For Consumer

Virus Profile: VBS/Terrosist.ow

Threat Search
Print
   
Virus Profile information details
Risk Assessment: Home Low | Corporate Low
Date Discovered: 4/9/2003
Date Added: 5/23/2003
Origin: Unknown
Length: Varies
Type: Virus
Subtype: VbScript
DAT Required: 4257
Removal Instructions
   
 
 
   

Description

This is a virus detection. Viruses are programs that self-replicate recursively, meaning that infected systems spread the virus to other systems, which then propagate the virus further. While many viruses contain a destructive payload, it's quite common for viruses to do nothing more than spread from one system to another.

Indication of Infection

Existence of the files and registry keys mentioned above.

Methods of Infection

Running of the infected .htm file.

Aliases

VBS.Redlof.C (CA), VBS.Redlof.e (AVP), VBS.Terrosist (Symantec)
   

Virus Characteristics

This is a file infecting VBScript virus that infects files with extension .htt, .htm, .html, .asp, .php and .jsp.

When run, it first checks the registry. If the following registry key value exists:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
    "RegisteredOwner" = "Indonesian Today"
The virus will create the following registry key/value:
  • HKEY_CURRENT_USER\Control Panel\International\
    "s1159" = "Anti AS"
    "s2359" = "Anti Shit"
    "sTimeFormat" = "HH:mm:ss tt"
  • HKEY_CURRENT_USER\Software\Classes\CLSID\
    {20D04FE0-3AEA-1069-A2D8-08002B30309D}\" = "My Komputer"
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\
    "RegisteredOwner" = "Indonesian Today"
    "RegisteredOrganization" = "We love peace"
    "OrgOrganization" = "Under Ground Indonesian"
    "OrgOwner" = "We love peace!"
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\
    "Hidden"= 1,"REG_DWORD"
  • HKEY_CURRENT_USER\Software\MicrosoftWindows\CurrentVersion\Explorer\Advanced\
    "HideFileExt" = 1
  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\
    Local Page" = "system\blank.htm"
  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\
    Start Page" = "system\blank.htm"

The virus copies itself to following location:

  • %WinDir%\System\Blank.htm
  • %WinDir%\Web\Folder.htt
  • %WinDir%\System32\Folder.htt
  • %WinDir%\Folder.htt
If above files exist, the virus will overwrite the files. It also modifies %WinDir%\Web\Webview.css file. When the folder option is set to web view, the virus body will be executed.

The virus searches the current folder for file of extension .htt, .htm, .html, .asp, .php, .jsp. If any file is found, it appends the virus body after the file content.

If the current date time is the 30th of even number month, it will rename the following files in the Windows directory:

  • win.ini to won.chk
  • system.ini to system.chk
   

All Users:
Use current engine and DAT files for detection and removal.

Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).

But in some particular cases, the following steps need to be taken.

Please go to the Microsoft Recovery Console and restore a clean MBR.

On Windows XP:

  • Insert the Windows XP CD into the CD-ROM drive and restart the computer.
  • When the "Welcome to Setup" screen appears, press R to start the Recovery Console.
  • Select the Windows installation that is compromised and provide the administrator password.
  • Issue 'fixmbr' command to restore the Master Boot Record
  • Follow onscreen instructions.
  • Reset and remove the CD from CD-ROM drive.


On Windows Vista and 7:

  • Insert the Windows CD into the CD-ROM drive and restart the computer.
  • Click on "Repair Your Computer".
  • When the System Recovery Options dialog comes up, choose the Command Prompt.
  • Issue 'bootrec /fixmbr' command to restore the Master Boot Record.
  • Follow onscreen instructions.
  • Reset and remove the CD from CD-ROM drive.