General discussion

VIRUS ALERTS - January 17, 2007

VBS_BANLOAD.FZI

Alert ID : FrSIRT/ALRT-2007-00456
Aliases : N/A
Size : 1239 bytes
Rated as : Low Risk
Release Date : 2007-01-17


Description

This is the detection of an HTML file that contains a malicious VBScript tag. It arrives on a system as a file downloaded through a certain link found in a spammed email message.

References

http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=VBS_BANLOAD.FZI

Credits

Reported by Trend Micro

Discussion is locked
Follow
Reply to: VIRUS ALERTS - January 17, 2007
PLEASE NOTE: Do not post advertisements, offensive materials, profanity, or personal attacks. Please remember to be considerate of other members. If you are new to the CNET Forums, please read our CNET Forums FAQ. All submitted content is subject to our Terms of Use.
Reporting: VIRUS ALERTS - January 17, 2007
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Comments
- Collapse -
EXPL_EXECOD.C

Alert ID : FrSIRT/ALRT-2007-00457
Aliases : N/A
Size : 9543 bytes
Rated as : Low Risk
Release Date : 2007-01-17


Description

This is the Trend Micro detection for specially crafted HTML scripts that exploit a vulnerability in the way Internet Explorer (IE) handles Vector Markup Language (VML) elements. More information about the mentioned vulnerability can be found in the following Microsoft page: Microsoft Security Bulletin MS07-004.

References

http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=EXPL_EXECOD.C

Credits

Reported by Trend Micro

- Collapse -
W32/HLLP.Philis.eo

Alert ID : FrSIRT/ALRT-2007-00458
Aliases : PE_LOOKED.KZ-O - W32.Looked.AH - W32/Viking.GE.drp - Win32.HLLW.Gavir.54
Size : N/A
Rated as : Low Risk
Release Date : 2007-01-17


Description

W32/HLLP.Philis.eo is a file infecting virus. It searches for executable files on the infected machine to prepend its viral code. It is also responsible for dropping aDLL file, which downloads a password stealing trojan from a website..

References

http://vil.nai.com/vil/content/v_141298.htm

Credits

Reported by McAfee

- Collapse -
W32/SDBot-CWY
- Collapse -
Troj/Agent-DZY
- Collapse -
W32/Rbot-GBX

Type Spyware Worm

Aliases Backdoor.Win32.Rbot.gen

W32/Rbot-GBX is a worm and IRC backdoor for the Windows platform.

W32/Rbot-GBX spreads to other network computers by exploiting common buffer overflow vulnerabilities, including: LSASS (MS04-011), SRVSVC (MS06-040), RPC-DCOM (MS04-012), RealVNC (CVE-2006-2369), Veritas (CAN-2004-1172) and ASN.1 (MS04-007). The worm may also spread via networks shares and MSSQL servers protected by weak passwords.

W32/Rbot-GBX runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.

W32/Rbot-GBX includes functionality to:

start an FTP server
start a Proxy server
start a web server
set or remove network shares
take part in distributed denial of service (DDoS) attacks
log keypresses
capture screen/webcam images
packet sniffing
port scanning
download/execute arbitrary files
terminate and disable various anti-virus and security related programs
start a remote shell (RLOGIN)
steal product registration information from certain software

http://www.sophos.com/virusinfo/analyses/w32rbotgbx.html

- Collapse -
Commwarrior.T

Alert ID : FrSIRT/ALRT-2007-00462
Aliases : N/A
Size : N/A
Rated as : Low Risk
Release Date : 2007-01-17

Description

Commwarrior.T is a new variant of the Commwarrior worm that is based on Commwarrior.Q. Unlike most Commwarrior variants, Commwarrior.T is a recompiled version that contains new functionality.

References

http://www.f-secure.com/v-descs/commwarrior_t.shtml

Credits

Reported by F-Secure

- Collapse -
Troj/Mailbot-BI
- Collapse -
Troj/VB-CWP
- Collapse -
Troj/Mailbot-BH
- Collapse -
Troj/ShipUp-D
- Collapse -
Troj/LegMir-AIM
- Collapse -
W32/ShipUp-C
- Collapse -
Troj/Bckdr-PVW
- Collapse -
Troj/Bckdr-PVX
- Collapse -
Mal/HckPk-A
- Collapse -
Troj/Agent-DWW
- Collapse -
Troj/DwnLdr-FYB

Type Trojan

Aliases Win32/TrojanDownloader.Tiny.NCA

Troj/DwnLdr-FYB is a Trojan for the Windows platform.

Troj/DwnLdr-FYB includes functionality to download, install and run new software.

At the time of writing, Troj/DwnLdr-FYB attempts to download and execute a file that is detected by Sophos as Mal/Packer.

http://www.sophos.com/security/analyses/trojdwnldrfyb.html

- Collapse -
Troj/Lmir-FF
- Collapse -
Troj/Lineag-AIS
- Collapse -
Troj/Zlob-YB

Type Trojan

Troj/Zlob-YB is a Trojan for the Windows platform.

Troj/Zlob-YB contains functionality to access the internet and connect to a remote server via HTTP.

Troj/Zlob-YB claims to be a Video ActiveX Object, but instead downloads and executes code from remote websites.

http://www.sophos.com/virusinfo/analyses/trojzlobyb.html

- Collapse -
W32/Vanebot-AD

Type Worm

W32/Vanebot-AD is a worm with IRC backdoor functionality.

W32/Vanebot-AD runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channel.

http://www.sophos.com/virusinfo/analyses/w32vanebotad.html

CNET Forums