|
Post by StRiDeR on Mar 9, 2004 13:03:08 GMT 8
W32/Roca-A Aliases Sober.D, W32/Sober.D@mm, I-Worm.Sober.D Type Win32 worm Detection A virus identity (IDE) file which provides protection is available now from the Latest virus identities section, and will be incorporated into the April 2004 (3.80) release of Sophos Anti-Virus.
Enterprise Manager and PureMessage customers will be automatically protected at their next scheduled update.
Sophos has received several reports of this worm from the wild. Description W32/Roca-A is a worm that arrives in an email with the following characteristics: Subject line: Microsoft Alert: Please Read! Message text: New MyDoom Virus Variant Detected! A new variant of the W32.Mydoom (W32.Novarg) worm spread rapidly through the Internet. Anti-virus vendor Central Command claims that 1 in 45 e-mails contains the MyDoom virus. The worm also has a backdoor Trojan capability. By default, the Trojan component listens on port 13468. Protection: Please download this digitally signed attachment. This Update includes the functionality of previously released patches.
+++ 2004 Microsoft Corporation. All rights reserved. +++ One Microsoft Way, Redmond, Washington 98052 +++ Restricted Rights at 48 CFR 52.227-19
OR
Subject line: Microsoft Alarm: Bitte Lesen! Message text: Neue Virus-Variante W32.Mydoom verbreitet sich schnell. Eine neue Mydoom-Variante verbreitet sich derzeit rasend schnell im Internet. Wie seine VorgSnger verschickt sich der Wurm von infizierten Windows-Rechnern per E-Mail an weitere Adressen. Zudem installiert er auf infizierten Systemen einen gefShrlichen Trojaner! Bitte daten Sie Ihr System mit dem Patch ab, um sich vor diesem SchSdling zu schntzen!
+++ 2004 Microsoft Corporation. Alle Rechte vorbehalten. +++ Microsoft Deutschland GmbH, Konrad-Zuse-Strasse 1 +++ 85716 Unterschleissheim, HRB 70438, DE 129 415 943
The attachment name is one of the following keywords followed by a random number with either an EXE or ZIP extension: Patch MS-Security MS-UD UpDate sys-patch
W32/Roca-A copies itself to the Windows system folder using a combination of the following words with an EXE extension: sys, host, dir, explorer, win, run, log, 32, disc, crypt, data, diag, spool, service, smss32
and sets the following registry entries to ensure it is run at system logon:
HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce\ <random name> = <SYSTEM>\<random file> %1
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ <random name>\<random name> = <SYSTEM>\<random file>
where <random file> is the name of the copy of the worm and <random name> is generated using the same word list.
W32/Roca-A will also create the following files in the Windows system folder:
Humgly.lkur
mslogs32.dll - a list of email addresses found on system
temp32x.data - a base64 encoded copy of the worm
wintmpx33.dat - a base64 encoded ZIP copy of the worm
yfjq.yqwm
zmndpgwf.kxx
The files mslogs32.dll, zmndpgwf.kxx, yfjq.yqwm and Humgly.lkur are not malicious and can be deleted. When first run W32/Roca-A will display a message box stating "This patch has been successfully installed."
If the worm is executed again it will display a message box stating "This patch does not need to be installed on this system.
Status: OK" Recovery Please follow the instructions for removing worms.
|
|
|
Post by StRiDeR on Mar 9, 2004 13:04:36 GMT 8
W32/Randex-AA Aliases Backdoor.SdBot.gen, W32/Randbot.worm, Win32/Randex.AL, W32.Randex.R Type Win32 worm Detection A virus identity (IDE) file which provides protection is available now from the Latest virus identities section, and will be incorporated into the April 2004 (3.80) release of Sophos Anti-Virus.
Enterprise Manager and PureMessage customers will be automatically protected at their next scheduled update.
At the time of writing, Sophos has received just one report of this worm from the wild. Description W32/Randex-AA is a network worm with backdoor capabilities which allows a remote intruder to access and control the computer via IRC channels. W32/Randex-AA spreads over a network by copying itself to the Windows system32 folder of C$ and Admin$ shares that contain weak passwords.
Each time the worm is run it tries to connect to a remote IRC server and join a specific channel. The worm then runs in the background as a server process listening for commands to execute.
When first run the worm copies itself to Windows system folder and creates the following registry entries so that the worm is run when Windows starts up:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ Microsoft Mouse Driver Ver 3.0
HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce\ Microsoft Mouse Driver Ver 3.0
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices\ Microsoft Mouse Driver Ver 3.0
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ Microsoft Mouse Driver Ver 3.0
HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce\ Microsoft Mouse Driver Ver 3.0
W32/Randex-AA collects CD keys of popular games that are installed on the computer. Recovery Please follow the instructions for removing worms.
|
|
|
Post by StRiDeR on Mar 9, 2004 13:05:45 GMT 8
W32/Netsky-K Type Win32 worm Detection A virus identity (IDE) file which provides protection is available now from the Latest virus identities section, and will be incorporated into the April 2004 (3.80) release of Sophos Anti-Virus. Enterprise Manager and PureMessage customers will be automatically protected at their next scheduled update. Sophos has received several reports of this worm from the wild. Description W32/Netsky-K is a mass mailing worm that uses its own SMTP engine to email itself to addresses harvested from files on local drives. In order to run automatically when the user logs on to the computer the worm copies itself to the file avpguard.exe in the Windows folder and creates the following registry entry:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\My AV = <Windows folder>\avpguard.exe -av serv
The worm attempts to disable various anti-virus and security related applications as well as other worm processes by deleting registry entries used by them.
