Threat Descriptons



Category :


Type :


Aliases :

Lovelorn, Cailont, Nolor


Lovelorn is a simple mass-mailer virus with built-in SMTP engine, password stealing routines and several payloads.It was found on April 29th, 2003.


Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

Email propagation

Lovelorn recursively searches through C: D: and E: drives. It tries to collect email addresses from files that have '.EML', '*ITEM*.DBX' or '*BOX*.DBX' in their name.

The emails sent by the virus are created using the following hardcoded elements:

Subject: Re:baby!your friend send this file to you !
Body: Read this file

Subject: HELP??-
Body: Help...
 Subject: Re:Get Password
Body: Enjoy
 Subject: There're some Passwords here
Body: Read File at
 Subject: Re:Binladen_Sexy.jpg
Body: run File Attach to extract:BinladenSexy.jpg...
 Subject: The Sexy story and 4 sexy picture of BINLADEN !
Body: Enjoy! BINLADEN:SEXY..
 Subject: Re:I Love You...OKE!
Body: Souvenir for you from file attach...
 Subject: A Greeting-card for you .
Body: See the Greeting-card .
 Subject: Re:Kiss you..^@^
Body: Read file attach
 Subject: Guide to f*ck ...
Body: I like Sexy with you.
 Subject: Re:Baby! 2000USD,Win this game...
Body: Play the game from file attach
 Subject: Help
Body: Help.

The "From" address of these emails are always set to be one of the following addresses:

'', '' or ''.

The emails are sent with an attachment that is either the worm in BASE64 encoded format ('*.Kiss.ok.exe') or an HTML file dropper file ('*.htm')

(see the "Script Part" below).

Password stealing

Lovelorn monitors the running windows and tries to steal sensitive user information (eg. Yahoo login and password). If it manages to find some it sends it to a predefined email address.


The worm has several payloads. First of all it kills some processes that belong to certain antivirus applications.

On certain dates Lovelorn drops a text file the root of the system drive (which is most often C:) as 'NQHv1.0.txt' and opens it with notepad.exe: 'MISS MY FATHER,MY MOTHER, NQHLLv1.0 '

Script Part

The dropped Setup.htm uses Visual Basic Script to create a binary file temp.exe in Windows Temp folder. Then it runs this binary file which is the worm code. The HTML body contains a string 'Tinh`cho khong bieu' which is visible for 5 seconds. After that the script deletes itself (Setup.htm) so no traces of it are left on the infected system.

Peace of mind against online threats

F-Secure Total is a security suite that protects all your phones and computers in real time, 24/7 and with award-winning accuracy. Read more about Total and try it free for 30 days, no credit card required.

More Support


Ask questions in our Community .

User Guides

Check the user guide for instructions.

Contact Support

Chat with or call an expert.

Submit a Sample

Submit a file or URL for analysis.