Home > Threat descriptions >

Email-Worm:W32/Zhelatin.CT

Classification

Category: Malware

Type: Email-Worm

Aliases: Email-Worm:W32/Zhelatin.CT

Summary


The Zhelatin.CT worm started to spread on April 13th, 2007. The worm spreads in emails with love-related subjects and with attachments named "Love Card.exe", "Greeting Card.exe" and so on. A bit later the same variant spread using security-related subjects.

Removal


Automatic action

Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.

Knowledge Base

Find the latest advice in our Community Knowledge Base.

About the product

See the manual for your F-Secure product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details


The functionality of the Zhelatin.CT worm variant is similar to Zhelatin.CQ , however the subjects and attachment names it uses are different.

On April 13th several emails with love themed subjects were seen in the wild. While some of the subjects are a rehash of previously used subjects such as Sending You My Love, The Dance of Love, and When I'm With You, others are new:

  • A Dream is a Wish
  • A Is For Attitude
  • Eternal Love
  • Eternity of Your Love
  • Falling In Love with You
  • Hugging My Pillow
  • Inside My Heart
  • Kisses Through email
  • Our Journey
  • Sent with Love
  • When Love Comes Knocking
  • You're In My Thoughts
  • You're the One

The email messages themselves have no text, instead, they have attached executables with romantic sounding filenames. These include:

  • Love Card.exe
  • Love Postcard.exe
  • Greeting Card.exe
  • Postcard.exe

Here is an example of the worm's email:

A second run occurred after a few hours. This time, the subjects were security related:

  • ATTN!
  • Spyware Alert!
  • Virus Alert!
  • Worm Alert!
  • Worm Detected!

Furthermore, the message body is an image file which advises the receiver to patch their systems. Also included within the image is a password in order to extract the attachment. Here is an example:

Something new to the Zhelatin family is the use of a password protected Zip archive as an attachment. The filenames vary but they have the following format:

  • patch-[4 to 5 random numerical characters].zip
  • hotfix-[4 to 5 random numerical characters].zip

The executable contained within the Zip archive has the same name as that of the archive but with an EXE extension.