In particular it attempts to delete the following values:
Taskmon, Explorer, system., msgsvr32, DELETE ME, service, Sentry, Windows Services Host
below the registry key:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
The worm deletes the following values:
Explorer, d3dupdate.exe, au.exe, OLE, Windows Services Host, gouday.exe, rate.exe, sate.exe, ssate.exe, srate.exe, sysmon.exe.
below the registry key:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
W32/Netsky-K also deletes the following registry entries:
HKCR\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InProcServer32 HKLM\System\CurrentControlSet\Services\WksPatch HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\PINF
Some of the above entries are created by variants of the W32/Bagle and W32/MyDoom families of worms.
W32/Netsky-K harvests email addresses from files on all local drives which have one of the following extensions:
XML, WSH, JSP, DHTM, CGI, SHTM, MSG, OFT, SHT, DBX, TBB, ADB, DOC, WAB, ASP, UIN, RTF, VBS, HTML, HTM, PL, PHP, TXT, EML
The worm avoids email addresses containing the following strings:
iruslis antivir sophos freeav andasoftwa skynet messagelabs abuse fbi orton f-pro aspersky cafee orman itdefender f-secur spam ymantec antivi icrosoft
Emails have the following characteristics:
Subject lines:
Your product Your letter Re: corrected homework Re: I've found your document Re: Your bill Re: hello again Re: hi again Re: part 3 Re: important document part 2 Re: important Re: Your data Re: Your application Re: your music Re: excel document Re: Re: Re: word document Re: Your details Re: My details Re: Your requested file Re: Read it immediately Re: Approved Re: Your software Re: my memberlist Re: Your document Re: Your file Re: Your important document http://www.<username>.tripod.com Hi Mr. <username> Moi <username> Yours faithfully, <username> Message to <username> Hi Mrs. <username> Is <username>.doc yours? Is <username>.xls yours? Whats up <username> www.paypal.com/<username> Best <username> Love <username> Good morning <username> Have a good day <username> Dear <username> To <username> , it's me Welcome <username> Moin <username> Hello <username> Your account <username> is expired! Hey <username> http://www.<username>.freepage.com, your website Hi <username>, your product Hello <username>, your letter Re: Hi <username>, your archive Re: <username>, your text Re: Hello <username>, your bill Re: Hi <username>, your details Re: Hello <username>, my details Re: Hi <username>, your word file Re: Hello <username>, your excel file Re: Hi <username>, details Re: Hello <username>, Approved Re: Hello <username>, your software Re: Hi <username>, your music Re: Dear <username>, Here Re: Re: Re: Hello <username>, your document Re: Hi <username> Re: Dear <username>, Hi Re: Re: Hi <username>, your message Re: Here <username>, your picture Re: Hi <username>, here is the document Re: Hello <username>, your document Re: <username>, thanks! Re: Re: <username>, thanks! Re: Re: Hi <username>, document Re: Hello <username>, document
Message texts:
My details are in the attached file. I have corrected your document. Please do not forget to read the important document. I have an interesting document about you. The sample is attached. Your personal document is attached. Your file is attached to this mail. Note that I have attached your file. The important document is attached. Please read the document. It's important. Your document is attached to this mail. See the attachment for further details. Your file is attached. Use this password for the file: <N>. Please read the attached file. Password for the file is <N>. Please have a look at the attached file. Password for decrypting is <N>. See the attached file for details. Password is <N>. Here is the file. My password is <N>. Your document is attached. Your password is <N>.
where <N> is a variable number.
Attached file:
website_<username>.pif your_product_<username>.pif letter_<username>.pif archive<username>.pif your_text<username>.pif bill_<username>.pif your_details<username>.pif <username>_details.pif <username>_document_word.pif <username>_document_excel.pif <username>_my_details.pif <username>_all_document.pif <username>_application.pif mp3music_<username>.pif yours<username>.pif document_<username>4351.pif <username>_picture.pif <username>_file.pif <username>_message_details.pif yourpicture<username>.pif <username>_document_full.pif <username>_your_message_part2.pif <username>information.pif <username>document.pif <username>_your_document.pif
On 10 March 2004 W32/Netsky-K plays random sounds between 10 a.m. and 11 a.m. Recovery Please follow the instructions for removing worms.
|
|
|
Post by StRiDeR on Mar 9, 2004 13:07:07 GMT 8
W32/Netsky-J Type Win32 worm Detection A virus identity (IDE) file which provides protection is available now from the Latest virus identities section, and will be incorporated into the April 2004 (3.80) release of Sophos Anti-Virus.
