Home / malwarePDF  

Eliles.A


First posted on 01 March 2007.
Source: SecurityHome

Aliases :

Eliles.A is also known as VBS/Eliles.A.

Explanation :

Eliles.A is a Visual Basic Script worm. It also tries to affect mobile phones using a SIS file located on a web page. Due to the fact that this page is not available anymore this routine does not work.

cription

Upon execution, the script performs the following actions:


Changes the local Administrator and Administrative User accounts' password to "Leslie".


Runs winrar and winzip and tries to create an archive copy of itself as C:WindowsFontsC.Vitae.zip


Tries to kill and terminate several security applications:


- and disables some administrative settings to make it harder to remove the malware.


The worm copies itself in the Windows %system% (C:WINDOWSsystem32) folder as:


Eliles.A creates a folder named C:MSOCache and copies itself there.


It also drops copies of itself to the following hard coded locations as:



It creates the following registry entry to execute itself during Windows restart:


It also drops the following links in the desktop (supporting English and Spanish Windows installations).


- which points and runs the malware when opened.


This worm propagates through network drives by creating a copy of itself as msn.vbe in each discovered network drive.


It also builds and sends e-mail messages using Outlook that appear as follows:


Note: At the moment of writing this description, the link in the e-mail body is not available.


This Visual Basic Script worm further mass-mails itself as a zip archive attachment in another e-mail using an smtp server and port:


It first assigns randomly selected numbers to different names from this list:


- and uses it to complete the "From" field of each e-mail.


E-mail addresses are then gathered in files found in the affected machine having the following extension names:



Below are detail of the e-mail that this worm sends:

Last update 01 March 2007

 

TOP

Malware :

Family: