1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar






Expiro.A is a Windows executable file infecting virus. It is also capable of stealing credit card information gathered from the affected machine.

Disinfection & Removal

Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.

Technical Details

Expiro.A is a Windows executable file infecting virus. It is also capable of stealing credit card information gathered from the affected machine.Upon execution, this virus recursively looks for link files (.LNK) inside drives C: to Z: starting from the root directory and subdirectories and tries to infect the link's target Windows executable.Infected files grow in size and four additional sections are appended at the end of each file. The following describes the appended section details which includes the name, virtual size and physical size, respectively.

  • .data 00020000 0000EA00
  • .text 0000AD40 0000AD40
  • .bss 00005BD8 00000000
  • .data 00001A00 00001A00

Expiro.A creates a duplicate file alongside of infected files named with an .IVR extension. This identifies files it has already infected.Example:

  • %windir%\system32\notepad.exe %windir%\system32\notepad.ivr

This virus steals credit card information via a keylogger scheme. While the virus is active in memory, it monitors and logs credit card information and steals user input data that may be triggered when browsing one of these sites:

  • 53bank.com
  • banking.halifax-online.co.uk
  • barclays.com
  • chechenpress.info
  • crutop.nu
  • ebay.com
  • goldpoll.com
  • goldpoll.com
  • goldpoll.com
  • intgold.com
  • kavkazcenter.com
  • kgbrelaxclub.ru
  • kidos-bank.ru
  • master-x.com
  • myonlineaccounts2.abbeynational.co.uk
  • new.egg.com
  • olb2.nationet.com
  • online-business.lloydstsb.co.uk
  • openbank.com
  • paypal.com
  • seclab.ru
  • securitylab.ru
  • stormpay.com
  • tat-neftbank.ru
  • totallyfreebanking.com
  • welcome3.smile.co.uk
  • www.allahabadbank.com
  • www.b2b-trust.com
  • www.bank-banque-canada.ca
  • www.bankofindia.com
  • www.bankofmadura.com
  • www.bbin.ru
  • www.bmo.com
  • www.candidateverifier.com
  • www.cbr.ru
  • www.cibc.com
  • www.cwbank.com
  • www.icbank.ru
  • www.kmb.ru
  • www.lbcdirect.laurentianbank.ca
  • www.mmbank.ru
  • www.nbc.ca
  • www.netmagister.com
  • www.ponziscams.com
  • www.ponziscams.com
  • www.ponziscams.com
  • www.ponziscams.com
  • www.ponziscams.com
  • www.ponziscams.com
  • www.ponziscams.com
  • www.rbc.com
  • www.socks.ac
  • www.uniastrum.ru
  • www.vendorsname.ws
  • www.vendorsname.ws
  • www.vendorsname.ws
  • www.vendorsname.ws
  • www.vtb.ru
  • www.worldbank.org
  • www1.hsbc.ca
  • yambo.biz

Expiro.A creates the following mutex when it is running and active in memory:

  • kkq-vx_mtx1


F-Secure Anti-Virus detects this malware with the following updates:

Detection Type: PC
Database: 2007-03-12_01

Description Created: 2007-03-13 14:40:21.0
Description Last Modified: 2007-03-15 15:34:12.0

Submit a sample

Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.