Home / malwarePDF  

Win32.Neroma.A@mm


First posted on 21 November 2011.
Source: BitDefender

Aliases :

Win32.Neroma.A@mm is also known as Win32.FireButton.A@mm, W32.Neroma@mm, WORM_NEROMA.A.

Explanation :

If you have virus definitions older than 03 September 2003, BitDefender detects this worm as Win32.VB.Generic.

The worm is written in Visual Basic and comes by e-mail.

The message description is:
Subject: It's Near 911!
Attachment: 911.jpg (the actual file name is Nerosys.exe)
Message text: Nice butt baby!

When the worm is executed, it copies itself to Windows directory:
%WINDIR%Nerosys.exe
(%WINDIR% is the Windows directory, and the path becomes for instance: C:WindowsNerosys.exe)

For Windows 95, 98 and Millennium, the worm replaces the shell command in %WINDIR%SYSTEM.INI, under the [Boot] section:

shell=Explorer.exe nerosys.exe

In Windows NT4, 2000, XP and 2003, the worm replaces the registry key:

Key: HKEY_LOCAL_MACHINESoftwareMicrosoftWindows NTWinlogon
Subkey: Shell
Value: "Explorer.exe nerosys.exe"

The worm uses Microsoft Outlook mailing system to send mail to all e-mail addresses in the Windows Address Book.

At the beginning of the executable file, you can see the following text: This is Neroma Worm for .::911 : 119::.

Last update 21 November 2011

 

TOP