Home > Threat descriptions >

UrlSpoof.E

Classification

Category: Malware

Type: Virus

Aliases: UrlSpoof.E, TrojanSpy.HTML.UrlSpoof.e, TrojanDropper.VBS.Inor.z

Summary


On January 24th and 25th, 2004, a number of emails with a fake virus warning from Microsoft were spammed. When users view the email it attempts to download and execute a variant of VBS/Inor trojan dropper from a web site. The real address has been spoofed using a security vulnerability in Internet Explorer.

Removal


Automatic action

Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.

Knowledge Base

Find the latest advice in our Community Knowledge Base.

About the product

See the manual for your F-Secure product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details


When an user opens the spammed email, an attept to download and execute a VBS/Inor dropper is made. If the dropper is able to execute, then a variant of W32/Dumaru worm is installed into system. Inor drops the worm to "C:\2.exe".

We have received reports that different variants of W32/Dumaru have been dropped from the web site. Further information about W32/Dumaru is available within the following descriptions:

At the time of writing this description, the trojan downloader is removed from the web site.

Below is a screenshot of the message: