Alweer eentje, vooral de echo:Y|format c: is een beetje lullig..
http://vil.nai.com/vil/virusSummary.asp?virus_k=99301This threat is detected as VBS/Generic@MM with the 4141 DATs or newer. It arrives via Internet Relay Chat, or in an email message containing the following information:
Subject: Outlook Express Update
Body: MSNSofware Co.
Attachment: Mmsn_offline.htm
Opening the attachment infects the local system. The worm sends itself to all Microsoft Outlook Contacts and Windows Address Book entries using MAPI. Copies of the worm are created using different formats:
* C:B.HTM
* C:BLA.HTA
* C:WINDOWShelpmmsn_offline.htm
* C:WINDOWSSAMPLESWSHCharts.js
* %drive letter%Start MenuProgramsStartUpmsoe.hta (on network drives)
The C:AUTOEXEC.BAT file is over written with Echo y|format c:
All SCRIPT.INI files are overwritten with mIRC script commands to send the virus to others when they join a channel that an infected user is on. All .ASP, .HTM, and .HTML files are overwritten with the virus code. The content of all other files is deleted, leaving them with 0 bytes of data.
The following registry keys are created:
* HKEY_LOCAL_SYSTEMSoftwareMicrosoftWindowsCurrentVersion
RunNAV DefAlert=C:WINDOWShelpmmsn_offline.htm
* HKEY_CURRENT_USERSoftwareTheGravebadUsersv2.0
Peaz..