Text 71, 2028 rader
Skriven 2005-11-06 09:57:00 av KURT WISMER (1:123/140)
Ärende: News, November 6 2005
=============================
[cut-n-paste from sophos.com]
Name Troj/BagleDl-AB
Type
* Trojan
Affected operating systems
* Windows
Side effects
* Installs itself in the Registry
Prevalence (1-5) 3
Description
Troj/BagleDl-AB is a Trojan for the Windows platform.
When first run Troj/BagleDl-AB copies itself to
<System>\hloader_exe.exe and creates the file
<System>\hloader_dll.dll. Both these files are detected as
Troj/BagleDl-AB.
Advanced
Troj/BagleDl-AB is a Trojan for the Windows platform.
When first run Troj/BagleDl-AB copies itself to
<System>\hloader_exe.exe and creates the file
<System>\hloader_dll.dll. Both these files are detected as
Troj/BagleDl-AB.
Troj/BagleDl-AB attempts to inject the dropped file hloader_dll.dll
into the process explorer.exe.
The following registry entries are created to run hloader_exe.exe on
startup:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
auto__hloader__key
<System>\hloader_exe.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
auto__hloader__key
<System>\hloader_exe.exe
Troj/BagleDl-AB attempts to download and execute files from a number
of remote websites.
Name Troj/BagleDl-Y
Type
* Trojan
Affected operating systems
* Windows
Side effects
* Drops more malware
* Downloads code from the internet
* Installs itself in the Registry
Aliases
* W32/Bagle.gen
Prevalence (1-5) 3
Description
Troj/BagleDl-Y downloads files from a number of remote websites and
executes them.
Advanced
Troj/BagleDl-Y is a downloading Trojan for the Windows platform.
When first run Troj/BagleDl-Y copies itself to
<System>\hloader_exe.exe and creates the file
<System>\hleader_dll.dll. Both these files are detected as
Troj/BagleDl-Y.
The following registry entries are created to run hloader_exe.exe on
startup:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
auto__hloader__key
<System>\hloader_exe.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
auto__hloader__key
<System>\hloader_exe.exe
Troj/BagleDl-Y attempts to download and execute files from a number
of remote websites.
Name Troj/BagleDl-AA
Type
* Trojan
Affected operating systems
* Windows
Side effects
* Turns off anti-virus applications
* Deletes files off the computer
* Reduces system security
* Installs itself in the Registry
* Dropped by malware
Aliases
* Email-Worm.Win32.Bagle.eh
* W32/Bagle.gen
Prevalence (1-5) 3
Description
Troj/BagleDl-AA is a Trojan for the Windows platform.
Troj/BagleDl-AA attempts to terminate processes and services, delete
files and registry entries, and block access to URLs related to
anti-virus and security programs.
Advanced
Troj/BagleDl-AA is a Trojan for the Windows platform.
When first run Troj/BagleDl-AA copies itself to
<System>\antiav_exe.exe and creates the file <System>\antiav_dll.dll.
Both these files are detected as Troj/BagleDl-AA.
Troj/BagleDl-AA attempts to inject the dropped file antiav_dll.dll
into the process explorer.exe.
The following registry entries are created to run antiav_exe.exe on
startup:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
auto__antiav__key
<System>\antiav_exe.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
auto__antiav__key
<System>\antiav_exe.exe
Troj/BagleDl-AA attempts to terminate several processes and services
related to anti-virus and security programs, to delete related files,
to modify C:\boot.ini to delete related files on system startup, to
block access to related websites, to delete related registry entries,
and to delete registry entries at the folling location to stop
related files from running on system startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\
Run
HKCU\Software\Microsoft\Windows\CurrentVersion\
Run
Name Troj/BagleDl-Z
Type
* Trojan
Affected operating systems
* Windows
Side effects
* Drops more malware
* Downloads code from the internet
* Installs itself in the Registry
Aliases
* W32/Bagle.gen
Prevalence (1-5) 3
Description
Troj/BagleDl-Z downloads files from a number of remote websites and
executes them.
Advanced
Troj/BagleDl-Z is a downloading Trojan for the Windows platform.
When first run Troj/BagleDl-Z copies itself to
<System>\hloader_exe.exe and creates the file
<System>\hleader_dll.dll. Both these files are detected as
Troj/BagleDl-Z.
The following registry entries are created to run hloader_exe.exe on
startup:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
auto__hloader__key
<System>\hloader_exe.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
auto__hloader__key
<System>\hloader_exe.exe
Troj/BagleDl-Z attempts to download and execute files from a number
of remote websites.
Name W32/Mytob-FH
Type
* Worm
How it spreads
* Email attachments
Affected operating systems
* Windows
Side effects
* Allows others to access the computer
* Modifies data on the computer
* Forges the sender's email address
* Uses its own emailing engine
* Reduces system security
Prevalence (1-5) 3
Description
W32/Mytob-FH is a mass-mailing worm and IRC backdoor Trojan for the
Windows platform.
W32/Mytob-FH runs continuously in the background, providing a
backdoor server which allows a remote intruder to gain access and
control over the computer via IRC channels.
Emails sent by the worm have characteristics from the following:
Subject line:
Your password has been updated
Your password has been successfully updated
You have successfully updated your password
Your new account password is approved
Your Account is Suspended
*DETECTED* Online User Violation
Your Account is Suspended For Security Reasons
Warning Message: Your services near to be closed.
Important Notification
Members Support
Security measures
Email Account Suspension
Notice of account limitation
<random characters>
Message text - a formatted version of one of the following:
Dear user <recipient's username>,
You have successfully updated the password of your
<recipient's domain> account.
If you did not authorize this change or if you need assistance with
your account, please contact <recipient's domain> customer service at: <spoofed
sender address>
Thank you for using <recipient's domain>!