Enterprise Manager and PureMessage customers will be automatically protected at their next scheduled update.
Sophos has received several reports of this worm from the wild. Description W32/Netsky-J is a mass mailing worm that uses its own SMTP engine to email itself to addresses harvested from files on local drives. In order to run automatically when the user logs on to the computer the worm copies itself to the file winlogon.exe in the Windows folder and creates the following registry entry:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ICQ Net =<Windows folder>\winlogon.exe -stealth
The worm attempts to disable various anti-virus and security related applications as well as other worm processes by deleting registry entries used by them.
In particular it attempts to delete the following values:
Taskmon, Explorer, KasperskyAv, system., msgsvr32, DELETE ME, service, Sentry, Windows Services Host
below the registry key:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
The worm deletes the following values:
Explorer, KasperkyAv, d3dupdate.exe, au.exe, OLE, Windows Services Host
below the registry key:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
W32/Netsky-J also deletes the following registry entries:
HKCR\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InProcServer32 HKLM\System\CurrentControlSet\Services\WksPatch HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\PINF
Some of the above entries are created by the different variants of the W32/Bagle and W32/MyDoom families of worms.
W32/Netsky-J harvests email addresses from files on all local drives which have one of the following extensions:
DHTM, CGI, SHTM, MSG, OFT, SHT, DBX, TBB, ADB, DOC, WAB, ASP, UIN, RTF, VBS, HTML, HTM, PL, PHP, TXT, EML
The worm avoids email addresses containing the following strings:
skynet messagelabs abuse fbi orton f-pro aspersky cafee orman itdefender f-secur spam ymantec antivi icrosoft
Emails have the following characteristics:
Subject lines:
Re: Your website Re: Your product Re: Your letter Re: Your archive Re: Your text Re: Your bill Re: Your details Re: My details Re: Word file Re: Excel file Re: Details Re: Approved Re: Your software Re: Your music Re: Here Re: Re: Re: Your document Re: Hello Re: Hi Re: Re: Message Re: Your picture Re: Here is the document Re: Your document Re: Thanks! Re: Re: Thanks! Re: Re: Document Re: Document
Message texts:
Your file is attached. Please read the attached file. Please have a look at the attached file. See the attached file for details. Here is the file. Your document is attached.
Attached filename:
your_website.pif your_product.pif your_letter.pif your_archive.pif your_text.pif your_bill.pif your_details.pif document_word.pif document_excel.pif my_details.pif all_document.pif application.pif mp3music.pif yours.pif document_4351.pif your_file.pif message_details.pif your_picture.pif document_full.pif message_part2.pif document.pif your_document.pif
On 2 March 2004 at 6:00 AM W32/Netsky-I plays random sounds for three hours. Recovery Please follow the instructions for removing worms.
|
|
|
Post by atokENSEM on Mar 10, 2004 0:53:22 GMT 8
Hacker Serang 13 Situs NASA Apakah 13 memang angka sial sehingga seorang hacker asal Brazil beridentitas drwxr hanya menyerang tiga belas situs yang dimiliki NASA? Pengumuman yang dilansir Zone-H—sebuah organisasi yang memantau aktivitas hacking—menyebutkan bahwa hacker telah memodifikasi halaman indeks di situs-situs NASA untuk menyatakan opininya perihal perang. Sebuah pesan ditinggalkan sang hacker: The war in Iraq, kill is a play (perang di Irak, membunuh jadi permainan). Pesan ini sekaligus memuat link ke rekaman video CNN yang memperlihatkan aksi serdadu AS di Irak. Situs utama NASA, www.nasa.gov diduga lolos dari serangan karena masih tetap online hingga pagi ini. Zone-H, mengutip Netcraft Ltd., sebuah konsultan Internet asal Inggris, mengatakan bahwa situs-situs milik badan ruang angkasa AS tersebut menggunakan Web server Apache 1.3.27 dengan PHP (bahasa script open source yang biasa digunakan untuk membuat dynamic Web pages) dan beberapa modul Apache pada sistem Linux. Sampai kemarin, para pejabat NASA belum dapat dimintai keterangan. Namun agaknya NASA sudah menonaktifkan situs-situsnya, karena sudah tidak bisa diakses. Situs-situs NASA yang diserang antara lain : situs Computing, Information and Communications Technology Program (www.cict.nasa.gov); Advanced Supercomputing Division/ Numerical Aerospace Simulation Systems Division (www.nas.nasa.gov); Information Power Grid (www.ipg.nasa.gov); dan NASA Research & Education Network (www.nren.nasa.gov).
|
|
|
Post by StRiDeR on Mar 11, 2004 0:45:57 GMT 8
Troj/Cidra-D Type Trojan Detection A virus identity (IDE) file which provides protection is available now from the Latest virus identities section, and will be incorporated into the April 2004 (3.80) release of Sophos Anti-Virus.
Enterprise Manager and PureMessage customers will be automatically protected at their next scheduled update.
