Freelinks
has been found in the wild in Europe. (July 1999.)
This worm uses similar encryption method to the VBS/Luser
viruses (they are known also as Zulu).
When
the worm is executed, it drops an encrypted script file to
"C:\Windows\System\Rundll.vbs". After that VBS/Story changes
the registry in a such way that "Rundll.vbs" will be executed
each
time
when the system is restarted.
Next,
the worm shows a dialog box with the following text:
This will add a shortcut to free XXX links on your desktop. Do you
want to continue?
If user presses the "Yes" button,
the worm creates an Internet shortcut named
"FREE XXX LINKS" to the desktop. The shortcut points to
http://www.sublimedirectory.com web site.
The
worm also searches for mapped network shares. If the worm finds
any,
it copies itself to the root of the each network share.
The
worm also uses Outlook application to mass-mail itself to each
recipient in each
address book. The mass-mail part is similar to W97M/Melissa,
but doesn't
infect Word documents and it sends itself each time when it
is executed.
The
subject of the message is:
Check this
and the body of the message
is:
Have fun with these links.
Bye.
The worm attachs itself as "Links.vbs"
to the message. When the receiver double-clicks on
the attachment, the worm executes and it will mass-mail itself
again.
VBS/Freelinks
removes the sent mail from user's "Sent Mail" folder. THis is
how it attempts to hide the mass mail from the user.
As
address books normaly contain group addresses, the end result
of executing the Freelinks virus inside an organization is that
the first infected user sends the message to everybody in the
organization. After this, other users open the message and send
the message AGAIN to everyone else. This overloads e-mail servers
many times very quickly.
After
the machine has been restarted, the worm drops "Links.vbs" to
the Windows directory.
The
worm will also search for "C:\MIRC" directory for "MIRC32.EXE"
IRC chat client. If the
executable is found, the worm creates "SCRIPT.INI" file, replacing
the existing one. It also
searches
for another IRC client from directory "c:\PIRCH98" and if it
is found, the worm
replaces the "EVENTS.INI" from the same directory.
After
that both IRC clients, mIRC and Pirch98, will automatically
spread the worm when
the
user enters IRC chat channels.