Classification

Category :

Malware

Type :

-

Aliases :

Eyeveg, Eyeveg, W32/Lorac.A, W32/Eyeveg, Worm.Win32.Eyeveg

Summary

Eyeveg is a network worm with password stealing and backdoor capabilities.

Removal

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

When run, the worm installs itself to system. It copies its file with a random name to Windows System folder and creates a startup key for this file in System Registry:

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]  "" = "%WinSysDir%\.exe"   

where <random_str> is a string of random ASCII characters and %WinSysDir% is Windows System folder name.

Then the worm activates its local network spreading thread. First it sleeps for some time and then enumerates network shares and tries to copy itself to remote computers. The worm copies its file as EXPLORE.EXE to startup folders of remote computers. When those computers are restarted, the worm's file there will be activated and the computers will become infected.

After that the worm starts another thread. It again waits for some time and then enumerates cached passwords, reads proxy server settings from the Registry and sends all this data to a hacker by email.

The worm has backdoor (hacker's remote access tool) capabilities. A hacker can perform the following actions using the backdoor:

  • 1. Upload files to 'www.melaniecarroll.biz' server
  • 2. Download files from 'www.melaniecarroll.biz' server
  • 3. Find files
  • 4. Copy files
  • 5. Start files
  • 6. Delete files
  • 7. List files
  • 8. Get system information

During its operation the worm creates files with random names and TMP extension in the temporary folder. These file names start with '~' character.