Sophos has received several reports of this Trojan from the wild. Description Troj/Cidra-D is a backdoor proxy Trojan that allows a remote intruder to relay TCP traffic through the compromised computer. The Trojan normally runs as the file usb_d.exe. In order to be executed automatically when the user logs on to the computer Troj/Cidra-D adds a registry entry at the following location:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Usbd
The Trojan opens a random listening port and periodically attempts to connect to a remote website to register itself.
The Trojan also has the ability to download and execute a file from a remote website.
Troj/Cidra-D appears to have been spammed out. The email has the following characteristics:
The subject line is "This your photo?", possibly interspersed with non-Roman characters. For example:
+This your photo? This+ your photo? This your photo? This y_our photo? This your pho+to^? This yo_ur -photo? Th_is your photo? This you-r _photo? Thi^s your photo? Thi-s +your photo?
The message text is "Is this your photo? I cant belive it made it onto the internet!"
The attached file is a ZIP archive called p_usb.zip. Recovery Please follow the instructions for removing Trojans.
|
|
|
Post by StRiDeR on Mar 11, 2004 0:47:09 GMT 8
Troj/Domwis-A Aliases BackDoor-AOZ, BKDR_DOMWIS.A Type Trojan Detection A virus identity (IDE) file which provides protection is available now from the Latest virus identities section, and will be incorporated into the April 2004 (3.80) release of Sophos Anti-Virus.
Enterprise Manager and PureMessage customers will be automatically protected at their next scheduled update.
At the time of writing, Sophos has received just one report of this Trojan from the wild. Description Troj/Domwis-A is an IRC backdoor Trojan which allows a malicious user remote access to an infected computer. When first run the Trojan copies itself to the Windows folder as RUNDLL16.EXE and creates the following registry entry to ensure it is run on system logon:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ Windows DLL Loader = <WINDOWS>\RUNDLL16.EXE
Troj/Domwis-A will steal system information and log keystrokes.
Troj/Domwis-A can download and execute remote files on the infected computer. The Trojan can also be instructed to retrieve file listings and delete files and terminate processes.
Troj/Domwis-A will create the file temp.bat in the Windows folder. This file is not malicious on its own, however it should be deleted. Recovery Please follow the instructions for removing Trojans.
|
|
|
Post by StRiDeR on Mar 11, 2004 0:48:37 GMT 8
W32/Netsky-L Type Win32 worm Detection A virus identity (IDE) file which provides protection is available now from the Latest virus identities section, and will be incorporated into the April 2004 (3.80) release of Sophos Anti-Virus.
Enterprise Manager and PureMessage customers will be automatically protected at their next scheduled update.
Sophos has received several reports of this worm from the wild. Description W32/Netsky-L is a worm that arrives in an email with the following characteristics: Subject line: one of the following - Re: Important Re: Your document Re: Your details Re: Approved Message text: one of the following - Your file is attached. Please read the document. Your document is attached. Please read the attached file. Please see the attached file for details.
The attached filename has the following construction: <word>_<user name of recipient>.pif or <user name of recipient>.pif where <word> is one of: your_file_ details_ document_
and the user name is taken from the string preceeding the "@" in the recipient's email address.
For example if the recipient's email address is Joe.Bloggs@example.com then the attached file could be details_Joe.Bloggs.pif
When W32/Netsky-L is run a copy will be created in the Windows folder with the filename AVprotect.exe and the following registry entry will be created so that the worm is run when the victim logs on to Windows:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\HtProtect Recovery Please follow the instructions for removing worms.
|
|
|
Post by atokENSEM on Mar 11, 2004 1:05:02 GMT 8
Informatics dan UI Hadirkan Sertifikasi Hacker
infokomputer.com, Makin meningkatnya resiko keamanan yang ditimbulkan para hacker, baik di dalam maupun di luar perusahaan membuat banyak perusahaan semakin menyadari perlu adanya seseorang yang memahami pola pikir dan cara kerja hacker. Untuk itu biasanya mereka menyewa perusahaan layanan ethical hacker, atau memiliki seorang yang memiliki sertifikat ethical hacker di dalam perusahaan tersebut.
Mengantisipasi permintaan tersebut, bekerjasama dengan GDLN Universitas Indonesia, Informatics memperkenalkan sertifikasi hacker bertaraf internasional. Pelatihan bagi mereka yang ingin mendapatkan sertifikasi Certified Ethical Hacker (CEH) ini dihadirkan dengan lisensi dari EC Council yang berpusat di New York.
Seorang yang mendapatkan sertifikasi CEH adalah profesional yang memiliki kemampuan untuk mengerti dan mengetahui cara melihat kelemahan sebuah sistem.
Untuk terus mengikuti perkembangan, materi pelatihan untuk mendapatkan CEH diperbarui setiap dua bulan, kata Sanjay Bavisi, Managing Director EC Council Asia Pacific. Pelatihan ini berlangsung selama 40 jam.
Dalam pelatihan tersebut, peserta diajarkan pola berpikir seorang hacker. Dengan demikian, peserta dapat melindungi sistem sekuriti dengan lebih baik.
