Spyware, Viruses, & Security forum

General discussion

VIERUS \ SPYWARE ALERTS - May 4, 2009

by Marianna Schmudlach / May 4, 2009 12:20 AM PDT

W32/Autorun-AGJ

Aliases

* W32/Autorun.worm.cp
* Win32/AutoRun.Agent.MQ worm
* WORM_AUTORUN.ELW
* Worm.Win32.AutoRun.frz

Category

* Viruses and Spyware

Type

* Worm


W32/Autorun-AGJ is a worm with IRC backdoor functionality for the Windows platform.

W32/Autorun-AGJ runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.

When first run W32/Autorun-AGJ copies itself to <Windows>\security\lsass.exe and creates the file <Temp>\lsasswin.

Registry entries are created under:

HKLM\SOFTWARE\Security

http://www.sophos.com/security/analyses/viruses-and-spyware/w32autorunagj.html?_log_from=rss

Discussion is locked
You are posting a reply to: VIERUS \ SPYWARE ALERTS - May 4, 2009
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: VIERUS \ SPYWARE ALERTS - May 4, 2009
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Troj/VB-EDA
by Marianna Schmudlach / May 4, 2009 12:21 AM PDT
Collapse -
Troj/SWFDldr-P
by Marianna Schmudlach / May 4, 2009 12:22 AM PDT
Collapse -
Troj/PDFJs-AW
by Marianna Schmudlach / May 4, 2009 12:23 AM PDT
Collapse -
Troj/PDFJs-AV
by Marianna Schmudlach / May 4, 2009 12:24 AM PDT
Collapse -
Troj/FakeAV-PZ
by Marianna Schmudlach / May 4, 2009 12:25 AM PDT
Collapse -
Troj/DwnLdr-HQL
by Marianna Schmudlach / May 4, 2009 12:26 AM PDT
Collapse -
Troj/Blocker-B
by Marianna Schmudlach / May 4, 2009 12:27 AM PDT
Collapse -
Troj/Bckdr-QTY
by Marianna Schmudlach / May 4, 2009 12:27 AM PDT
Collapse -
Troj/Agent-JSN
by Marianna Schmudlach / May 4, 2009 12:28 AM PDT
Collapse -
Troj/Agent-JSM
by Marianna Schmudlach / May 4, 2009 12:29 AM PDT
Collapse -
Mal/KillAV-B
by Marianna Schmudlach / May 4, 2009 12:30 AM PDT
Collapse -
Troj/Agent-JSK
by Marianna Schmudlach / May 4, 2009 12:31 AM PDT
Collapse -
Troj/Agent-JSL
by Marianna Schmudlach / May 4, 2009 12:32 AM PDT
Collapse -
Troj/Dowhos-Gen
by Marianna Schmudlach / May 4, 2009 12:33 AM PDT
Collapse -
Troj/KillAV-FP
by Marianna Schmudlach / May 4, 2009 12:34 AM PDT
Collapse -
Troj/Zlob-ASI
by Marianna Schmudlach / May 4, 2009 12:35 AM PDT
Collapse -
Swine Flu Spam Attempt to Infect Japanese Users
by Marianna Schmudlach / May 4, 2009 12:58 AM PDT

by Japan Regional TrendLabs

nother swine flu-related spam run was recently reported, this time targeting Japanese users. Aside from using the swine flu as its social engineering method, which has already been used in earlier spam runs, this spam run also uses a technique where the sender of the message appears to use the .yahoo.co.jp domain. This serves not only as a means to evade spam filters, but also to further fool the users that the message is legitimate, thus convincing them to open an attached malicious file.

Spammed messages with the subject Warning of Swine Flu claiming to be from the National Institute of Infectious Diseases, encourages users to open an attached .ZIP file, to ?learn? more about the pandemic (detection available as TROJ_PIDIEF.UA and TROJ_PIDIEF.TY). Our engineers have verified that TROJ_PIDIEF.TY drops and executes BKDR_KUPS.G.

The real National Institute of Infectious Diseases issued a warning of the fake spam messages on their website to alert users who may get the deceiving message.

Click for larger view

Here is a translation of the text contained in the spam message:

More: http://blog.trendmicro.com/

Collapse -
Udis_Porn_Dialler
by Marianna Schmudlach / May 4, 2009 1:01 AM PDT
Collapse -
Win32/FakeAVDl.HV
by Marianna Schmudlach / May 4, 2009 1:39 AM PDT

Type : Trojan

Category : Win32

Also known as: Troj/FakeAle-MY (Sophos), Trojan-Downloader.Win32.FraudLoad.vqxg (Kaspersky), TrojanDownloader:Win32/FakeRean (MS OneCare)


Description
Win32/FakeAVDl.HV is a trojan that downloads and executes Win32/FakeAV variants. It also drops a Win32/FakeAlert variant and installs it as a Browser Helper Object.

