Home / malwarePDF  

VBS.Cuerpo.A@mm


First posted on 21 November 2011.
Source: BitDefender

Aliases :

VBS.Cuerpo.A@mm is also known as I-Worm.Cuervo.

Explanation :

This virus arrives in the body of the infected mail and is using an exploit
for Scriptlet.TypeLib.

When the infected message is viewed by the user the virus drops the file c:windowswinstart.bat using the specified exploit. After reboot the batch file is executed by Windows and the virus drops another file which is an Visual Basic Script file and
copies it in the usual startup folder for some language-specific versions of Windows.

The dropped script is executed and the spreading routine is activated. First the virus drops some various files and then will reply to user's e-mails modifying the body of mails to itself.
Also the virus send e-mails to user's contacts from all Address-Books.
These e-mails are sent using MAPI (Mailing Application Programming Interface) functions.

It also modifies the blank.html in the system directory to load a file which contains another piece of the virus, and to load the page from www.freedonation.com.
After this, it sets the default page for Internet Explorer to blank.html.

Another way of spreading used by this virus is to search for e-mail addresses in all files
with the following extensions: .txt, .na2, .wab, .mbx, .dbx, .dat.
The addresses found in those files are added to a .html file which is send to
the author's page posted on a free server which is a PHP file so the virus will
be sent automatically to those addresses.

Last update 21 November 2011

 

TOP