Threat description




The detection Worm:W32/Ippedo identifies the malicious shortcut (.LNK) files used by the Ippedo worm to lure users into unwittingly launching its malicious code. Once active on a machine, the worm can be directed by a remote attacker to perform various malicious actions, including performing ad-clicking, downloading additional files onto the machine, stealing information from it, restarting or shutting down the system and so on.


Automatic action

Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.

More scanning & removal options

More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.

You may also refer to the Knowledge Base on the F-Secure Community site for more information.

Contact Support

F-Secure customers can request support online via the Request support or the Chat forms on our Home - Global site.

Technical Details

Worm:W32/Ippedo spreads through infected removable drives. When the removable drive is inserted into a machine and the worm's malicious file is launched, it installs multiple files to the C:\Google and C:\Skypee folders, most notably a copy of its main malicious file, which uses the innocuous-sounding name googleupdate.a3x. It also deletes the legitimate googleupdate.vbs file.

The worm modifies the registry so that its copy is run each time Windows is started. It also adds .LNK shortcut files (the component identified by the Worm:W32/Ippedo detection) to the Startup folder and any connected removable drives, so that the worm copy is automatically executed each time the system starts or a user unsuspectingly clicks the shortcut. The links are deceptively named (GoogleUpdate.lnk, Windowsupdate.lnk, etc) to appear legitimate, but all point to the worm's main file.

When the worm is launched, it checks to see if it is running in a virtual environment or the machine includes files or processes that indicate it is used for malware analysis; if so, it will terminate itself. Otherwise, it can proceed to perform a number of malicious actions, including:

  • Contacting a remote server
  • Looking for and sending the following system to a remote location:
    • Operating system version
    • Installed antivirus program
    • Computer and user names
    • Geographical location
  • Executing commands from a remote attacker, including:
    • Downloading and executing additional files
    • Performing ad-clicking
    • Restarting and shutting down the computer
    • Updating the worm

And so on.

Submit a Sample

Suspect a file or URL was wrongly detected?
Send it to our Labs for further analysis

Submit a Sample

Scan & clean your PC

F-Secure Online Scanner will scan and clean your PC in just a few minutes for free

More Info