Threat Description

Lovelorn

Details

Category: Malware
Platform: W32
Aliases: Lovelorn, Cailont, Nolor

Summary


Lovelorn is a simple mass-mailer virus with built-in SMTP engine, password stealing routines and several payloads.It was found on April 29th, 2003.



Removal


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More scanning & removal options

More information on scanning or removal options is available in the documentation for your F-Secure security product on the Downloads section of our Home - Global site.

You may also refer to the Knowledge Base on the F-Secure Community site for more information.

Contact Support

For further assistance, F-Secure customers can request support online via the Request support or the Chat forms on our Home - Global site.



Technical Details


Email propagation

Lovelorn recursively searches through C: D: and E: drives. It tries to collect email addresses from files that have '.EML', '*ITEM*.DBX' or '*BOX*.DBX' in their name.

The e-mails sent by the virus are created using the following hardcoded elements:

Subject: Re:baby!your friend send this file to you !  Body: Read this file    Subject: HELP??-  Body: Help...   Subject: Re:Get Password  mail...  Body: Enjoy   Subject: There're some Passwords here  Body: Read File at   Subject: Re:Binladen_Sexy.jpg  Body: run File Attach to extract:BinladenSexy.jpg...   Subject: The Sexy story and 4 sexy picture of BINLADEN !  Body: Enjoy! BINLADEN:SEXY..   Subject: Re:I Love You...OKE!  Body: Souvenir for you from file attach...   Subject: A Greeting-card for you .  Body: See the Greeting-card .   Subject: Re:Kiss you..^@^  Body: Read file attach   Subject: Guide to f*ck ...  Body: I like Sexy with you.   Subject: Re:Baby! 2000USD,Win this game...  Body: Play the game from file attach   Subject: Help  Body: Help.   

The "From" address of these e-mails are always set to be one of the following addresses:

'lovelorn@yahoo.com', 'love_lorn@yahoo.com' or 'thuyquyen@yahoo.com'.  

The emails are sent with an attachment that is either the worm in BASE64 encoded format ('*.Kiss.ok.exe') or an HTML file dropper file ('*.htm')

(see the "Script Part" below).

Password stealing

Lovelorn monitors the running windows and tries to steal sensitive user information (eg. Yahoo login and password). If it manages to find some it sends it to a predefined email address.

Payload

The worm has several payloads. First of all it kills some processes that belong to certain antivirus applications.

On certain dates Lovelorn drops a text file the root of the system drive (which is most often C:) as 'NQHv1.0.txt' and opens it with notepad.exe: 'MISS MY FATHER,MY MOTHER, NQHLLv1.0 '

Script Part

The dropped Setup.htm uses Visual Basic Script to create a binary file temp.exe in Windows Temp folder. Then it runs this binary file which is the worm code. The HTML body contains a string 'Tinh`cho khong bieu' which is visible for 5 seconds. After that the script deletes itself (Setup.htm) so no traces of it are left on the infected system.



Detection


F-Secure Anti-Virus detects Lovelorn worm with the updates published on April 29th, 2003:
Database: 2003-04-30_02



Description Details: F-Secure Corp., April 29th, 2003
Technical Details:M. Hypponen, K. Tocheva, S. Rautiainen, G. Erdelyi


SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More