Eyeveg is a network worm with password stealing and backdoor capabilities.
Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.
More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.
You may also refer to the Knowledge Base on the F-Secure Community site for more information.
When run, the worm installs itself to system. It copies its file with a random name to Windows System folder and creates a startup key for this file in System Registry:
" = "%WinSysDir%\ .exe"
where <random_str> is a string of random ASCII characters and %WinSysDir% is Windows System folder name.
Then the worm activates its local network spreading thread. First it sleeps for some time and then enumerates network shares and tries to copy itself to remote computers. The worm copies its file as EXPLORE.EXE to startup folders of remote computers. When those computers are restarted, the worm's file there will be activated and the computers will become infected.
After that the worm starts another thread. It again waits for some time and then enumerates cached passwords, reads proxy server settings from the Registry and sends all this data to a hacker by e-mail.
The worm has backdoor (hacker's remote access tool) capabilities. A hacker can perform the following actions using the backdoor:
During its operation the worm creates files with random names and TMP extension in the temporary folder. These file names start with '~' character.
Detection of Eyeveg worm was added in the following updates:
Detection Type: PC