The <recipient's domain> Support Team <BR>
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear user <recipient's username>,
It has come to our attention that your <recipient's domain> User
Profile ( x ) records are out of date. For further details see the
attached document.
Thank you for using <recipient's domain>!
The <recipient's domain> Support Team
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear <recipient's username> Member,
We have temporarily suspended your email account <recipient's domain>.
This might be due to either of the following reasons:
1. A recent change in your personal information (i.e. change of
address).
2. Submiting invalid information during the initial sign up process.
3. An innability to accurately verify your selected option of
subscription due to an internal error within our processors.
See the details to reactivate your <recipient's domain> account.
Sincerely,The <recipient's domain> Support Team
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear <recipient's domain> Member,
Your e-mail account was used to send a huge amount of unsolicited
spam messages during the recent week. If you could please take 5-10
minutes out of your online experience and confirm the attached
document so you will not run into any future problems with the online
service.
If you choose to ignore our request, you leave us no choice but to
cancel your membership.
Virtually yours,
The <recipient's domain> Support Team
+++ Attachment: No Virus found
+++ <recipient's domain> Antivirus - www.<recipent's domain>
Attachment name:
updated-password
email-password
new-password
password
approved-password
account-password
accepted-password
important-details
account-details
email-details
account-info
document
readme
account-report
First extension (of attachment or of file inside zip):
doc
htm
txt
Second extension (of attachment or of file inside zip):
pif
scr
exe
cmd
bat
If the attachment is a zip file it will have the same base name as
the double-extension file inside.
Advanced
W32/Mytob-FH is a mass-mailing worm and IRC backdoor Trojan for the
Windows platform.
W32/Mytob-FH runs continuously in the background, providing a
backdoor server which allows a remote intruder to gain access and
control over the computer via IRC channels.
Emails sent by the worm have characteristics from the following:
Subject line:
Your password has been updated
Your password has been successfully updated
You have successfully updated your password
Your new account password is approved
Your Account is Suspended
*DETECTED* Online User Violation
Your Account is Suspended For Security Reasons
Warning Message: Your services near to be closed.
Important Notification
Members Support
Security measures
Email Account Suspension
Notice of account limitation
<random characters>
Message text - a formatted version of one of the following:
Dear user <recipient's username>,
You have successfully updated the password of your
<recipient's domain> account.
If you did not authorize this change or if you need assistance with
your account, please contact <recipient's domain> customer service at:
<spoofed sender address>
Thank you for using <recipient's domain>!
The <recipient's domain> Support Team <BR>
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear user <recipient's username>,
It has come to our attention that your <recipient's domain> User
Profile ( x ) records are out of date. For further details see the
attached document.
Thank you for using <recipient's domain>!
The <recipient's domain> Support Team
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear <recipient's username> Member,
We have temporarily suspended your email account <recipient's domain>.
This might be due to either of the following reasons:
1. A recent change in your personal information (i.e. change of
address).
2. Submiting invalid information during the initial sign up process.
3. An innability to accurately verify your selected option of
subscription due to an internal error within our processors.
See the details to reactivate your <recipient's domain> account.
Sincerely,The <recipient's domain> Support Team
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear <recipient's domain> Member,
Your e-mail account was used to send a huge amount of unsolicited
spam messages during the recent week. If you could please take 5-10
minutes out of your online experience and confirm the attached
document so you will not run into any future problems with the online
service.
If you choose to ignore our request, you leave us no choice but to
cancel your membership.
Virtually yours,
The <recipient's domain> Support Team
+++ Attachment: No Virus found
+++ <recipient's domain> Antivirus - www.<recipent's domain>
Attachment name:
updated-password
email-password
new-password
password
approved-password
account-password
accepted-password
important-details
account-details
email-details
account-info
document
readme
account-report
First extension (of attachment or of file inside zip):
doc
htm
txt
Second extension (of attachment or of file inside zip):
pif
scr
exe
cmd
bat
If the attachment is a zip file it will have the same base name as
the double-extension file inside.
Example attachment names include document.txt.pif and
information.doc.cmd, usually with a large number of spaces between
the extensions.
The following registry entries are created:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
NAMEDPIPE SYSTEM
\namedpipe.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
NAMEDPIPE SYSTEM
\namedpipe.exe
W32/Mytob-FH sets the following registry entries, disabling the
automatic startup of other software:
HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess
Start
4
Note: disabling autostart for the SharedAccess service deactivates
the Microsoft Internet Connection Firewall (ICF).
