Skip to content

Export page to PDF
MAL_OTORUN
Aliases: W32.Dotex(Symantec), Worm.Win32.AutoRun.ow(Kaspersky), TR/Dldr.Delphi.Gen(Avira), W32/AutoRun.B.gen!Eldorado (generic(F-Prot), W32/Webbew.worm(McAfee)
Malware type: Others
Destructive: No
Platform: Windows 2000, Windows XP, Windows Server 2003
In the wild: Yes

Overview


This is the Trend Micro heuristic detection for suspicious files that manifest behavior and characteristics similar to WORM_AUTORUN variants. Files detected usually drop a copy of itself and AUTORUN.INF file on physical and removable drives for its propagation and autostart technique.

Since these files commonly arrive and propagate via removable drives, it is important to protect your system by first protecting your removable drive. Below are a number of options that help prevent malware from affecting or starting in your removable drive.

  • Create a folder named AUTORUN.INF that is set to certain attributes to prevent malware from creating its own AUTORUN.INF, as most WORM_AUTORUN variants drops or overwrites a copy of the existing AUTORUN.INF. To do this, you may follow the steps listed here.
  • Enable the write-protect switch on a removable drive to allow read-only access to the removable drive. This switch is available on some removable drives. Enabling the switch prevents malware from being saved on your removable drive.
  • Scan your removable drive with an antivirus application before opening the drive. You can use online tools such as the Trend Micro HouseCall to scan removable drives.

Files using the AUTORUN.INF file, in part, rely on the autorun or autoplay feature in Windows. This feature enables removable media such as CDs and removable drives to start automatically upon insertion or connection to the system. The following option helps prevent the spread of malware on the system.

Modify registry entry to disable the autorun feature. A specific registry entry is related to the autorun feature of Windows systems. To learn how to modify this registry entry, please click here.

If your Trend Micro product detects a file under this detection name, do not execute the file. Delete it immediately especially if it came from an untrusted or an unknown source (e.g., a Web site of doubtful nature). However, if you have reason to believe that the detected file is non-malicious, you can submit a sample for analysis. Detailed analysis will be done on submitted samples, and corresponding removal instructions will be provided, if necessary.

Solution


Minimum scan engine: 9.200
VSAPI OPR Pattern Version: 8.731.00
VSAPI OPR Pattern Release Date: 24 Jan 2012

NOTES:

Creating an AUTORUN.INF Folder and Disabling Autorun Feature in Windows

This procedure enumerates the steps to create a batch (.BAT) file that creates an AUTORUN.INF folder and disables the autorun feature in Windows.

  1. Open Notepad. Click Start>Run, type NOTEPAD, then press Enter.
  2. Copy and paste the following text in Notepad:
  3. Save the created file on your Desktop as the file DISABLE.BAT.
  4. Locate the file on your desktop. Once located, double-click on the file.

Note: If your Trend Micro product detects a file under this detection name, do not execute the file, or delete it immediately especially if it came from an untrusted or an unknown source (e.g., a Web site of doubtful nature). However, if you have reason to believe that the detected file is non-malicious, you can submit a sample for analysis. Detailed analysis will be done on submitted samples, and corresponding removal instructions will be provided, if necessary.

Note: If your Trend Micro product detects a file under this detection name, do not execute the file. Delete it immediately especially if it came from an untrusted or an unknown source (e.g., a Web site of doubtful nature). However, if you have reason to believe that the detected file is non-malicious, you can submit a sample for analysis. Detailed analysis will be done on submitted samples, and corresponding removal instructions will be provided, if necessary.

Submitting Samples

Sample files for submission must be in ZIP format and should be password-protected. To submit a ZIP file, file compression software such as Winzip must be used. A trial version of Winzip is available at www.winzip.com.

To compress a file, please follow the steps below:

  1. Right-click on the file and select Add to Zip.
  2. Enter a file name for the zip file.
  3. On the Options menu, choose Encrpyt. In the input box, type virus. This serves as the password for the zip file.
  4. Send the sample through the following channels:
    • For Trend Micro Premium customers, please submit a virus support case by clicking here:
    https://premium.trendmicro.com/premiumsupport/en/US/PSP/logon/logon.asp
    • For Trend Micro non-Premium customers, please contact your local support network here:
    http://www.trendmicro.com/en/about/contact/overview.htm


Did this description help? Tell us how we did.

Connect with us on