Materi yang dibahas pada pelatihan mencakup sejumlah teknik yang umum digunakan hacker,seperti Trojan dan backdoor, sniffing, Denial of Service, Session Hijacking, Social Engineering, teknik mengcrack password, Virus dan worm, IDS, Firewall, Honeypot, hacking ke sistem Windows, Linux, dan Novell, Firewall, dan sebagainya termasuk kriptografi.
Untuk pelatihan selama lima hari kerja, Informatics bekerja sama dengan GDLN UI menawarkan biaya pelatihan sebesar delapan juta rupiah.
|
|
|
Post by StRiDeR on Mar 11, 2004 18:04:15 GMT 8
W32/Netsky-M Type Win32 worm Detection A virus identity (IDE) file which provides protection is available now from the Latest virus identities section, and will be incorporated into the April 2004 (3.80) release of Sophos Anti-Virus.
Enterprise Manager and PureMessage customers will be automatically protected at their next scheduled update.
At the time of writing, Sophos has received just one report of this worm from the wild. Description W32/Netsky-M is a mass mailing worm which spreads by emailing itself to addresses harvested from files on the local drives. The worm copies itself to the Windows folder as AVPROTECT9X.EXE and adds the following registry entry to run itself whenever the user logs on to the computer:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\9XHtProtect= <Windows folder>\AVprotect9x.exe
W32/Netsky-M harvests email addresses from files with the following extensions:
PL, HTM, HTML, EML, TXT, PHP, VBS, RTF, UIN, ADB, TBB, DBX, ASP, WAB, DOC, SHT,OFT, MSG, JSP, WSH, XML, SHTM, CGI, DHTM
Emails have the following characteristics:
Subject lines:
Re: <recipient_name> Requested file Re: <recipient_name> My file Re: <recipient_name> My document Re: <recipient_name> My information Re: <recipient_name> My details Re: <recipient_name> Information Re: <recipient_name> Improved Re: <recipient_name> Requested document Re: <recipient_name> Document Re: <recipient_name> Details Re: <recipient_name> Your document Re: <recipient_name> Your details Re: <recipient_name> Approved
Message texts:
Details for <attached_filename>. Document <attached_filename>. I have received your document. The improved document <attached_filename> is attached. I have attached your document <attached_filename>. Your document <attached_filename> is attached to this mail. Authentification for <attached_filename> required. Requested file <attached_filename>. See the file <attached_filename>. Please read the important message msg_<attached_filename>. Please confirm the document <attached_filename>. <attached_filename> is attached. Your file <attached_filename> is attached. Please read the document <attached_filename>. Your document <attached_filename> is attached. Please read the attached file <attached_filename>. Please see the attached file <attached_filename> for details.
Attached file (extension PIF):
<recipient_name> improved_<recipient_name> message_<recipient_name> detailed_<recipient_name> your_document_<recipient_name> word_doc_<recipient_name> doc_<recipient_name> articel_<recipient_name> picture_<recipient_name> file_<recipient_name> your_file_<recipient_name> details_<recipient_name> document_<recipient_name> Recovery Please follow the instructions for removing worms.
|
|
|
Post by StRiDeR on Mar 13, 2004 19:57:14 GMT 8
Troj/LDPinch-G Aliases Trojan.PSW.LdPinch.ca, PWS-LDPinch Type Trojan Detection A virus identity (IDE) file which provides protection is available now from the Latest virus identities section, and will be incorporated into the April 2004 (3.80) release of Sophos Anti-Virus.
Enterprise Manager and PureMessage customers will be automatically protected at their next scheduled update.
At the time of writing, Sophos has received just one report of this Trojan from the wild. Description Troj/LDPinch-G sends passwords and confidential information to a remote location and provides backdoor access to the computer. When first run the Trojan moves itself to the Windows folder and adds its pathname to the following registry entry, to run itself on startup:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\putil
The Trojan periodically attempts to send confidential information to a remote location. The information includes:
computer details (OS version, memory, CPU etc.)
available drives (drive letter, type and free space)
hostname and IP address
Windows folder volume information
installation details and data stored in the registry for selected software, including ICQ and Trillian
passwords and confidential information from 'Protected Storage'
POP3 and IMAP server information, usernames and passwords
FTP usernames and passwords
RAS dial-up settings
The Trojan then runs continuously in the background providing backdoor access to the computer on port 2050. A remote intruder will be able to connect to this port and receive a remote command shell. The Trojan also drops the file isfpr.dll into the Windows folder. This file is detected as Troj/Mimail-F. Recovery Please follow the instructions for removing Trojans.
|
|
|
Post by StRiDeR on Mar 13, 2004 19:58:55 GMT 8
Troj/LDPinch-H Aliases Trojan.PSW.LdPinch.o, PWS-LDPinch trojan, PWSteal.Trojan Type Trojan Detection A virus identity (IDE) file which provides protection is available now from the Latest virus identities section, and will be incorporated into the May 2004 (3.81) release of Sophos Anti-Virus.
Enterprise Manager and PureMessage customers will be automatically protected at their next scheduled update.