W32/Mytob-FH modifies the HOSTS file, changing the URL-to-IP mappings
for selected websites, therefore preventing normal access to these
sites. The new HOSTS file will typically contain the following:
127.0.0.1 www.symantec.com
127.0.0.1 securityresponse.symantec.com
127.0.0.1 symantec.com
127.0.0.1 www.sophos.com
127.0.0.1 sophos.com
127.0.0.1 www.mcafee.com
127.0.0.1 mcafee.com
127.0.0.1 liveupdate.symantecliveupdate.com
127.0.0.1 www.viruslist.com
127.0.0.1 viruslist.com
127.0.0.1 viruslist.com
127.0.0.1 f-secure.com
127.0.0.1 www.f-secure.com
127.0.0.1 kaspersky.com
127.0.0.1 kaspersky-labs.com
127.0.0.1 www.avp.com
127.0.0.1 www.kaspersky.com
127.0.0.1 avp.com
127.0.0.1 www.networkassociates.com
127.0.0.1 networkassociates.com
127.0.0.1 www.ca.com
127.0.0.1 ca.com
127.0.0.1 mast.mcafee.com
127.0.0.1 my-etrust.com
127.0.0.1 www.my-etrust.com
127.0.0.1 download.mcafee.com
127.0.0.1 dispatch.mcafee.com
127.0.0.1 secure.nai.com
127.0.0.1 nai.com
127.0.0.1 www.nai.com
127.0.0.1 update.symantec.com
127.0.0.1 updates.symantec.com
127.0.0.1 us.mcafee.com
127.0.0.1 liveupdate.symantec.com
127.0.0.1 customer.symantec.com
127.0.0.1 rads.mcafee.com
127.0.0.1 trendmicro.com
127.0.0.1 pandasoftware.com
127.0.0.1 www.pandasoftware.com
127.0.0.1 www.trendmicro.com
127.0.0.1 www.grisoft.com
127.0.0.1 www.microsoft.com
127.0.0.1 microsoft.com
127.0.0.1 www.virustotal.com
127.0.0.1 virustotal.com
127.0.0.1 www.amazon.com
127.0.0.1 www.amazon.co.uk
127.0.0.1 www.amazon.ca
127.0.0.1 www.amazon.fr
127.0.0.1 www.paypal.com
127.0.0.1 paypal.com
127.0.0.1 moneybookers.com
127.0.0.1 www.moneybookers.com
127.0.0.1 www.ebay.com
127.0.0.1 ebay.com
Name Troj/BagleDl-W
Type
* Trojan
Affected operating systems
* Windows
Side effects
* Downloads code from the internet
* Installs itself in the Registry
Prevalence (1-5) 3
Description
Troj/BagleDl-W is a Trojan for the Windows platform.
Advanced
Troj/BagleDl-W is a Trojan for the Windows platform.
When first run Troj/BagleDl-W copies itself to
<Windows system folder>\hloader_exe.exe and creates the file
<Windows system folder>\hloader_dll.dll. Both these files are
detected as Troj/BagleDl-W.
Troj/BagleDl-W attempts to inject the dropped file hloader_dll.dll
into the process explorer.exe.
The following registry entries are created to run hloader_exe.exe on
startup:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
auto__hloader__key
<Windows system folder>\hloader_exe.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
auto__hloader__key
<Windows system folder>\hloader_exe.exe
Troj/BagleDl-W attempts to download and execute files from a number
of remote websites.
Name W32/Mytob-FF
Type
* Worm
How it spreads
* Email attachments
Affected operating systems
* Windows
Side effects
* Turns off anti-virus applications
* Sends itself to email addresses found on the infected computer
* Forges the sender's email address
* Uses its own emailing engine
* Downloads code from the internet
Prevalence (1-5) 3
Description
W32/Mytob-FF is a mass-mailing worm and IRC backdoor Trojan.
W32/Mytob-FF runs continuously in the background, providing a backdoor server
which allows a remote intruder to gain access and control over the computer via
IRC channels, including the ability to download and execute files on the
infected computer.
W32/Mytob-FF can spread by sending itself as an email attachment to
email addresses it harvests from the infected computer, either as an
attachment with a double-extension or as a zip file containing a file
with a double-extension. W32/Mytob-FF avoids sending emails to
addresses containing certain strings in them.
W32/Mytob-FF processes the emails it has harvested by splitting them
into name and domain. Once it has sent itself to the emails it has
harvested, it uses a predefined list of names with the harvested
domains. W32/Mytob-FF spoofs the sender, sending emails as if from
one of the following at the same domain as the recipient:
support
administrator
mail
service
admin
info
register
webmaster
For example if sending itself to name@example.com, W32/Mytob-FF might
send the email as if from admin@example.com.
Emails sent by the worm have characteristics from the following:
Subject line:
Your password has been updated
Your password has been successfully updated
You have successfully updated your password
Your new account password is approved
Your Account is Suspended
*DETECTED* Online User Violation
Your Account is Suspended For Security Reasons
Warning Message: Your services near to be closed.
Important Notification
Members Support
Security measures
Email Account Suspension
Notice of account limitation
<random characters>
Message text - a formatted version of one of the following:
Dear user <recipient's username>,
You have successfully updated the password of your <recipient's domain>
account.
If you did not authorize this change or if you need assistance with
your account, please contact <recipient's domain> customer service at:
<spoofed sender address>
Thank you for using <recipient's domain>!
The <recipient's domain> Support Team <BR>
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear user <recipient's username>,
It has come to our attention that your <recipient's domain> User
Profile ( x ) records are out of date. For further details see the
attached document.
Thank you for using <recipient's domain>!
The <recipient's domain> Support Team
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear <recipient's username> Member,
We have temporarily suspended your email account <recipient's domain>.
This might be due to either of the following reasons:
1. A recent change in your personal information (i.e. change of
address).
2. Submiting invalid information during the initial sign up process.
3. An innability to accurately verify your selected option of
subscription due to an internal error within our processors.
See the details to reactivate your <recipient's domain> account.
Sincerely,The <recipient's domain> Support Team
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear <recipient's domain> Member,
Your e-mail account was used to send a huge amount of unsolicited
spam messages during the recent week. If you could please take 5-10
minutes out of your online experience and confirm the attached
document so you will not run into any future problems with the online
service.
If you choose to ignore our request, you leave us no choice but to
cancel your membership.
Virtually yours,
The <recipient's domain> Support Team
+++ Attachment: No Virus found
+++ <recipient's domain> Antivirus - www.<recipent's domain>
Attachment name:
updated-password
email-password
new-password
password
approved-password
account-password
accepted-password
important-details
account-details
email-details
account-info
document
readme
account-report
<randomly named>
First extension (of attachment or of file inside zip):
doc
htm
txt
Second extension (of attachment or of file inside zip):
pif
scr
exe
cmd
bat
If the attachment is a zip file it will have the same base name as
the double-extension file inside.
Example attachment names include document.txt.pif and
information.doc.cmd, usually with a large number of spaces between
the extensions.
