Home / malware Worm:MSIL/Autorun.C!inf
First posted on 18 August 2010.
Source: SecurityHomeAliases :
Worm:MSIL/Autorun.C!inf is also known as Trojan.Script.472180 (BitDefender), INF/Autorun.gen (ESET), Trojan.Script (Ikarus), INI/AutoRun.CYJ (Norman), Mal/AutoInf-C (Sophos), INF.AutoRun (Sunbelt Software), Mal_Otorun1 (Trend Micro), INF.Autorun.Gen (VirusBuster).
Explanation :
Worm:MSIL/Autorun.C!inf is detection for an autorun configuration file named "autorun.inf". The file is found on infected removable media with a copy of the worm Worm:MSIL/Autorun.C.
Top
Worm:MSIL/Autorun.C!inf is detection for an autorun configuration file named "autorun.inf". The file is found on infected removable media with a copy of the worm Worm:MSIL/Autorun.C. InstallationMSIL/Autorun.C!inf is created by Worm:MSIL/Autorun.C. When spreading, the worm creates a file "autorun.inf" in the root of the targeted drive. The "autorun.inf" file contains execution instructions for the operating system which are invoked when the drive is viewed using Windows Explorer with autoplay/autorun enabled, thus executing the copy of the worm. It should be noted that autorun.inf files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs. Additional InformationFor more information about Worm:MSIL/Autorun.C, see the description elsewhere in the encyclopedia.
Analysis by Shali HsiehLast update 18 August 2010