Social Networks Follow us on Twitter Like us on Facebook You Tube Channel
Threat Encyclopedia Mobile Page
Quick Links
  • Save & Share
  • Choose your country:
VBS_REDLOF.F

Malware type: Others

Aliases: Virus.VBS.Redlof.e (Kaspersky), VBS/Redlof@M (McAfee), VBS.Redlof.A (Symantec), VBS/Redlof.E (Avira), JS/Except-F (Sophos), Virus:VBS/Redlof.E (Microsoft)

In the wild: Yes

Destructive: No

Language: English

Platform: Windows 95, 98, ME, NT, 2000, XP

Encrypted: Yes

Overall risk rating:

Reported infections:

Damage potential:

High

Distribution potential:

Low

Description: 

This malicious, polymorphic Visual Basic (VB) script arrives in encrypted form. It runs whenever a user loads infected HTML files. It then decrypts itself and executes its virus code.

It creates copies of itself as the following files:

  • %System%\Blank.htm
  • %System%\Folder.htt
  • (malware path)\Folder.htt

(Note: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 95, 98 and ME, C:\WINNT\System32 on Windows NT and 2000, and C:\Windows\System32 on Windows XP.)

This malicious VB script searches all available disk drives and subfolders for target files to infect. These files have the following extensions:

  • ASP
  • HTM
  • HTML
  • HTT
  • JSP
  • PHP

Infected files are appended with the encrypted version of the malicious VB script.

When this VB script is executed on the 30th day of February, April, June, August, October, and December, it renames the system files WIN.INI to WON.CHK, and SYSTEM.INI to SYSTEM.CHK.

It runs on infected systems unpatched for the VM ActiveX component vulnerability. Installing patches or the latest version of Microsoft Internet Explorer makes it unable to execute or propagate.

For more information about this Windows vulnerability, please refer to the following Microsoft Web page:

For additional information about this threat, see:

Description created: Feb. 11, 2005 5:31:44 AM GMT -0800
Description updated: Feb. 11, 2005 5:44:11 AM GMT -0800


Minimum scan engine version needed: 7.500

Pattern file needed: 3.490.03

Pattern release date: Jun 8, 2006


Important note: The "Minimum scan engine" refers to the earliest Trend Micro scan engine version guaranteed to detect this threat. However, Trend Micro strongly recommends that you update to the latest version in order to get comprehensive protection. Download the latest scan engine here.

Solution:

Disabling Web Content

  1. In My Computer or in Windows Explorer, click on Tools menu and choose Folder Options.
  2. Click on General tab.
  3. Under Active Desktop, click Use Windows classic desktop.
  4. Under Web View, click Use Windows classic folders.
  5. Click Apply.
  6. Click on View tab.
  7. Under Advanced settings, uncheck Remember each folders view settings.
  8. Click Apply.
  9. Click OK.

Additional Windows ME/XP Cleaning Instructions

Users running Windows ME and XP must disable System Restore to allow full scanning of infected systems.

Users running other Windows versions can proceed with the succeeding procedure sets.

Running Trend Micro Antivirus

Scan your system with Trend Micro antivirus and delete all files detected as VBS_REDLOF.F. To do this, Trend Micro customers must download the latest pattern file and scan their system. Other users can use HouseCall, Trend Micros free online virus scanner.

Applying the Patch

Download the latest patch. Information on the vulnerability exploited by this malware and the corresponding patch can be found at the following link:

Microsoft Security Bulletin MS00-075


Trend Micro offers best-of-breed antivirus and content-security solutions for your corporate network, small and medium business, mobile device or home PC.