Threat Description

Worm:​JS/Quickspace.A

Details

Aliases: Worm:​JS/Quickspace.A, JS/Quickspace.A
Category: Malware
Type: Worm
Platform: JS

Summary



A standalone malicious program which uses computer or network resources to make complete copies of itself. May include code or other malware to damage both the system and the network.



Removal



Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.



Technical Details



Worm:JS/Quickspace.A is a worm that is designed to spread through the profile pages of Social Networking website MySpace. Infected pages are modified to contain links to a Phishing site that asks for the user's logon details and an embedded link to a copy of this worm.

Infection Method

Visiting an infected site will trigger the infection of this worm. The infected site contains an embedded malicious QuickTime movie (MOV) file (detected as JS/Quickspace.A) that is downloaded onto the system. This MOV file takes advantage of the QuickTime feature that enables MOV files to contain executable JavaScript functions. It will then execute the malicious JavaScript code snippet contained within, which will download a JavaScript file from the following links:

  • http://almobty.com/css/[REMOVED].js
  • http://www.cake.fi/images/[REMOVED].js
  • http://www.daviddraftsystem.com/images/[REMOVED].js
  • http://www.tm-group.co.uk/images/[REMOVED].js

This will then modify the user's MySpace profile page if it exists. It does so by replacing the legitimate MySpace header with a new one. The new header will still contain the menu for different MySpace functions but will be directed to a fake login site.

The profile page will also be modified to contain an embedded link of the MOV file. The embedded links points to the following paths:

  • http://almobty.com/css/[REMOVED].mov
  • http://www.cake.fi/images/[REMOVED].mov
  • http://www.daviddraftsystem.com/images/[REMOVED].mov
  • http://www.tm-group.co.uk/images/[REMOVED].mov

Succeeding visits to this profile page will trigger the worm infection.

Phishing Details

The fake login page is redirected with the new replaced header that is designed to appear as a legitimate MySpace login site. However, it is a phishing site that asks for the login details of the MySpace user.

Upon clicking on the submit button, the information will be posted on the following site:

  • http://www.tmi.edu/graphics/login.php

Spam Details

Spam messages may also be sent to users who provide their login details. The spam emails have the following details:

Subject - Any one of the following:

  • better see this one last time lol..
  • Hehe that was so funny..
  • omg did you see this last nite..
  • what else is there to do on a Sunday.?.......
  • whos coming to the party tonight.?..
  • You better not forget about this..

Body:

  • [a pornographic image that links to an adult themed site]





SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More