W32/Mytob-FF modifies the Windows hosts file in order to block access
to certain security-related websites.
Advanced
W32/Mytob-FF is a mass-mailing worm and IRC backdoor Trojan.
W32/Mytob-FF runs continuously in the background, providing a
backdoor server which allows a remote intruder to gain access and
control over the computer via IRC channels, including the ability to
download and execute files on the infected computer.
When first run W32/Mytob-FF attempts to copy itself to
<System>\pipe.exe.
The following registry entries are created to run pipe.exe on startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
PIPE SYSTEM
pipe.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
PIPE SYSTEM
pipe.exe
W32/Mytob-FF sets the following registry entries, disabling the
automatic startup of other software:
HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess
Start
4
Note: disabling autostart for the SharedAccess service deactivates
the Microsoft Internet Connection Firewall (ICF).
W32/Mytob-FF can spread by sending itself as an email attachment to
email addresses it harvests from the infected computer, either as an
attachment with a double-extension or as a zip file containing a file
with a double-extension. W32/Mytob-FF avoids sending emails to
addresses containing certain strings in them.
W32/Mytob-FF processes the emails it has harvested by splitting them
into name and domain. Once it has sent itself to the emails it has
harvested, it uses a predefined list of names with the harvested
domains. W32/Mytob-FF spoofs the sender, sending emails as if from
one of the following at the same domain as the recipient:
support
administrator
mail
service
admin
info
register
webmaster
For example if sending itself to name@example.com, W32/Mytob-FF might
send the email as if from admin@example.com.
Emails sent by the worm have characteristics from the following:
Subject line:
Your password has been updated
Your password has been successfully updated
You have successfully updated your password
Your new account password is approved
Your Account is Suspended
*DETECTED* Online User Violation
Your Account is Suspended For Security Reasons
Warning Message: Your services near to be closed.
Important Notification
Members Support
Security measures
Email Account Suspension
Notice of account limitation
<random characters>
Message text - a formatted version of one of the following:
Dear user <recipient's username>,
You have successfully updated the password of your <recipient's domain>
account.
If you did not authorize this change or if you need assistance with
your account, please contact <recipient's domain> customer service at:
<spoofed sender address>
Thank you for using <recipient's domain>!
The <recipient's domain> Support Team <BR>
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear user <recipient's username>,
It has come to our attention that your <recipient's domain> User
Profile ( x ) records are out of date. For further details see the
attached document.
Thank you for using <recipient's domain>!
The <recipient's domain> Support Team
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear <recipient's username> Member,
We have temporarily suspended your email account <recipient's domain>.
This might be due to either of the following reasons:
1. A recent change in your personal information (i.e. change of
address).
2. Submiting invalid information during the initial sign up process.
3. An innability to accurately verify your selected option of
subscription due to an internal error within our processors.
See the details to reactivate your <recipient's domain> account.
Sincerely,The <recipient's domain> Support Team
+++ Attachment: No Virus (Clean)
+++ <recipient's domain> Antivirus - www.<recipient's domain>
Dear <recipient's domain> Member,
Your e-mail account was used to send a huge amount of unsolicited
spam messages during the recent week. If you could please take 5-10
minutes out of your online experience and confirm the attached
document so you will not run into any future problems with the online
service.
If you choose to ignore our request, you leave us no choice but to
cancel your membership.
Virtually yours,
The <recipient's domain> Support Team
+++ Attachment: No Virus found
+++ <recipient's domain> Antivirus - www.<recipent's domain>
Attachment name:
updated-password
email-password
new-password
password
approved-password
account-password
accepted-password
important-details
account-details
email-details
account-info
document
readme
account-report
<randomly named>
First extension (of attachment or of file inside zip):
doc
htm
txt
Second extension (of attachment or of file inside zip):
pif
scr
exe
cmd
bat
If the attachment is a zip file it will have the same base name as
the double-extension file inside.
Example attachment names include document.txt.pif and
information.doc.cmd, usually with a large number of spaces between
the extensions.
W32/Mytob-FF attempts to terminate a large number of processes
related to security and anti-virus programs including REGEDIT.EXE,
MSCONFIG.EXE and NETSTAT.EXE.
W32/Mytob-FF modifies the Windows hosts file in order to block access
to the following security-related websites:
127.0.0.1 www.symantec.com
127.0.0.1 securityresponse.symantec.com
127.0.0.1 symantec.com
127.0.0.1 www.sophos.com
127.0.0.1 sophos.com
127.0.0.1 www.mcafee.com
127.0.0.1 mcafee.com
127.0.0.1 liveupdate.symantecliveupdate.com
127.0.0.1 www.viruslist.com
127.0.0.1 viruslist.com
127.0.0.1 viruslist.com
127.0.0.1 f-secure.com
127.0.0.1 www.f-secure.com
127.0.0.1 kaspersky.com
127.0.0.1 kaspersky-labs.com
127.0.0.1 www.avp.com
127.0.0.1 www.kaspersky.com
127.0.0.1 avp.com
127.0.0.1 www.networkassociates.com
127.0.0.1 networkassociates.com
127.0.0.1 www.ca.com
127.0.0.1 ca.com
127.0.0.1 mast.mcafee.com
127.0.0.1 my-etrust.com
127.0.0.1 www.my-etrust.com
127.0.0.1 download.mcafee.com
127.0.0.1 dispatch.mcafee.com
127.0.0.1 secure.nai.com
127.0.0.1 nai.com
127.0.0.1 www.nai.com
127.0.0.1 update.symantec.com
127.0.0.1 updates.symantec.com
127.0.0.1 us.mcafee.com
127.0.0.1 liveupdate.symantec.com
127.0.0.1 customer.symantec.com
127.0.0.1 rads.mcafee.com
127.0.0.1 trendmicro.com
127.0.0.1 pandasoftware.com
127.0.0.1 www.pandasoftware.com
127.0.0.1 www.trendmicro.com
127.0.0.1 www.grisoft.com
127.0.0.1 www.microsoft.com
127.0.0.1 microsoft.com
127.0.0.1 www.virustotal.com
127.0.0.1 virustotal.com
127.0.0.1 www.amazon.com
127.0.0.1 www.amazon.co.uk
127.0.0.1 www.amazon.ca
127.0.0.1 www.amazon.fr
127.0.0.1 www.paypal.com
127.0.0.1 paypal.com
127.0.0.1 moneybookers.com
127.0.0.1 www.moneybookers.com
127.0.0.1 www.ebay.com
127.0.0.1 ebay.com
Name Troj/Dagonit-A
Type
* Trojan
Affected operating systems
* Windows
Side effects
* Allows others to access the computer
* Drops more malware
* Installs itself in the Registry
Aliases
* Trojan.Win32.Agent.jh
Prevalence (1-5) 2
Description
Troj/Dagonit-A is a multicomponent backdoor Trojan for the Windows
platform that allows unauthorized remote access through the randomly
open TCP port.
