Email-Worm:W32/Runouce

Classification

Malware

Email-Worm

W32

Email-Worm:W32/Runouce, Win32.Runouce.B@mm, Win32/Chir, Email-Worm.Win32.Runouce, W32.Chir.B@mm (Symantec)

Summary

Email-Worm:W32/Runouce is distributed in infectious executable email attachments.

Removal

Automatic action

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

Find out more

Knowledge Base

Find the latest advice in our Community Knowledge Base.

User Guide

See the user guide for your product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details

Installation

When run it copies itself to the System Directory as Runouce.exe and modifies Windows Registry so that the copy in the direcorty is run each time Windows starts.

Propagation

Searches for HTML files in the users' hard drive and modifies them to launch the file README.EML, created in the same directory where the HTML is found.

To propagate itself, Runouce creates email messages with the following format:

Subject: [text, followed by "is comming!"]
From: [The sender address pretends to be one from yahoo.com]
 

The worm spreads itself as an attachment named pp.exe with MIME type audio/x-wav.

It uses a static server to send messages through its own SMTP engine.


Variant:Runouce.B

Runouce is an internet worm. When run it copies itself to the System Directory as Runouce.exe and modifies windows registry so it is run each time windows starts. Searches for HTML files in the users' hard drive and modifies them to launch the file README.EML, created in the same directory where the HTML is found. Sends email with the following format:

Subject:is comming! From:[The sender address pretends to be one from yahoo.com]

The worm spreads itself as an attachment named pp.exe with MIME type audio/x-wav. It uses a static server to send messages through its own SMTP engine.

Date Created: -

Date Last Modified: -