For Consumer

Virus Profile: VBS/Aqui

Threat Search
Print
   
Virus Profile information details
Risk Assessment: Home Low | Corporate Low
Date Discovered: 7/25/2003
Date Added: 12/23/2003
Origin: Unknown
Length: 621 Bytes
Type: Virus
Subtype: VbScript
DAT Required: 4131
Removal Instructions
   
 
 
   

Description

This is a virus detection. Viruses are programs that self-replicate recursively, meaning that infected systems spread the virus to other systems, which then propagate the virus further. While many viruses contain a destructive payload, it's quite common for viruses to do nothing more than spread from one system to another.

Indication of Infection

Internet browser executing to the above URL sites.  

Methods of Infection

Executing the infected VBScript.

Aliases

VBS/Aqui-A
   

Virus Characteristics

This threat is detected as VBS/SWVK.ow.gen.  On executing the infected VBScript, the virus willl overwrite all files found in the same directory as the infected VBScript.

If date is between the 1st till the 15th of any month, the virus will create a shortcut yonkis.url, which points to the URL http://www.yonkis.com .  On any other day, the virus will create the shortcut fresonMagic.url, which points to the URL http://www.fresonmagic.com .

   
Use current engine and DAT files for detection and removal.

Using File Filtering with WebShield SMTP for WindowsNT(not applicable for Solaris):
Within the Configuration console select content filtering.
Select Add.
Add a Description for the content filter rule such as VBSBlock.
Select Filter on Attachment File name.
Filter on .vbs
Select OK.

Additional Windows ME/XP removal considerations

AVERT Recommended Updates:

* Office2000 Updates

* scriptlet.typelib/Eyedog vulnerability patch

* Outlook as an email attachment security update

* Exchange 5.5 post SP3 Information Store Patch 5.5.2652.42 - this patch corrects detection issues with GroupShield

For a list of attachments blocked by the Outlook patch and a general FAQ, visit this link.
Additionally, Network Administrators can configure this update using an available tool - visit this link for more information.