The Trojan creates a user account with the name Service thas is used
by the intruder to take over a control of the infected computer.
Advanced
Troj/Dagonit-A is a multicomponent backdoor Trojan for the Windows
platform that allows unauthorized remote access through the randomly
open TCP port.
The Trojan creates a user account with the name Service thas is used
by the intruder to take over a control of the infected computer.
When Troj/Dagonit-A is installed the following files are created:
<current folder>\dali.reg
<current folder>\dalia2.exe
<current folder>\system.bat
<current folder>\winspool.exe
<current folder>\wpap.exe
where wpap.exe is detected as Troj/Wpap-A.
Troj/Dagonit-A may attempt to replace an original winspool.exe with
the Trojan file.
Troj/Dagonit-A sets a number of registry entries including the
following:
HKLM\System\CurrentControlSet\Services\RDSessMgr
Start
2
HKLM\System\CurrentControlSet\Services\TermService
Start
2
HKLM\System\CurrentControlSet\Services\TlntSvr
Start
2
HKLM\System\CurrentControlSet\Services\lanmanserver
Start
2
Thus making sure that the following services are started at the
restart:
Remote Desktop Help Session Manager
Terminal Services
Telnet
Server
Also the Trojan sets the following registry entries in attempt to
modify security settings:
HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server
fDenyTSConnections
0
TSAdvertise
1
IdleWinStationPoolCount
1
TSAppCompat
1
TSEnabled
1
TSUserEnabled
1
HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\Licensing Core
EnableConcurrentSessions
0
HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\Licensing Core
\WinStations\RDP-Tcp
fEnableWinStation
1
MaxInstanceCount
-1
Troj/Dagonit-A may attempt to delete the following files:
<System>\dllcashe\winlogon.exe
<System>\dllcashe\termsrv.dll
<System>\dllcashe\mstscax.dll
Name W32/Rbot-AUQ
Type
* Worm
How it spreads
* Network shares
Affected operating systems
* Windows
Side effects
* Allows others to access the computer
* Installs itself in the Registry
* Exploits system or software vulnerabilities
Aliases
* Backdoor.Win32.Rbot.ahj
* WORM_SDBOT.CFL
Prevalence (1-5) 2
Description
W32/Rbot-AUQ is a worm and IRC backdoor for the Windows platform.
W32/Rbot-AUQ runs continuously in the background, providing a
backdoor server which allows a remote intruder to gain access and
control over the computer via IRC channels.
W32/Rbot-AUQ may spread to network shares protected by weak passwords
or by exploiting the following system vulnerabilities: LSASS
(MS04-011), RPC-DCOM (MS04-012), WKS (MS03-049), PNP (MS05-039), ASN.1
(MS04-007).
Advanced
W32/Rbot-AUQ is a worm and IRC backdoor for the Windows platform.
W32/Rbot-AUQ runs continuously in the background, providing a
backdoor server which allows a remote intruder to gain access and
control over the computer via IRC channels.
W32/Rbot-AUQ may spread to network shares protected by weak passwords
or by exploiting the following system vulnerabilities: LSASS
(MS04-011), RPC-DCOM (MS04-012), WKS (MS03-049), PNP (MS05-039), ASN.1
(MS04-007).
When first run W32/Rbot-AUQ copies itself to
<Windows system folder>\winsv.exe.
The following registry entries are created to run winsv.exe on startup:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Windows Spools SV
winsv.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows Spools SV
winsv.exe
HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices
Windows Spools SV
winsv.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
Windows Spools SV
winsv.exe
Registry entries are set as follows:
HKCU\SYSTEM\CurrentControlSet\Control\Lsa
Windows Spools SV
winsv.exe
HKLM\SYSTEM\CurrentControlSet\Control\Lsa
Windows Spools SV
winsv.exe
HKCU\Software\Microsoft\OLE
Windows Spools SV
winsv.exe
HKLM\SOFTWARE\Microsoft\Ole
Windows Spools SV
winsv.exe
Name W32/Poebot-P
Type
* Worm
How it spreads
* Network shares
Affected operating systems
* Windows
Side effects
* Allows others to access the computer
* Installs itself in the Registry
* Exploits system or software vulnerabilities
Aliases
* Backdoor.Win32.SdBot.aho
* W32.Linkbot.M
* WORM_RBOT.CFU
Prevalence (1-5) 2
Description
W32/Poebot-P is a worm for the Windows platform.
Advanced
W32/Poebot-P is a worm for the Windows platform.
When first run W32/Poebot-P copies itself to <System>\iexplore.exe
and creates the file jotji.bat in the current folder. The file
jotji.bat harmless on its own and can be safely removed.
