Spyware, Viruses, & Security forum

General discussion

VIERUS \ SPYWARE ALERTS - May 4, 2009

by Marianna Schmudlach / May 4, 2009 12:20 AM PDT

W32/Autorun-AGJ

Aliases

* W32/Autorun.worm.cp
* Win32/AutoRun.Agent.MQ worm
* WORM_AUTORUN.ELW
* Worm.Win32.AutoRun.frz

Category

* Viruses and Spyware

Type

* Worm


W32/Autorun-AGJ is a worm with IRC backdoor functionality for the Windows platform.

W32/Autorun-AGJ runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.

When first run W32/Autorun-AGJ copies itself to <Windows>\security\lsass.exe and creates the file <Temp>\lsasswin.

Registry entries are created under:

HKLM\SOFTWARE\Security

http://www.sophos.com/security/analyses/viruses-and-spyware/w32autorunagj.html?_log_from=rss

Discussion is locked
You are posting a reply to: VIERUS \ SPYWARE ALERTS - May 4, 2009
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: VIERUS \ SPYWARE ALERTS - May 4, 2009
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Troj/VB-EDA
by Marianna Schmudlach / May 4, 2009 12:21 AM PDT
Collapse -
Troj/SWFDldr-P
by Marianna Schmudlach / May 4, 2009 12:22 AM PDT
Collapse -
Troj/PDFJs-AW
by Marianna Schmudlach / May 4, 2009 12:23 AM PDT
Collapse -
Troj/PDFJs-AV
by Marianna Schmudlach / May 4, 2009 12:24 AM PDT
Collapse -
Troj/FakeAV-PZ
by Marianna Schmudlach / May 4, 2009 12:25 AM PDT
Collapse -
Troj/DwnLdr-HQL
by Marianna Schmudlach / May 4, 2009 12:26 AM PDT
Collapse -
Troj/Blocker-B
by Marianna Schmudlach / May 4, 2009 12:27 AM PDT
Collapse -
Troj/Bckdr-QTY
by Marianna Schmudlach / May 4, 2009 12:27 AM PDT
Collapse -
Troj/Agent-JSN
by Marianna Schmudlach / May 4, 2009 12:28 AM PDT
Collapse -
Troj/Agent-JSM
by Marianna Schmudlach / May 4, 2009 12:29 AM PDT
Collapse -
Mal/KillAV-B
by Marianna Schmudlach / May 4, 2009 12:30 AM PDT
Collapse -
Troj/Agent-JSK
by Marianna Schmudlach / May 4, 2009 12:31 AM PDT
Collapse -
Troj/Agent-JSL
by Marianna Schmudlach / May 4, 2009 12:32 AM PDT
Collapse -
Troj/Dowhos-Gen
by Marianna Schmudlach / May 4, 2009 12:33 AM PDT
Collapse -
Troj/KillAV-FP
by Marianna Schmudlach / May 4, 2009 12:34 AM PDT
Collapse -
Troj/Zlob-ASI
by Marianna Schmudlach / May 4, 2009 12:35 AM PDT
Collapse -
Swine Flu Spam Attempt to Infect Japanese Users
by Marianna Schmudlach / May 4, 2009 12:58 AM PDT

by Japan Regional TrendLabs

nother swine flu-related spam run was recently reported, this time targeting Japanese users. Aside from using the swine flu as its social engineering method, which has already been used in earlier spam runs, this spam run also uses a technique where the sender of the message appears to use the .yahoo.co.jp domain. This serves not only as a means to evade spam filters, but also to further fool the users that the message is legitimate, thus convincing them to open an attached malicious file.

Spammed messages with the subject Warning of Swine Flu claiming to be from the National Institute of Infectious Diseases, encourages users to open an attached .ZIP file, to ?learn? more about the pandemic (detection available as TROJ_PIDIEF.UA and TROJ_PIDIEF.TY). Our engineers have verified that TROJ_PIDIEF.TY drops and executes BKDR_KUPS.G.

The real National Institute of Infectious Diseases issued a warning of the fake spam messages on their website to alert users who may get the deceiving message.

Click for larger view

Here is a translation of the text contained in the spam message:

More: http://blog.trendmicro.com/

Collapse -
Udis_Porn_Dialler
by Marianna Schmudlach / May 4, 2009 1:01 AM PDT
Collapse -
Win32/FakeAVDl.HV
by Marianna Schmudlach / May 4, 2009 1:39 AM PDT

Type : Trojan

Category : Win32

Also known as: Troj/FakeAle-MY (Sophos), Trojan-Downloader.Win32.FraudLoad.vqxg (Kaspersky), TrojanDownloader:Win32/FakeRean (MS OneCare)


Description
Win32/FakeAVDl.HV is a trojan that downloads and executes Win32/FakeAV variants. It also drops a Win32/FakeAlert variant and installs it as a Browser Helper Object.

