- Threat Encyclopedia
- Malware
- MAL_OTORUN1
Windows 2000, Windows XP, Windows Server 2003
This is the Trend Micro heuristic detection for suspicious files that manifest similar behavior and characteristics as the following malware:
Since these files commonly arrive and propagate via removable drives, it is important to protect your system by first protecting your removable drive. Below are a number of options that help prevent malware from affecting or starting in your removable drive.
Files using the AUTORUN.INF file, in part, rely on the autorun or autoplay feature in Windows. This feature enables removable media such as CDs and removable drives to start automatically upon insertion or connection to the system. The following option helps prevent the spread of malware on the system:
9.200
NOTES:
Creating an AUTORUN.INF Folder and Disabling Autorun Feature in Windows
This procedure enumerates the steps to create a batch (.BAT) file that creates an AUTORUN.INF folder and disables the autorun feature in Windows.
Submitting Samples
If you identified suspicious files, you may submit them to us. Sample files for submission must be in ZIP format and should be password-protected. To submit a ZIP file, file compression software such as Winzip must be used. A trial version of Winzip is available here.
Note: If your Trend Micro product detects a file under this detection name, do not execute the file, or delete it immediately especially if it came from an untrusted or an unknown source (e.g., a Web site of doubtful nature). However, if you have reason to believe that the detected file is non-malicious, you can submit a sample for analysis. Detailed analysis will be done on submitted samples, and corresponding removal instructions will be provided, if necessary.
To compress a file, please follow the steps below: