This type of worm is embedded in an email attachment, and spreads using the infected computer's emailing networks.
Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.
Find the latest advice in our Community Knowledge Base.
See the manual for your F-Secure product on the Help Center.
Submit a file or URL for further analysis.
Email-Worm:W32/Lovelorn is a simple mass-mailer virus with a built-in SMTP engine, password stealing routines and several payloads. It was found on April 29th, 2003.
Lovelorn recursively searches through C: D: and E: drives. It tries to collect email addresses from files that have '.EML', *ITEM*.DBX' or '*BOX*.DBX' in their name. The emails sent by the virus are created using the following hardcoded elements:
The "From" address of these emails are always set to be one of the following addresses:
The emails are sent with an attachment that is either the worm in BASE64 encoded format ('*.Kiss.ok.exe') or an HTML file dropper file ('*.htm') (see the "Script Part" below).
Lovelorn monitors the running windows and tries to steal sensitive user information (eg. Yahoo login and password). If it manages to find some it sends it to a predefined email address.
The worm has several payloads. First of all it kills some processes that belong to certain antivirus applications. On certain dates Lovelorn drops a text file the root of the system drive (which is most often C:) as 'NQHv1.0.txt' and opens it with notepad.exe:
The dropped Setup.htm uses Visual Basic Script to create a binary file temp.exe in Windows Temp folder. Then it runs this binary file which is the worm code. The HTML body contains a string
which is visible for 5 seconds. After this, the script deletes itself (Setup.htm) so no traces of it are left on the infected system.