At the time of writing, Sophos has received just one report of this Trojan from the wild. Description Troj/LDPinch-H sends passwords and confidential information to a remote location and provides backdoor access to the computer. When first run the Trojan moves itself to the Windows folder and adds its pathname to the following registry entry, to run itself on startup:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\putil
The Trojan periodically attempts to send confidential information to a remote location. The information includes:
computer details (OS version, memory, CPU etc.)
available drives (drive letter, type and free space)
hostname and IP address
Windows folder volume information
data stored in the registry by selected software
passwords and confidential information from 'Protected Storage'
POP3 and IMAP server information, usernames and passwords
FTP usernames and passwords
RAS dial-up settings
The Trojan then runs continuously in the background providing backdoor access to the computer. The Trojan may also drop the file isfpr.dll to the Windows folder. This file is detected as Troj/Mimail-F. Recovery Please follow the instructions for removing Trojans.
|
|
|
Post by StRiDeR on Mar 15, 2004 16:34:11 GMT 8
W32/Bagle-O Type Win32 worm Detection A virus identity (IDE) file which provides protection is available now from the Latest virus identities section, and will be incorporated into the May 2004 (3.81) release of Sophos Anti-Virus.
Enterprise Manager and PureMessage customers will be automatically protected at their next scheduled update.
At the time of writing, Sophos has received no reports from users affected by this worm. However, we have issued this advisory following enquiries to our support department from customers. Description W32/Bagle-O is an email worm which can also infect EXE files through a parasitic method. A more detailed description will be posted here shortly. Recovery Please follow the instructions for removing worms.
|
|
|
Post by StRiDeR on Mar 15, 2004 16:35:15 GMT 8
W32/Bagle-Zip Aliases Win32/Bagle.gen.zip Type Win32 worm Detection A virus identity (IDE) file which provides protection is available now from the Latest virus identities section, and will be incorporated into the April 2004 (3.80) release of Sophos Anti-Virus.
Enterprise Manager and PureMessage customers will be automatically protected at their next scheduled update.
Sophos has received several reports of this worm from the wild.
Note: Sophos has been detecting W32/Bagle-Zip since 14:26 GMT on 04 March 2004 and has issued this updated IDE to improve detection. Description Sophos Anti-Virus detects as W32/Bagle-Zip the password-protected archive files created by W32/Bagle-F, W32/Bagle-G, W32/Bagle-H, W32/Bagle-I, W32/Bagle-J, W32/Bagle-K (ZIP archives), W32/Bagle-N and W32/Bagle-O (ZIP and RAR archives). Recovery Please follow the instructions for removing worms.
|
|
|
Post by StRiDeR on Mar 19, 2004 13:03:45 GMT 8
W32/Bagle-R Aliases Win32/Bagle.R, W32/Bagle.R.worm, W32/Bagle.S, I-Worm.Bagle.p, W32/Bagle.T, W32.Beagle.R@mm, W32.Beagle.S@mm, W32.Beagle.T@mm Type Win32 executable file virus Detection A virus identity (IDE) file which provides protection is available now from the Latest virus identities section, and will be incorporated into the May 2004 (3.81) release of Sophos Anti-Virus.
Enterprise Manager and PureMessage customers will be automatically protected at their next scheduled update.
Sophos has received several reports of this virus from the wild.
Note: Sophos has been detecting W32/Bagle-R since 08:33 GMT on 18 March, and has issued this new IDE to improve detection. Description Please note: Sophos Anti-Virus also detects the W32/Bagle-S and W32/Bagle-T worms as W32/Bagle-R. W32/Bagle-R is a mass-mailing virus that spreads in an unusual manner.
W32/Bagle-R spreads via a "carrier" email which does not contain the worm as an attachment.
The email has the following charactersitics:
The Sender address is spoofed.
Subject line: randomly chosen from - Re: Msg reply Re: Hello Re: Yahoo! Re: Thank you! Re: Thanks RE: Text message Re: Document Incoming message Re: Incoming Message Re: Incoming Fax Hidden message Fax Message Received Protected message RE: Protected message Forum notify Request response Site changes Re: Hi Encrypted document
There is no visible message text.
The email addresses are harvested from the hard drive of infected machines by searching for files with the extensions WAB, TXT, MSG, HTM, SHTM, STM, XML, DBX, MBX, MDX, EML, NCH, MMF, ODS, CFG, ASP, PHP, WSH, ADB, TBB, SHT, XLS and OFT.
W32/Bagle-R avoids email addresses containing the following:
@hotmail, @msn, @microsoft, rating@, f-secur, anyone@, bugs@, contract@, feste, gold-certs@, help@, info@, nobody@, noone@, kasp, admin, icrosoft, support, ntivi, unix, linux, listserv, certific, sopho, @foo, @iana, free-av, @messagelab, winzip, google, winrar, samples, abuse, panda, cafee, spam, @avp., noreply, local, root@, postmaster@
When you open the "carrier" email, the email attempts to exploit a vulnerability in Outlook. The exploit may cause the email client to automatically download W32/Bagle-R from the IP address of a computer infected with a Bagle variant. The IP address of the computer "server" serving the Bagle executable is randomly chosen from the list of of 590 IP addresses from the virus data section.
