Lovelorn is a simple mass-mailer virus with built-in SMTP engine,
password stealing routines and several payloads.
It was found on April 29th, 2003.
Lovelorn recursively searches through C: D: and E: drives. It tries
to collect email addresses from files that have '.EML', '*ITEM*.DBX'
or '*BOX*.DBX' in their name.
The e-mails sent by the virus are created using the following
Subject: Re:baby!your friend send this file to you !
Body: Read this file
Subject: Re:Get Password mail...
Subject: There're some Passwords here
Body: Read File at
Body: run File Attach to extract:BinladenSexy.jpg...
Subject: The Sexy story and 4 sexy picture of BINLADEN !
Body: Enjoy! BINLADEN:SEXY..
Subject: Re:I Love You...OKE!
Body: Souvenir for you from file attach...
Subject: A Greeting-card for you .
Body: See the Greeting-card .
Subject: Re:Kiss you..^@^
Body: Read file attach
Subject: Guide to f*ck ...
Body: I like Sexy with you.
Subject: Re:Baby! 2000USD,Win this game...
Body: Play the game from file attach
The "From" address of these e-mails are always set to be one of the
'email@example.com', 'firstname.lastname@example.org' or 'email@example.com'.
The emails are sent with an attachment that is either the worm in BASE64
encoded format ('*.Kiss.ok.exe') or an HTML file dropper file ('*.htm')
(see the "Script Part" below).
Lovelorn monitors the running windows and tries to steal sensitive
user information (eg. Yahoo login and password). If it manages to
find some it sends it to a predefined email address.
The worm has several payloads. First of all it kills some processes that
belong to certain antivirus applications.
On certain dates Lovelorn drops a text file the root of the system drive
(which is most often C:) as 'NQHv1.0.txt' and opens it with notepad.exe:
'MISS MY FATHER,MY MOTHER, NQHLLv1.0 '
The dropped Setup.htm uses Visual Basic Script to create a binary file
temp.exe in Windows Temp folder. Then it runs this binary file
which is the worm code. The HTML body contains a string
'Tinh`cho khong bieu'
which is visible for 5 seconds. After that the script deletes
itself (Setup.htm) so no traces of it are left on the infected
F-Secure Anti-Virus detects Lovelorn worm with the updates published
on April 29th, 2003:
[Analysis: M. Hypponen, K. Tocheva, S. Rautiainen, G. Erdelyi; F-Secure Corp., April 29th, 2003]