r

Posted 27th September 2001

Vote Virus/Worm W32

Vote.B@mm is a mass-mailing worm that is written in Visual Basic. When it is executed, it emails itself to all email addresses in the Microsoft Outlook address book. The worm inserts three .vbs files on the system. It also modifies the Internet Explorer home page.

W32.Vote.B@mm is a variant of W32.Vote.A@mm. The main differences are as follows.

It inserts three VBS scripts instead of two. The file name has been modified. The subject and message of the email have changed. Antivirus program files are not deleted.

NOTE: Some of the inserted files are the same as in W32.Vote.A@mm, so they will be detected as in W32.Vote.A@mm.

Type: Worm Infection Length: 56,832 bytes Virus Definitions: September 26, 2001

Comment

A NEW WORM that can delete files from infected hard drives is using the terrorist attacks of two weeks ago, as well as the expected U.S. military response, to trick users into executing it, according to Ian Hameroff, business manager for security solutions at Computer Associates International (CA). Exact details of how the worm works, however, are not yet clear as different security companies have different analyses.

The worm, dubbed "Vote" by CA due to its message, is a mass mailer that sends itself to e-mail addresses harvested from the Windows address book of infected systems, Hameroff said. Along with sending large amounts of e-mail, the worm also overwrites HTML files on the infected computer and can delete the system's Windows directory and reformat the hard drive when the machine is restarted, he said. Vote arrives in an in-box with the subject line "Peace between America and Islam," Hameroff said. The body text of the e-mail reads "Hi. Is it a war against America or Islam? Let's vote to live in peace." Included in the e-mail is an attached document called WTC.exe, Hameroff said. When the attachment is double-clicked, the computer is infected.

Once the infection has occurred, all HTML files on the system are changed to include the text, "America a few days we will show you what we can do. It's our turn. Zacker is sorry for you," Hameroff said. Additionally, Vote attempts to delete all the files in the system's Windows directory if the infected system is rebooted, he said. Anti-virus company Trend Micro has also seen the Vote worm, but has seen it act differently, according to a spokeswoman. Vote is a VBS (Visual Basic Script) that deletes some files used by anti-virus programs and changes the start-up page for Internet Explorer, according to Trend. Trend's details are still sketchy, although it also has found the feature of reformatting the hard drive on reboot, which it attributes to a modification of the Autoexec.bat file in DOS. Vote is seen as a low-risk worm by Network Associates -- which owns the McAfee group of anti-virus companies and products -- according to Vincent Gullotto, senior director of McAfee's AVERT labs. McAfee has only seen a handful of cases of the worm, all isolated to North America, he said. There have been no confirmed infections of the virus so far seen by McAfee, he added.

Vote is "clearly a message that's trying to prey on people," he said, adding that "it might have some success" given recent events and the possibility that users will confuse it with a benign PowerPoint presentation about New York that's making the rounds. Although McAfee products have been able to detect the worm via heuristics for a while, the company will also release an update to block it soon, he said.

When anti-virus programs are run in heuristics mode, they can block code that shares characteristics with malicious code, even if the anti-virus program does not have a specific definition for the code it's blocking. Whether the worm takes hold and infects many PCs will depend on home users, as corporate networks are likely well-protected against infection, he said.

Vote is not yet widespread, although it only began showing up Monday morning, CA's Hameroff said. Infections by the virus can be prevented if users do not open attachments or if companies filter .exe attachments so that they are not allowed into the corporate network. "If any company is allowing executable files past their servers and into their environment, this is a key time to re-evaluate that policy," Hameroff said.

.