The security vulnerability was reportedly patched by Microsoft in Microsoft Security Bulletin MS03-040.
The "carrier" email connects to port 81 of the host and opens an HTML file. The HTML file drops and launches a Visual Basic script q.vbs. This script connects to the same server and downloads W32/Bagle-R via an HTTP (web) request to TCP port 81.
The downloaded copy of W32/Bagle-R is placed into your system folder with the name directs.exe or direct.exe (depending on the variant).
W32/Bagle-R loads on your PC and terminates a wide range of security applications. The list of applications is: CLEANER3.EXE au.exe d3dupdate.exe CLEANPC.EXE AVprotect9x.exe CMGRDIAN.EXE CMON016.EXE CPF9X206.EXE CPFNT206.EXE CV.EXE CWNB181.EXE CWNTDWMO.EXE ICSSUPPNT.EXE DEFWATCH.EXE DEPUTY.EXE DPF.EXE DPFSETUP.EXE DRWATSON.EXE ENT.EXE ESCANH95.EXE AVXQUAR.EXE ESCANHNT.EXE ESCANV95.EXE AVPUPD.EXE EXANTIVIRUS-CNET.EXE FAST.EXE FIREWALL.EXE FLOWPROTECTOR.EXE FP-WIN_TRIAL.EXE FRW.EXE FSAV.EXE AUTODOWN.EXE FSAV530STBYB.EXE FSAV530WTBYB.EXE FSAV95.EXE GBMENU.EXE GBPOLL.EXE GUARD.EXE GUARDDOG.EXE HACKTRACERSETUP.EXE HTLOG.EXE HWPE.EXE IAMAPP.EXE IAMAPP.EXE IAMSERV.EXE ICLOAD95.EXE ICLOADNT.EXE ICMON.EXE ICSUPP95.EXE ICSUPPNT.EXE IFW2000.EXE IPARMOR.EXE IRIS.EXE JAMMER.EXE ATUPDATER.EXE AUPDATE.EXE KAVLITE40ENG.EXE KAVPERS40ENG.EXE KERIO-PF-213-EN-WIN.EXE KERIO-WRL-421-EN-WIN.EXE BORG2.EXE BS120.EXE CDP.EXE CFGWIZ.EXE CFIADMIN.EXE CFIAUDIT.EXE AUTOUPDATE.EXE CFINET.EXE NAVAPW32.EXE NAVDX.EXE NAVSTUB.EXE NAVW32.EXE NC2000.EXE NCINST4.EXE AUTOTRACE.EXE NDD32.EXE NEOMONITOR.EXE NETARMOR.EXE NETINFO.EXE NETMON.EXE NETSCANPRO.EXE NETSPYHUNTER-1.2.EXE NETSTAT.EXE NISSERV.EXE NISUM.EXE NMAIN.EXE NORTON_INTERNET_SECU_3.0_407.EXE NPF40_TW_98_NT_ME_2K.EXE NPFMESSENGER.EXE NPROTECT.EXE NSCHED32.EXE NTVDM.EXE NVARCH16.EXE KERIO-WRP-421-EN-WIN.EXE KILLPROCESSSETUP161.EXE LDPRO.EXE LOCALNET.EXE LOCKDOWN.EXE LOCKDOWN2000.EXE LSETUP.EXE OUTPOST.EXE CFIAUDIT.EXE LUCOMSERVER.EXE AGENTSVR.EXE ANTI-TROJAN.EXE ANTI-TROJAN.EXE ANTIVIRUS.EXE ANTS.EXE APIMONITOR.EXE APLICA32.EXE APVXDWIN.EXE ATCON.EXE ATGUARD.EXE ATRO55EN.EXE ATWATCH.EXE AVCONSOL.EXE AVGSERV9.EXE AVSYNMGR.EXE BD_PROFESSIONAL.EXE BIDEF.EXE BIDSERVER.EXE BIPCP.EXE BIPCPEVALSETUP.EXE BISP.EXE BLACKD.EXE BLACKICE.EXE BOOTWARN.EXE NWINST4.EXE NWTOOL16.EXE OSTRONET.EXE OUTPOSTINSTALL.EXE OUTPOSTPROINSTALL.EXE PADMIN.EXE PANIXK.EXE PAVPROXY.EXE DRWEBUPW.EXE PCC2002S902.EXE PCC2K_76_1436.EXE PCCIOMON.EXE PCDSETUP.EXE PCFWALLICON.EXE PCFWALLICON.EXE PCIP10117_0.EXE PDSETUP.EXE PERISCOPE.EXE PERSFW.EXE PF2.EXE AVLTMAIN.EXE PFWADMIN.EXE PINGSCAN.EXE PLATIN.EXE POPROXY.EXE POPSCAN.EXE PORTDETECTIVE.EXE PPINUPDT.EXE PPTBC.EXE PPVSTOP.EXE PROCEXPLORERV1.0.EXE PROPORT.EXE PROTECTX.EXE PSPF.EXE WGFE95.EXE WHOSWATCHINGME.EXE AVWUPD32.EXE NUPGRADE.EXE WHOSWATCHINGME.EXE WINRECON.EXE WNT.EXE WRADMIN.EXE WRCTRL.EXE WSBGATE.EXE WYVERNWORKSFIREWALL.EXE XPF202EN.EXE ZAPRO.EXE ZAPSETUP3001.EXE ZATUTOR.EXE CFINET32.EXE CLEAN.EXE CLEANER.EXE CLEANER3.EXE CLEANPC.EXE