Home / malware Worm:Win32/Voterai.G
First posted on 17 July 2010.
Source: SecurityHomeAliases :
Worm:Win32/Voterai.G is also known as Win32/Voter.worm.163840 (AhnLab), Trojan.NSIS.Voter.a (Kaspersky), TR/Drop.Voter.A.1 (Avira), NSIS/Voter (ESET), W32/Voterai.worm.b (McAfee), W32/Voter.D.worm (Panda), Trojan.Win32.NSIS.a (Rising AV), Mal/Voterai-A (Sophos), W32.Voterai (Symantec), WORM_VOTERAI.N (Trend Micro).
Explanation :
Worm:Win32/Voterai.G is a worm that spreads to all writeable drives. It drops and displays a distinct image, making it easy to identify infection.
Top
Worm:Win32/Voterai.G is a worm that spreads to all writeable drives. It drops and displays a distinct image, making it easy to identify infection. Installation Upon execution, Worm:Win32/Voterai.G drops a copy of itself in the computer as the following:<system folder>\drivers\<malware file name>.exe Note - <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32. It also modifies the registry so that it automatically runs every time Windows starts: Adds value: "@" With data: "<system folder>\drivers\<malware file name>.exe" To subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run It also drops the following shortcuts, which when executed run its dropped copy: %UserProfile%\Recent\Raila Odinga.gif.lnk %UserProfile%\Start Menu\Programs\Startup\<malware file name>.lnk It also drops and displays the following image file: %UserProfile%\Desktop\Raila Odinga.gif A part of this image file is shown below: Spreads Via... Logical drives Worm:Win32/Voterai.G spreads by copying itself to all writeable drives, including removable drives. It drops the following files:Raila Odinga.gif - similar to the image displayed above smss.exe - copy of this worm autorun.inf - file that enables the worm copy to automatically run when the drive is accessed and Autorun is enabled
Analysis by Francis Allan Tan SengLast update 17 July 2010