Category :


Type :


Aliases :

Worm:JS/Quickspace.A, JS/Quickspace.A


Worm:JS/Quickspace.A is a worm that is designed to spread through the profile pages of Social Networking website MySpace. Infected pages are modified to contain links to a Phishing site that asks for the user's logon details and an embedded link to a copy of this worm.


Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

Infection Method

Visiting an infected site will trigger the infection of this worm. The infected site contains an embedded malicious QuickTime movie (MOV) file (detected as JS/Quickspace.A) that is downloaded onto the system. This MOV file takes advantage of the QuickTime feature that enables MOV files to contain executable JavaScript functions. It will then execute the malicious JavaScript code snippet contained within, which will download a JavaScript file from the following links:

  • https://almobty.com/css/[REMOVED].js
  • https://www.cake.fi/images/[REMOVED].js
  • https://www.daviddraftsystem.com/images/[REMOVED].js
  • https://www.tm-group.co.uk/images/[REMOVED].js

This will then modify the user's MySpace profile page if it exists. It does so by replacing the legitimate MySpace header with a new one. The new header will still contain the menu for different MySpace functions but will be directed to a fake login site.

The profile page will also be modified to contain an embedded link of the MOV file. The embedded links points to the following paths:

  • https://almobty.com/css/[REMOVED].mov
  • https://www.cake.fi/images/[REMOVED].mov
  • https://www.daviddraftsystem.com/images/[REMOVED].mov
  • https://www.tm-group.co.uk/images/[REMOVED].mov

Succeeding visits to this profile page will trigger the worm infection.

Phishing Details

The fake login page is redirected with the new replaced header that is designed to appear as a legitimate MySpace login site. However, it is a phishing site that asks for the login details of the MySpace user.

Upon clicking on the submit button, the information will be posted on the following site:

  • https://www.tmi.edu/graphics/login.php

Spam Details

Spam messages may also be sent to users who provide their login details. The spam emails have the following details:

Subject - Any one of the following:

  • better see this one last time lol..
  • Hehe that was so funny..
  • omg did you see this last nite..
  • what else is there to do on a Sunday.?.......
  • whos coming to the party tonight.?..
  • You better not forget about this..


  • [a pornographic image that links to an adult themed site]