Virus Profile: VBS/Irvine@MM

Threat Search
Virus Profile information details
Risk Assessment: Home Low | Corporate Low
Date Discovered: 7/20/2003
Date Added: 12/24/2003
Origin: Unknown
Length: 3,639 Bytes
Type: Virus
Subtype: VbScript
DAT Required: 4141
Removal Instructions


This is a virus detection. Viruses are programs that self-replicate recursively, meaning that infected systems spread the virus to other systems, which then propagate the virus further. While many viruses contain a destructive payload, it's quite common for viruses to do nothing more than spread from one system to another.

Indication of Infection

The presence of the above files and registry keys.

Methods of Infection

Executing the infected VBScript.

Virus Characteristics

This threat is detected as VBS/Generic@MM The virus may arrive by email with the attachment postal.jpg.vbs. On executing the infected VBScript, the virus will check to see if it is already infected by checking for the registry key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Irvine.  If this does not exist, the virus will copy itself as service.dll.vbs into the windows and windows SYSTEM directory.  It will modify the following registry key:

  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
    Run\Microsoft_Service","""wscript.exe " [windows directory]\system\service.dll.vbs"/background"
  • HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\

It will open the internet browser to the site

The virus will create the folder \Archivos_Compartidos in the windows directory. It will copy itself to this file as the following names:

  • Tera Patrick.avi.vbs
  • Pamela Anderson Tommy Lee.avi.vbs
  • Jennifer Lopez Desnuda.jpg.vbs
  • Tatu Video.avi.vbs
  • Hackear Cuenta Hotmail.txt.vbs
  • postal.jpg.vbs

The following registry key will be modified:
HKEY_CURRENT_USER\Software\Kazaa\LocalContent\DownloadDir", [windows directory]\system\Archivos_Compartidos

Using Outlook, the virus will email itself to all in the addresslist, with the following information:
Subject = ¡Mira que pedazo de postal!
Body = Esta postal tan graciosa me ha recordado a ti
Attachment= postal.jpg.vbs

If date is the 5th of any month, the virus will display the following message:

and will copy itself as [random number].dll.vbs in either the windows, windows SYSTEM or the windows TEMP directory.

Use current engine and DAT files for detection and removal.

Using File Filtering with WebShield SMTP for WindowsNT(not applicable for Solaris):
Within the Configuration console select content filtering.
Select Add.
Add a Description for the content filter rule such as VBSBlock.
Select Filter on Attachment File name.
Filter on .vbs
Select OK.

Additional Windows ME/XP removal considerations

AVERT Recommended Updates:

* Office2000 Updates

* scriptlet.typelib/Eyedog vulnerability patch

* Outlook as an email attachment security update

* Exchange 5.5 post SP3 Information Store Patch 5.5.2652.42 - this patch corrects detection issues with GroupShield

For a list of attachments blocked by the Outlook patch and a general FAQ, visit this link.
Additionally, Network Administrators can configure this update using an available tool - visit this link for more information.


PC Infected? Get Expert Help

Virus Removal Service

Connect to one of our Security Experts by phone. Have your PC fixed remotely - while you watch!