Method of Infection

Upon execution, Win32/FakeAVDl.HV opens up the default internet browser and connects to litetubevideoz.com, a site known to host malware.

Win32/FakeAVDl.HV also drops and executes the file %Windows%\ieocx.dll, which is detected as Win32/FakeAlert.AHE.

Notes: '%Windows%' is a variable location. The malware determines the location of the current Windows folder by querying the operating system. The default installation location for the Windows directory for Windows 2000 and NT is C:\Winnt; for 95,98 and ME is C:\Windows; and for XP is C:\Windows.

http://www.ca.com/us/securityadvisor/virusinfo/virus.aspx?id=78510

Collapse -
W32/AutoIt-DW
by Marianna Schmudlach / May 4, 2009 6:09 AM PDT
Collapse -
Troj/SWFDlr-F
by Marianna Schmudlach / May 4, 2009 6:10 AM PDT
Collapse -
Troj/PDFJs-AX
by Marianna Schmudlach / May 4, 2009 6:10 AM PDT
Collapse -
Troj/Lineag-BG
by Marianna Schmudlach / May 4, 2009 6:11 AM PDT

Aliases

* Trojan-GameThief.Win32.Magania.baex
* Generic Dropper.eb

Category

* Viruses and Spyware

Type

* Trojan


Troj/Lineag-BG is a Trojan for the Windows platform.

When Troj/Lineag-BG is installed the following files are created:

<Windows>\fonts\PeMTdMfqzpGTb5ps.Ttf
<System>\qB5BKZy7vR5m.dll

The file qB5BKZy7vR5m.dll is registered as a COM object and shell extension, creating registry entries under:

HKCR\CLSID\{71C4F360-FF1E-413E-B17A-0CA267A78E97}
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{71C4F360-FF1E-413E-B17A-0CA267A78E97

http://www.sophos.com/security/analyses/viruses-and-spyware/trojlineagbg.html?_log_from=rss

Collapse -
Troj/Keylog-LH
by Marianna Schmudlach / May 4, 2009 6:12 AM PDT
Collapse -
Troj/FakeAV-QA
by Marianna Schmudlach / May 4, 2009 6:13 AM PDT

Aliases

* not-a-virus:FraudTool.Win32.WinSpywareProtect.oy

Category

* Viruses and Spyware

Type

* Trojan


Troj/FakeAV-QA includes functionality to access the internet and communicate with a remote server via HTTP.

When first run Troj/FakeAV-QA copies itself to <Windows>\sysguard.exe.

The following registry entry is created to run sysguard.exe on startup:

HKCU\Software\Microsoft\Windows\CurrentVersion\Run
system tool
<Windows>\sysguard.exe

http://www.sophos.com/security/analyses/viruses-and-spyware/trojfakeavqa.html?_log_from=rss

Collapse -
Troj/Agent-JSQ
by Marianna Schmudlach / May 4, 2009 6:14 AM PDT
Collapse -
Troj/Agent-JSP
by Marianna Schmudlach / May 4, 2009 6:15 AM PDT
Collapse -
Mal/SWFDlr-A
by Marianna Schmudlach / May 4, 2009 6:16 AM PDT
Collapse -
H1N1 Domains
by Marianna Schmudlach / May 4, 2009 6:17 AM PDT

Monday, May 4, 2009

As a follow up to last Monday's post, here is a list of domains registered over the weekend using the words swine flu.

There are 1,344 on the list. Again, so far, none of the domains we've checked are hosting any malicious files.

In fact, the only malicious file we've seen is something that Symantec posted about last week.

It's a PDF "Swine Flu FAQ" exploit which drops a password stealer and then opens a clean PDF file as a decoy.

http://www.f-secure.com/weblog/

Collapse -
Troj/PDFJs-AX
by Marianna Schmudlach / May 4, 2009 12:29 PM PDT
Popular Forums
icon
Computer Help 51,912 discussions
icon
Computer Newbies 10,498 discussions
icon
Laptops 20,411 discussions
icon
Security 30,882 discussions
icon
TVs & Home Theaters 21,253 discussions
icon
Windows 10 1,672 discussions
icon
Phones 16,494 discussions
icon
Windows 7 7,855 discussions
icon
Networking & Wireless 15,504 discussions

REVIEW

Meet the drop-resistant Moto Z2 Force

The Moto Z2 Force is really thin, with a fast processor and great battery life. It can survive drops without shattering.