1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar






Welyah is a mass-mailer worm that is 110 kilobytes in size and was written in Visual Basic.

The worm utilises it's own SMTP engine so it does not depend on Outlook for e-mail sending. The recipient addresses are collected from different files in the system, e.g: *.wab files (Windows Address Book), *.mbx (Mailbox).

Disinfection & Removal

Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.

Technical Details

Messages sent by Welyah look like this:

The attachment name is disguised as a text file but it has .pif extension that is not visible because of the many space characters before it.

The worm also uses the IFRAME vulnerabilty that makes Outlook to execute the attachment automatically. More information on the vulnerabilty can be found at http://www.microsoft.com/windows/ie/downloads/critical/q323759ie/default.asp

When the attachment in executed it copies itself to the Windows directory as 'Winl0g0n.exe' and adds it to the runkeys in the registry as


so the worm will be started when Windows starts up.

Technical Details: Gergely Erdelyi; F-Secure Corp.; 20th of December, 2001

Submit a sample

Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.