it can’t find that server it uses a server that is hard coded in it’s body.
After restart the worm tries to delete the files from Windows and Windows System directory.Last update 21 November 2011