VBS/NewLove.A uses Microsoft Outlook to spread in e-mail messages.
The message that it sends looks like this:
Subject: FW: (random_file_name.ext)
The worm replicates in an attachment with a random file name that has
".vbs" added to it. For example, "REPORT.DOC.vbs" or "Information on
Jacks Birthday.txt.vbs". VBS/NewLove takes the random name from the
recently opened files directory. If there is no files in that
directory, it generates the name.
If the attachment is opened with the Notepad, the code of the worm can
Then the worm sends itself to each recipient in each Outlook address
book - just like VBS/LoveLetter.
VBS/NewLove.A copies itself - with a random name - to the Windows
System directory and to the Windows directory. It adds itself to the
registry with a random key to the following registry hives:
Then the worm will go through all drives and subdirectories. For
each file, the worm creates a new file using the same name with an
additional extension ".vbs" and deletes the original file.
After this the machine can not boot any longer.
VBS/NewLove.A was reported to be somewhat in-the-wild on 19th of May,
2000. Detection of this worm was added to F-Secure Anti-Virus on
11:00 GMT 19th of May, 2000.
[Analysis: Katrin Tocheva and Sami Rautiainen, F-Secure]