Threat Description

Fever

Details

Category: Malware
Type: Worm
Platform: W32
Aliases: Fever, Yellow Fever, W32.Yellow.worm, W32/Fever

Summary


Fever is an Internet worm that spreads itself as an attachment to email messages. The worm works under Win32 systems only. The worm itself is a PE executable about 8 kb long and is compressed with Petite file compressor.



Removal


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More scanning & removal options

More information on scanning or removal options is available in the documentation for your F-Secure security product on the Downloads section of our Home - Global site.

You may also refer to the Knowledge Base on the F-Secure Community site for more information.

Contact Support

For further assistance, F-Secure customers can request support online via the Request support or the Chat forms on our Home - Global site.



Technical Details


When the worm attachment is opened, it activates and first checks if the system is already infected. If not, it tries to copy itself to Windows System directory with a random name (the name is generated from a victim computer's name and looks like this '*32.EXE', for example 'BM32.EXE').

On Windown 9x systems the worm adds a startup key for its file to the following key in the Registry:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices  

On Windows NT systems the worm uses Service Control Manager to register itself as a service.

As a result of the above manipulations, Windows will launch the worm's file automatically at every startup.

The worm uses Windows debugging capabilities to capture WSOCK32.DLL loading and modifies the beginning of 'send' function so that it will give control to the worm's code when called. This way the worm can intercept and analyse the outgoing traffic. It captures SMTP commands to get the e-mail addresses. Whenever an email is sent, the worm remembers the sender's and recepient's e-mail addresses and sends a copy of itself to the recepient of the previous e-mail.

The infected e-mail message sent by Fever worm looks like that:

From: sender@address  To: recepient@address  Subject: pic.gif  [empty body]  

The worm's file with .SCR extension is attached to every message.

The worm contains the following text strings:

'[ Yellow Fever BioCoded by GriYo / 29A ]'  '[ Disclaimer: This software has been designed for research purposes only.  The author is not responsible for any problems caused due to improper or  illegal usage of it ]'  




Technical Details:Gergely Erdelyi, F-Secure Corp.; May 2001


SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More