This detection is for a worm that attempts to copy itself to the root of any accessible disk volumes. Additionally it attempts to place an Autorun.inf file on the root of the volume so that it is executed the next time the volume is mounted.
- Microsoft - Worm:Win32/Hamweq.A
- Symantec - W32.SillyDC
- Trend Micro - WORM_VERST.SM
- F-prot - W32/Worm.APCA
- Kaspersky - Worm.Win32.Agent.wm
Indication of Infection
Presence of above mentioned files and registry activities.
Methods of Infection
This worm may be spread by its intended method of infected removable drives. Alternatively this may be installed by visiting a malicious web page (either by clicking on a link), or by the website hosting a scripted exploit which installs the worm onto the user's system with no user interaction.