Virus Profile: VBS/Amalad.a

Threat Search
Print
   
Virus Profile information details
Risk Assessment: Home Low | Corporate Low
Date Discovered: 9/11/2002
Date Added: 9/12/2002
Origin: Unknown
Length: 122,664
Type: Virus
Subtype: VbScript
DAT Required: 4223
Removal Instructions
   
 
 
   

Description

This is a virus detection. Viruses are programs that self-replicate recursively, meaning that infected systems spread the virus to other systems, which then propagate the virus further. While many viruses contain a destructive payload, it's quite common for viruses to do nothing more than spread from one system to another.

Indication of Infection

The presence of the file OsamaLaden.vbs in the windows directory, windows SYSTEM directory and windows TEMP directory. The following registry key entries:

  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RegisteredOwner, "OsamaBinLaden"
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OsamaBinLaden, "wscript.exe c:\Windows\System\OsamaLaden.vbs %
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OsamaLaden, "C:\OsamaLaden.bat"

Methods of Infection

Executing the infected script will directly infect the system.

Aliases

VBS/Nedal-A (Sophos)
   

Virus Characteristics

This threat is detected as VBS/Amalad and is detected with the 4114 DATs (or greater) as New Script with heuristics turned on. When the VBScript file is executed, the virus will copy itself as OsamaLaden.vbs in the Windows directory, Windows SYSTEM directory and Windows TEMP directory.

The virus will also edit the following registry keys:

  • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RegisteredOwner, "OsamaBinLaden"
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OsamaBinLaden, "wscript.exe c:\Windows\System\OsamaLaden.vbs %
  • HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\OsamaLaden, "C:\OsamaLaden.bat

It has been observed by other anti-virus vendors to mass mail with the subject line "Osama Bin Laden Comes Back!" and to drop the executable and batch files - osama.exe, laden.exe, alta.exe, Laden.bat and OsamaLaden.bat. Due to errors in the virus code, these files will not be created nor will mass mailing occur.

   
Use specified engine and DAT files for detection and removal. Delete any file which contains this detection.

Manual Removal Instructions - Simply delete the file(s) mentioned in this description
- Remove any registry key entries if applicable

Using File Filtering with WebShield SMTP for WindowsNT(not applicable for Solaris):
Within the Configuration console select content filtering.
Select Add.
Add a Description for the content filter rule such as VBSBlock.
Select Filter on Attachment File name.
Filter on .vbs
Select OK.

AVERT Recommended Updates:

* Office2000 Updates

* scriptlet.typelib/Eyedog vulnerability patch

* Outlook as an email attachment security update

* Exchange 5.5 post SP3 Information Store Patch 5.5.2652.42 - this patch corrects detection issues with GroupShield

For a list of attachments blocked by the Outlook patch and a general FAQ, visit this link.
Additionally, Network Administrators can configure this update using an available tool - visit this link for more information.

   

PC Infected? Get Expert Help

McAfee
Virus Removal Service

Connect to one of our Security Experts by phone. Have your PC fixed remotely - while you watch!

$89.95