VBS_SASAN.AS


 PLATFORM:

Windows 2000, Windows XP, Windows Server 2003

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Others

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW


Scripts are generally written code that are interpreted and implemented by another application. In contrast, compiled programs can run on their own, but are often harder to produce as they have to be compiled.

Malware authors have taken advantage of relative ease of producing scripts and have produced significant numbers of script malware - many of which are written using Visual Basic Script, JavaScript, and HTML.

Many scripts can run on most systems without the installation of a special interpreter program. For example, certain Windows systems have Windows Scripting Host, which can interpret different script types. Also, HTML scripts are loaded by Web browsers, which are commonly installed on most computers.

This malware may be dropped by other malware.

This is the Trend Micro detection for files that contains certain strings.

  TECHNICAL DETAILS

File Size:

106 bytes

File Type:

PE

Memory Resident:

Yes

Initial Samples Received Date:

06 May 2010

Arrival Details

This malware may be dropped by the following malware:

  • VBS_SASAN.A

Other Details

This is the Trend Micro detection for files that contains the following strings:

[autorun]
shellexecute=wscript.exe .MS32DLL.dll.vbs

  SOLUTION

Minimum Scan Engine:

9.200

VSAPI OPR PATTERN File:

7.151.00

VSAPI OPR PATTERN Date:

06 May 2010

Step 1

Remove malware files dropped/downloaded by VBS_SASAN.AS

  • VBS_SASAN.A

Step 2

Scan your computer with your Trend Micro product to delete files detected as VBS_SASAN.AS. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.


Did this description help? Tell us how we did.

Related Malware