This description is for two detections: Email-Worm:W32/Anito.A and Worm:W32/Anito.A.
Email-Worm:W32/Anito.A is an email worm and a file infector. It sends out email messages with a URL to a malicious file that contains the recently discovered (March/April 2007) ANI exploit. The worm also drops another malware, a worm and trojan-downloader that we detect as Worm:W32/Anito.A. This worm is similar to the one that we detect as Trojan-Downloader.Win32.Agent.bky and Worm.Win32.Diska.c.
Worm:W32/Anito.A is a worm, a file infector and a trojan-downloader. It infects HTML files with a small script that downloads a file with a recently discovered ANI file exploit. Also EXE files get infected. The worm also spreads to remote drives, modifies the HOSTS file, and downloads more malicious files onto an infected computer.
Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.
A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:
Check for the latest database updates
First check if your F-Secure security program is using the latest updates, then try scanning the file again.
Submit a sample
After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.
Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.
Exclude a file from further scanning
If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.
Note: You need administrative rights to change the settings.
After the worm's file is run, it copies itself as sysload3.exe into the Windows System folder and creates a startup entry for the copied file in the Registry:
This is done to ensure that worm starts every time Windows is loaded. After installation the worm starts Internet Explorer and Notepad and injects a part of its code into those processes. That code creates two remote threads that create mutexes named "MyDownload" and "MyInfect".
The first remote thread connects to the Internet and downloads a configuration file named css.css from a website. The file is saved locally with the name config.ini. The configuration file contains URLs to the following:
The worm downloads and runs additional files, replaces the Windows HOSTS file with the one downloaded from Internet, downloads an updated copy of itself, and opens a statistics URL in Internet Explorer.
Then this remote thread tries to send out email messages. It reads SMTP server settings from a downloaded configuration file or uses hard-coded settings (the "smtp.sohu.com" server is used in this worm variant). The email messages sent by the worm are in Chinese. They contain a URL to the HTML page that points to a file with the recently discovered ANI exploit. (March/April 2007).
The second remote thread creates and runs the original EXE file in case the worm started from an infected file. Then it scans local and remote drives from Z: to B: for files with .EXE extensions and infects them if their size is in the range of 10240 and 10485760 bytes. The worm prepends to the found EXE files and "borrows" their icons. So besides the file size increase, this change remains unnoticed to a user.
In addition the worm scans files with the following extensions:
It inserts a small script code into such files above. The script points to a file located at the "macr.microfsot.com" website (notice the deliberate typo!). According to the reports there was a file with the recently discovered ANI exploit there. By the time of this description's creation the site was down.
Also, the worm attempts to copy itself to removable drives together with the autorun.inf file. As a result, when an infected removable media is inserted into a computer where autostart is enabled, the worm's file gets activated and a new infection round is started.
After the worm's file is run, it copies itself as sysload3.exe into the Windows System folder and creates a startup entry for the copied file in the Registry:
This is done to ensure that worm starts every time Windows is loaded. After installation the worm starts Internet Explorer and Notepad and injects a part of its code into those processes. That code creates two remote threads that create mutexes named "MyDownload" and "MyInfect".
The first remote thread connects to the Internet and downloads a configuration file named css.css from a website. The file is saved locally with the name config.ini. The configuration file contains URLs to the following:
The worm downloads and runs additional files, replaces the Windows HOSTS file with the one downloaded from Internet, downloads an updated copy of itself, and opens a statistics URL in Internet Explorer. After the worm replaces the HOSTS file, access is blocked to the following websites:
The second remote thread creates and runs the original EXE file in case the worm started from an infected file. Then it scans local and remote drives from Z: to B: for files with .EXE extensions and infects them if their size is in the range of 10240 and 10485760 bytes. The worm prepends to the found EXE files and "borrows" their icons. So besides the file size increase, this change remains unnoticed to a user.
Also, the worm attempts to copy itself to removable drives together with the autorun.inf file. As a result, when an infected removable media is inserted into a computer where autostart is enabled, the worm's file gets activated and a new infection round is started.
It should be noted that previous versions of this worm appended a small script to HTML files. The script pointed to a website where the recently discovered ANI exploit was located. This particular worm variant does not infect HTML files.