Method of Infection

Upon execution, Win32/FakeAVDl.HV opens up the default internet browser and connects to litetubevideoz.com, a site known to host malware.

Win32/FakeAVDl.HV also drops and executes the file %Windows%\ieocx.dll, which is detected as Win32/FakeAlert.AHE.

Notes: '%Windows%' is a variable location. The malware determines the location of the current Windows folder by querying the operating system. The default installation location for the Windows directory for Windows 2000 and NT is C:\Winnt; for 95,98 and ME is C:\Windows; and for XP is C:\Windows.

http://www.ca.com/us/securityadvisor/virusinfo/virus.aspx?id=78510

Collapse -
W32/AutoIt-DW
by Marianna Schmudlach / May 4, 2009 6:09 AM PDT
Collapse -
Troj/SWFDlr-F
by Marianna Schmudlach / May 4, 2009 6:10 AM PDT
Collapse -
Troj/PDFJs-AX
by Marianna Schmudlach / May 4, 2009 6:10 AM PDT
Collapse -
Troj/Lineag-BG
by Marianna Schmudlach / May 4, 2009 6:11 AM PDT

Aliases

* Trojan-GameThief.Win32.Magania.baex
* Generic Dropper.eb

Category

* Viruses and Spyware

Type

* Trojan


Troj/Lineag-BG is a Trojan for the Windows platform.

When Troj/Lineag-BG is installed the following files are created:

<Windows>\fonts\PeMTdMfqzpGTb5ps.Ttf
<System>\qB5BKZy7vR5m.dll

The file qB5BKZy7vR5m.dll is registered as a COM object and shell extension, creating registry entries under:

HKCR\CLSID\{71C4F360-FF1E-413E-B17A-0CA267A78E97}
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ShellExecuteHooks\{71C4F360-FF1E-413E-B17A-0CA267A78E97

http://www.sophos.com/security/analyses/viruses-and-spyware/trojlineagbg.html?_log_from=rss

Collapse -
Troj/Keylog-LH
by Marianna Schmudlach / May 4, 2009 6:12 AM PDT
Collapse -
Troj/FakeAV-QA
by Marianna Schmudlach / May 4, 2009 6:13 AM PDT

Aliases

* not-a-virus:FraudTool.Win32.WinSpywareProtect.oy

Category

* Viruses and Spyware

Type

* Trojan


Troj/FakeAV-QA includes functionality to access the internet and communicate with a remote server via HTTP.

When first run Troj/FakeAV-QA copies itself to <Windows>\sysguard.exe.

The following registry entry is created to run sysguard.exe on startup:

HKCU\Software\Microsoft\Windows\CurrentVersion\Run
system tool
<Windows>\sysguard.exe

http://www.sophos.com/security/analyses/viruses-and-spyware/trojfakeavqa.html?_log_from=rss

Collapse -
Troj/Agent-JSQ
by Marianna Schmudlach / May 4, 2009 6:14 AM PDT
Collapse -
Troj/Agent-JSP
by Marianna Schmudlach / May 4, 2009 6:15 AM PDT
Collapse -
Mal/SWFDlr-A
by Marianna Schmudlach / May 4, 2009 6:16 AM PDT
Collapse -
H1N1 Domains
by Marianna Schmudlach / May 4, 2009 6:17 AM PDT

Monday, May 4, 2009

As a follow up to last Monday's post, here is a list of domains registered over the weekend using the words swine flu.

There are 1,344 on the list. Again, so far, none of the domains we've checked are hosting any malicious files.

In fact, the only malicious file we've seen is something that Symantec posted about last week.

It's a PDF "Swine Flu FAQ" exploit which drops a password stealer and then opens a clean PDF file as a decoy.

http://www.f-secure.com/weblog/

Collapse -
Troj/PDFJs-AX
by Marianna Schmudlach / May 4, 2009 12:29 PM PDT
Popular Forums
icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

CNET FORUMS TOP DISCUSSION

Help, my PC with Windows 10 won't shut down properly

Since upgrading to Windows 10 my computer won't shut down properly. I use the menu button shutdown and the screen goes blank, but the system does not fully shut down. The only way to get it to shut down is to hold the physical power button down till it shuts down. Any suggestions?