W32/Poebot-P will attempt to connect to a remote URL and may spread
through network shares protected by weak passwords and other exploits
including:
LSASS (MS04-011)
RPC-DCOM (MS04-012)
WKS (MS03-049) (CAN-2003-0812)
WebDav (MS03-007)
Veritas (CAN-2004-1172)
Dameware (CAN-2003-1030)
PNP (MS05-039)
ASN.1 (MS04-007)
The following registry entry is created to run iexplore.exe on startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Microsoft Internet Explorer
<System>\iexplore.exe
Name Troj/ParDrop-A
Type
* Trojan
Affected operating systems
* Windows
Side effects
* Drops more malware
Aliases
* Trojan.Win32.Small.da
* Trojan.Win32.Small.cz
* TROJ_SMALL.RX
Prevalence (1-5) 2
Description
Troj/ParDrop-A is a dropper Trojan for the Windows platform.
When first run, Troj/ParDrop-A creates the following files (these
files have their read-only, hidden file attributes set):
<System>\explore.exe - detected as Troj/ParDrop-A
<Temp>\<random filename>.tmp - detected as Troj/ParDrop-A
<System>\inetinfo.exe - detected as W32/Parite-B
<System>\svids.dll - data file which may be safely deleted
Troj/ParDrop-A then attempts to load the W32/Parite-B virus by
running the file <System>\inetinfo.exe.
Advanced
Troj/ParDrop-A is a dropper Trojan for the Windows platform.
When first run, Troj/ParDrop-A creates the following files (these
files have their read-only, hidden file attributes set):
<System>\explore.exe - detected as Troj/ParDrop-A
<Temp>\<random filename>.tmp - detected as Troj/ParDrop-A
<System>\inetinfo.exe - detected as W32/Parite-B
<System>\svids.dll - data file which may be safely deleted
Troj/ParDrop-A then attempts to load the W32/Parite-B virus by
running the file <System>\inetinfo.exe.
Troj/ParDrop-A also sets the following registry entry to run the
W32/Parite-B virus:
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
System
<System>\inetinfo.exe
Name Troj/Goldun-AK
Type
* Spyware Trojan
Affected operating systems
* Windows
Side effects
* Allows others to access the computer
* Steals information
* Drops more malware
* Reduces system security
* Records keystrokes
* Installs itself in the Registry
Prevalence (1-5) 2
Description
Troj/Goldun-AK is a Trojan for the Windows platform.
The Trojan steals login credentials entered into web forms related to
certain financial institutions.
Advanced
Troj/Goldun-AK is a Trojan for the Windows platform.
When run, Troj/Goldun-AK creates the file mside.dll. The file
mside.dll is registered as a COM object and Browser Helper Object
(BHO) for Microsoft Internet Explorer, creating registry entries under:
HKCR\CLSID\{13146842-6251-5625-3072-548536364311}
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper
Objects\{13146842-6251-5625-3072-548536364311}
The Trojan steals login credentials entered into web forms related to
certain financial institutions.
Name W32/Rbot-AWB
Type
* Spyware Worm
How it spreads
* Network shares
* Chat programs
Affected operating systems
* Windows
Side effects
* Allows others to access the computer
* Modifies data on the computer
* Deletes files off the computer
* Steals information
* Downloads code from the internet
Prevalence (1-5) 2
Description
W32/Rbot-AWB is a network worm with backdoor Trojan functionality for
the Windows platform.
W32/Rbot-AWB can be controlled by a remote attacker over IRC channels.
The backdoor component of W32/Rbot-AWB can be instructed by a
remote user to perform various functions.
W32/Rbot-AWB spreads using a variety of techniques including:
-exploiting weak passwords on computers and SQL servers
-exploiting operating system vulnerabilities (including PnP [MS05-039])
and using backdoors opened by other worms or Trojans.
-by sending download links through the AOL Instant Messenger (AIM)
client to online "buddies"
Advanced
W32/Rbot-AWB is a network worm with backdoor Trojan functionality for
the Windows platform.
The worm copies itself to a file named msniu.exe in the Windows
system folder and creates the following registry entries:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
MSN Messenger 32
"msniu.exe"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
MSN Messenger 32
"msniu.exe"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
MSN Messenger 32
"msniu.exe"
W32/Rbot-AWB can be controlled by a remote attacker over IRC channels.
The backdoor component of W32/Rbot-AWB can be instructed by a remote
user to perform the following functions:
start an FTP server
start a Proxy server
start a web server
take part in distributed denial of service (DDoS) attacks
log keypresses
capture screen/webcam images
packet sniffing
port scanning
download/execute arbitrary files
start a remote shell (RLOGIN)
steal product registration information from certain software
W32/Rbot-AWB spreads using a variety of techniques including:
-exploiting weak passwords on computers and SQL servers
-exploiting operating system vulnerabilities (including PnP [MS05-039])
and using backdoors opened by other worms or Trojans.
-by sending download links through the AOL Instant Messenger (AIM)
client to online "buddies"
Name W32/Oscabot-N
Type
* Worm
How it spreads
* Chat programs
Affected operating systems
* Windows
Prevalence (1-5)
Description
W32/Oscabot-N is an instant messaging worm that can exploit users of
AOL Instant Messaging clients.
W32/Oscabot-N will attempt to locate the Aim application and use it
to send web links to other users.
Name W32/Tilebot-AP
Type
* Spyware Worm
How it spreads
* Network shares
Affected operating systems
* Windows
Side effects
* Turns off anti-virus applications
* Allows others to access the computer
* Modifies data on the computer
* Deletes files off the computer
* Steals information
Prevalence (1-5) 2
Description
W32/Tilebot-AP is a worm which attempts to spread to remote network
shares. It also contains backdoor Trojan functionality, allowing
unauthorized remote access to the infected computer via IRC channels.
