Home / malwarePDF  

Worm:MSIL/Autorun.C!inf


First posted on 18 August 2010.
Source: SecurityHome

Aliases :

Worm:MSIL/Autorun.C!inf is also known as Trojan.Script.472180 (BitDefender), INF/Autorun.gen (ESET), Trojan.Script (Ikarus), INI/AutoRun.CYJ (Norman), Mal/AutoInf-C (Sophos), INF.AutoRun (Sunbelt Software), Mal_Otorun1 (Trend Micro), INF.Autorun.Gen (VirusBuster).

Explanation :

Worm:MSIL/Autorun.C!inf is detection for an autorun configuration file named "autorun.inf". The file is found on infected removable media with a copy of the worm Worm:MSIL/Autorun.C.
Top

Worm:MSIL/Autorun.C!inf is detection for an autorun configuration file named "autorun.inf". The file is found on infected removable media with a copy of the worm Worm:MSIL/Autorun.C. InstallationMSIL/Autorun.C!inf is created by Worm:MSIL/Autorun.C. When spreading, the worm creates a file "autorun.inf" in the root of the targeted drive. The "autorun.inf" file contains execution instructions for the operating system which are invoked when the drive is viewed using Windows Explorer with autoplay/autorun enabled, thus executing the copy of the worm. It should be noted that autorun.inf files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation CDs. Additional InformationFor more information about Worm:MSIL/Autorun.C, see the description elsewhere in the encyclopedia.

Analysis by Shali Hsieh

Last update 18 August 2010

 

TOP