Virus type: Worm
This memory-resident worm arrives via peer-to-peer, file-sharing applications or Internet Relay Chat (IRC).
To propagate through peer-to-peer networks, it drops copies of itself using enticing file names on default shared folders.
This worm overwrites HTM files. It exploits known vulnerabilities in Windows known as the Object Tag Code Base Exploit (MS02-015) and MHTML Exploit (MS03-014). It also terminates certain processes, which are usually associated with antivirus programs.
This UPX-compressed malware is written and compiled using Visual Basic, a high-level programming language. It uses an icon usually associated with Folders.
It runs on Windows 95, 98, ME, NT, 2000 and XP.
Turn up the volume with our Apple Byte sweeps!
Two lucky winners will take home the coveted smart speaker that lets Siri help you around your connected house. This sweepstake ends Feb. 25, 2018.