W32/Tilebot-AP spreads to network shares with weak passwords as a
result of the backdoor Trojan element receiving the appropriate
command from a remote user. The worm can spread to unpatched
computers vulnerable to the following exploits:
ASN.1 (MS04-007)
LSASS (MS04-011)
PNP (MS05-039)
RPC-DCOM (MS04-012)
W32/Tilebot-AP attempts to remove network shares from the infected
computer, as well as changing the policy for SeNetworkLogonRight for
the computer.
W32/Tilebot-AP may attempt to contact scripts on remote sites.
Advanced
W32/Tilebot-AP is a worm which attempts to spread to remote network
shares. It also contains backdoor Trojan functionality, allowing
unauthorized remote access to the infected computer via IRC channels.
W32/Tilebot-AP spreads to network shares with weak passwords as a
result of the backdoor Trojan element receiving the appropriate
command from a remote user. The worm can spread to unpatched
computers vulnerable to the following exploits:
ASN.1 (MS04-007)
LSASS (MS04-011)
PNP (MS05-039)
RPC-DCOM (MS04-012)
W32/Tilebot-AP copies itself to the Windows folder with the filename
ipconfig32.exe and creates a service named "IPtable" with a start up
type of automatic, causing the service to be run each time Windows
starts.
W32/Tilebot-AP allows a remote user to perform a wide range of
actions on the infected computer including downloading further files,
setting registry entries and stealing information from the computer
including from protected storage areas.
W32/Tilebot-AP attempts to terminate services with the following
names in order to disrupt various security processes including the
Windows firewall and Windows critical updates:
Tlntsvr
RemoteRegistry
Messenger
SharedAccess
wscsvc
W32/Tilebot-AP attempts to set the following registry entries to
disrupt various security processes:
HKLM\SOFTWARE\Microsoft\Security Center
UpdatesDisableNotify
1
HKLM\SOFTWARE\Microsoft\Security Center
AntiVirusDisableNotify
1
HKLM\SOFTWARE\Microsoft\Security Center
FirewallDisableNotify
1
HKLM\SOFTWARE\Microsoft\Security Center
AntiVirusOverride
1
HKLM\SOFTWARE\Microsoft\Security Center
FirewallOverride
1
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile
EnableFirewall
0
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile
EnableFirewall
0
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\
AutoUpdate
AUOptions
1
HKLM\SYSTEM\CurrentControlSet\Services\wscsvc
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\TlntSvr
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\Messenger
Start
4
HKLM\SYSTEM\CurrentControlSet\Control\Lsa
restictanonymous
1
HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters
AutoShareWks
0
HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters
AutoShareServer
0
HKLM\SYSTEM\CurrentControlSet\Services\lanmanworkstation\parameters
AutoShareWks
0
HKLM\SYSTEM\CurrentControlSet\Services\lanmanworkstation\parameters
AutoShareServer
0
HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotAlloxXPSP2
1
HKLM\SOFTWARE\Microsoft\OLE
EnableDCOM
"N"
W32/Tilebot-AP may also set entries in the registry at the following
locations:
HKLM\SYSTEM\CurrentControlSet\Control\
WaitToKillServiceTimeout
W32/Tilebot-AP attempts to remove network shares from the infected
computer, as well as changing the policy for SeNetworkLogonRight for
the computer.
W32/Tilebot-AP may attempt to contact scripts on remote sites.
The following registry entries are created as a result of registering
the system service:
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_IPTABLE
<several entries>
HKLM\SYSTEM\CurrentControlSet\Services\IPtable
<several entries>
Name W32/Esbot-B
Type
* Worm
How it spreads
* Network shares
Affected operating systems
* Windows
Side effects
* Allows others to access the computer
* Installs itself in the Registry
Aliases
* Backdoor.Win32.IRCBot.es
* W32/IRCbot.worm.gen
* Backdoor.Trojan
Prevalence (1-5) 2
Description
W32/Esbot-B is a worm and IRC backdoor Trojan for the Windows platform.
W32/Esbot-B will connect to an IRC channel and wait for instructions.
Advanced
W32/Esbot-B is a worm and IRC backdoor Trojan for the Windows platform.
W32/Esbot-B will connect to an IRC channel and wait for instructions.
When first run W32/Esbot-B copies itself to <Windows>\services32.exe.
The file services32.exe is registered as a new system driver service
named "Content List Management Sub System", with a display name of
"services32" and a startup type of automatic, so that it is started
automatically during system startup. Registry entries are created
under:
HKLM\SYSTEM\CurrentControlSet\Services\Content List Management Sub System\
The following registry entry is set:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions
Melt
<pathname of the Trojan executable>
Name W32/Bagle-BS
Type
* Worm
How it spreads
* Email attachments
Affected operating systems
* Windows
Side effects
* Forges the sender's email address
* Uses its own emailing engine
* Downloads code from the internet
* Installs itself in the Registry
Prevalence (1-5) 2
Description
W32/Bagle-BS is a worm for the Windows platform.
W32/Bagle-BS sends a ZIP file as an email attachment. The ZIP file
contains an executable detected as Troj/BagleDl-W. When run, this
executable attempts to download further files, which may include
copies of the original worm W32/Bagle-BS.
W32/Bagle-BS may download and run further malicious code, storing the
downloaded file as re_file.exe in the Windows system folder.
Messages sent by W32/Bagle-BS have the following characteristics. The
subject line is blank. The message text is chosen to be one of the
following lines:
info
texte
The password is <image>
Password: <image>
The attachment name is chosen from the following:
Business.zip
Business_dealing.zip
Health_and_knowledge.zip
Info_prices.zip
max.zip
sms_text.zip
text_sms.zip
The_new_prices.zip
The worm will avoid sending emails to addresses containing any of the
following strings:
@derewrdgrs
@eerswqe
@messagelab
@microsoft
anyone@
certific
contract@
f-secur
free-av
gold-certs@
google
icrosoft
listserv
nobody@
noone@
noreply
postmaster@
rating@
samples
support
update
winrar
winzip
Advanced
W32/Bagle-BS is a worm for the Windows platform.