CMGRDIAN.EXE CMON016.EXE CPD.EXE CFGWIZ.EXE CFIADMIN.EXE PURGE.EXE PVIEW95.EXE QCONSOLE.EXE QSERVER.EXE RAV8WIN32ENG.EXE REGEDT32.EXE REGEDIT.EXE UPDATE.EXE RESCUE.EXE RESCUE32.EXE RRGUARD.EXE RSHELL.EXE RTVSCN95.EXE RULAUNCH.EXE SAFEWEB.EXE SBSERV.EXE SD.EXE SETUP_FLOWPROTECTOR_US.EXE SETUPVAMEEVAL.EXE SFC.EXE SGSSFW32.EXE SH.EXE SHELLSPYINSTALL.EXE SHN.EXE SMC.EXE SOFI.EXE SPF.EXE SPHINX.EXE SPYXX.EXE SS3EDIT.EXE ST2.EXE SUPFTRL.EXE LUALL.EXE SUPPORTER5.EXE SYMPROXYSVC.EXE SYSEDIT.EXE TASKMON.EXE TAUMON.EXE TAUSCAN.EXE TC.EXE TCA.EXE TCM.EXE TDS2-98.EXE TDS2-NT.EXE TDS-3.EXE TFAK5.EXE TGBOB.EXE TITANIN.EXE TITANINXP.EXE TRACERT.EXE TRJSCAN.EXE TRJSETUP.EXE TROJANTRAP3.EXE UNDOBOOT.EXE VBCMSERV.EXE VBCONS.EXE VBUST.EXE VBWIN9X.EXE VBWINNTW.EXE VCSETUP.EXE VFSETUP.EXE VIRUSMDPERSONALFIREWALL.EXE VNLAN300.EXE VNPC3000.EXE VPC42.EXE VPFW30S.EXE VPTRAY.EXE VSCENU6.02D30.EXE VSECOMR.EXE VSHWIN32.EXE VSISETUP.EXE VSMAIN.EXE VSMON.EXE VSSTAT.EXE VSWIN9XE.EXE VSWINNTSE.EXE VSWINPERSE.EXE W32DSM89.EXE W9X.EXE WATCHDOG.EXE WEBSCANX.EXE CFIAUDIT.EXE CFINET.EXE ICSUPP95.EXE MCUPDATE.EXE CFINET32.EXE CLEAN.EXE CLEANER.EXE LUINIT.EXE MCAGENT.EXE MCUPDATE.EXE MFW2EN.EXE MFWENG3.02D30.EXE MGUI.EXE MINILOG.EXE MOOLIVE.EXE MRFLUX.EXE MSCONFIG.EXE MSINFO32.EXE MSSMMC32.EXE MU0311AD.EXE NAV80TRY.EXE ZAUINST.EXE ZONALM2601.EXE ZONEALARM.EXE
A registry entry is added to the following key so that the program directs.exe loads every time you logon to your computer:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
W32/Bagle-R makes multiple copies of itself into folders which are likely to be part of a file-sharing network. The filenames used are: Microsoft Office 2003 Crack, Working!.exe Microsoft Windows XP, WinXP Crack, working Keygen.exe Microsoft Office XP working Crack, Keygen.exe Porno, sex, oral, anal cool, awesome!!.exe Porno Screensaver.scr Serials.txt.exe Porno pics arhive, xxx.exe Windows Sourcecode update.doc.exe Ahead Nero 7.exe Windown Longhorn Beta Leak.exe Opera 8 New!.exe XXX hardcore images.exe WinAmp 6 New!.exe WinAmp 5 Pro Keygen Crack Update.exe Adobe Photoshop 9 full.exe Matrix 3 Revolution English Subtitles.exe ACDSee 9.exe
W32/Bagle-R infects programs on your PC by appending itself to existing EXE files. The danger of W32/Bagle-R can be mitigated not only by updating Sophos Anti-Virus but by blocking connections to TCP port 81 through your network firewall (this port is unlikely to be required for any real services).
Blocking outbound port 81 connections stops computers on your network from downloading the worm from outside. Blocking port 81 inbound means that even if you do get infected you will not pass the virus on to others.
You should also apply the latest Internet Explorer/Outlook Express patches from Microsoft. The vulnerability used by W32/Bagle-R is described in Microsoft Security Bulletin MS03-040 and is referred to as the "Object Tag vulnerability in Popup Window". Recovery Please see the instructions for removing W32/Bagle-Q.
|
|