W32/Bagle-BS sends a ZIP file as an email attachment. The ZIP file
contains an executable detected as Troj/BagleDl-W. When run, this
executable attempts to download further files, which may include
copies of the original worm W32/Bagle-BS.
W32/Bagle-BS may download and run further malicious code, storing the
downloaded file as re_file.exe in the Windows system folder.
Messages sent by W32/Bagle-BS have the following characteristics. The
subject line is blank. The message text is chosen to be one of the
following lines:
info
texte
The password is <image>
Password: <image>
The attachment name is chosen from the following:
Business.zip
Business_dealing.zip
Health_and_knowledge.zip
Info_prices.zip
max.zip
sms_text.zip
text_sms.zip
The_new_prices.zip
The worm will avoid sending emails to addresses containing any of the
following strings:
@derewrdgrs
@eerswqe
@messagelab
@microsoft
anyone@
certific
contract@
f-secur
free-av
gold-certs@
google
icrosoft
listserv
nobody@
noone@
noreply
postmaster@
rating@
samples
support
update
winrar
winzip
When first run W32/Bagle-BS copies itself to <System>\windll2.exe.
The following registry entries are created:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ru1n
erthegdr
<System>\windll2.exe
HKCU\Software\Microsoft\Windows\CurrentVersion\Ru1n
erthegdr
<System>\windll2.exe
W32/Bagle-BS attempts to delete registry entries from the following
locations:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Ru1n
HKCU\Software\Microsoft\Windows\CurrentVersion\Ru1n
Entries are deleted if they have any of the following names:
9XHtProtect
Antivirus
EasyAV
FirewallSvr
HtProtect
ICQ Net
ICQNet
Jammer2nd
KasperskyAVEng
MsInfo
My AV
Norton Antivirus AV
PandaAVEngine
service
SkynetsRevenge
Special Firewall Service
SysMonXP
Tiny AV
Zone Labs Client Ex
W32/Bagle-BS terminates the following processes:
1t1epad.exe
t1es1t.exe
Name Troj/WowPWS-A
Type
* Spyware Trojan
Affected operating systems
* Windows
Side effects
* Steals information
* Installs itself in the Registry
Aliases
* PWSteal.Wowcraft.B
* BackDoor-CUQ
Prevalence (1-5) 2
Description
Troj/WowPWS-A is a password stealing Trojan for the Windows platform.
Troj/WowPWS-A targets the online game World of Warcraft, and attempts
to steal account details.
Advanced
Troj/WowPWS-A is a password stealing Trojan for the Windows platform.
Troj/WowPWS-A targets the online game World of Warcraft, and attempts
to steal account details.
When first run Troj/WowPWS-A copies itself to the following locations:
<Windows folder>\smss.exe
<Windows folder>\finder.com
<Windows folder>\explorer.com
<Windows folder>\exeroute.exe
<Windows folder>\1.com
<Windows system folder>\msconfig.com
<Windows system folder>\rundll32.com
<Windows system folder>\command.pif
<Windows system folder>\dxdiag.com
<Windows system folder>\regedit.com
<Windows system folder>\finder.com
<Windows folder>Debug\DebugProgram.exe
<Program Files>\Internet Explorer\iexplor.com
<Program Files>\Common Files\iexplore.pif
Troj/WowPWS-A sets the following registry entries to start the
various copies of itself:
HKCR\winfiles\Shell\Open\Command
<Windows folder>\exeroute.exe "%1" %*
HKLM\SOFTWARE\Clients\StartMenuInternet\iexplore.pif
LocalizedString
iexplore
HKLM\SOFTWARE\Clients\StartMenuInternet\iexplore.pif\shell\open\command
<Program Files>\Common Files\iexplore.pif
HKLM\SOFTWARE\Windows\CurrentVersion\Run
Torjan Program
<Windows folder>\smss.exe
Name W32/Mytob-FI
Type
* Worm
How it spreads
* Email attachments
Affected operating systems
* Windows
Side effects
* Turns off anti-virus applications
* Allows others to access the computer
* Sends itself to email addresses found on the infected computer
* Forges the sender's email address
Aliases
* Net-Worm.Win32.Mytob.bm
* W32.Mytob.EE@mm
Prevalence (1-5) 2
Description
W32/Mytob-FI is a mass-mailing worm and backdoor Trojan that can be
controlled through the Internet Relay Chat (IRC) network.
W32/Mytob-FI spreads through email. W32/Mytob-FI harvests email
addresses from files on the infected computer and from the Windows
address book. Email sent by W32/Mytob-FI has the following properties:
Subject line:
Your password has been updated
Your password has been successfully updated
You have successfully updated your passworq
Your new account password is approved
Your Account is Suspended
*DETECTED* Online User Violation
Your Account is Suspended For Security Reasons
Warning Message: Your services near to be closed.
Important Notification
Members Support
Security measures
Email Account Suspension
Notice of account limitation
Message text:
Dear user <str>,
You have successfully updated the password of your <str> account.
If you did not authorize this change or if you need assistance with
your account, please contact <str> customer service at: <str>
Thank you for using <str>!
The <str> Support Team
+++ Attachment: No Virus (Clean)
+++ <str> Antivirus - www.<str>
Dear user <str>,
It has come to our attention that your <str> User Profile ( x )
records are out of date. For further details see the attached document.
Thank you for using <str>!
The <str> Support Team
+++ Attachment: No V
|