Spyware, Viruses, & Security forum

General discussion

VIRUS ALERTS - January 22, 2008

by Marianna Schmudlach / January 22, 2008 12:57 AM PST

Troj/DwnLdr-HAL

Name Troj/DwnLdr-HAL
Type Trojan

Affected operating systems Windows

Side effects Downloads code from the internet
Installs itself in the Registry

Aliases Trojan-Downloader.Win32.Small.hqo

Protection available since 22 January 2008

http://www.sophos.com/security/analyses/trojdwnldrhal.html

Discussion is locked
You are posting a reply to: VIRUS ALERTS - January 22, 2008
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: VIRUS ALERTS - January 22, 2008
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Troj/DllLoad-E
by Marianna Schmudlach / January 22, 2008 12:59 AM PST
Collapse -
Troj/OnlineG-AM
by Marianna Schmudlach / January 22, 2008 1:01 AM PST
Collapse -
Troj/Bckdr-QLF
by Marianna Schmudlach / January 22, 2008 1:02 AM PST
Collapse -
Troj/DwnLdr-GHC
by Marianna Schmudlach / January 22, 2008 1:03 AM PST
Collapse -
W32/Shellot-Gen
by Marianna Schmudlach / January 22, 2008 1:04 AM PST
Collapse -
Troj/Banker-EKM
by Marianna Schmudlach / January 22, 2008 1:06 AM PST
Collapse -
Troj/Zlob-AHQ
by Marianna Schmudlach / January 22, 2008 1:07 AM PST
Collapse -
Troj/Agent-GMR
by Marianna Schmudlach / January 22, 2008 1:08 AM PST
Collapse -
Mal/EncPk-CE
by Marianna Schmudlach / January 22, 2008 1:10 AM PST
Collapse -
W32/Autorun-AT
by Marianna Schmudlach / January 22, 2008 1:11 AM PST
Collapse -
Troj/Psyme-HG
by Marianna Schmudlach / January 22, 2008 1:12 AM PST
Collapse -
Troj/Psyme-HF
by Marianna Schmudlach / January 22, 2008 1:14 AM PST
Collapse -
PortFcuk
by Marianna Schmudlach / January 22, 2008 1:15 AM PST
Collapse -
Worm:SymbOS/Beselo
by Marianna Schmudlach / January 22, 2008 1:58 AM PST

Name : Worm:SymbOS/Beselo
Alias: Beselo
Type: Bluetooth-Worm
Category: Malware
Platform: SymbOS

Summary
Beselo is a MMS and Bluetooth worm family that operates on Symbian S60 Second Edition devices.

The Beselo family is very similar to the Commwarrior family but contains enough differences in the code base and behavior that it is counted as separate family.

http://www.f-secure.com/v-descs/worm_symbos_beselo.shtml

Collapse -
Worm:SymbOS/Beselo.B
by Marianna Schmudlach / January 22, 2008 1:59 AM PST

Name : Worm:SymbOS/Beselo.B
Alias: Beselo.B
Type: Bluetooth-Worm
Category: Malware
Platform: SymbOS

Summary
Beselo.B is an MMS and Bluetooth worm that operates on Symbian S60 Second Edition devices.

Beselo.B spreads via MMS messages and Bluetooth using the filenames beauty.jpg, sex.mp3, or love.rm.

http://www.f-secure.com/v-descs/worm_symbos_beselo_b.shtml

Collapse -
BKDR_IRCBOT.RB
by Marianna Schmudlach / January 22, 2008 2:01 AM PST

Malware type: Backdoor

Description:


This backdoor may be dropped by other malware or downloaded from remote sites.

It displays the following image upon execution

It connects to IRC servers to join IRC channels. It executes the following commands from a remote malicious user, effectively compromising the affected system.

Flush DNS
Modify clipboard data
Start/End processes/threads
It accesses certain URLs to download malicious files detected as TROJ_DLOADER.BQK and TROJ_DLOADER.CSZ.

http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=BKDR%5FIRCBOT%2ERB

Collapse -
W32/Rbot-GVZ
by Marianna Schmudlach / January 22, 2008 2:02 AM PST
Collapse -
Sus/Dropper-AE
by Marianna Schmudlach / January 22, 2008 2:04 AM PST
Collapse -
Troj/Sub7-DR
by Marianna Schmudlach / January 22, 2008 2:06 AM PST
Collapse -
Troj/Unif-B
by Marianna Schmudlach / January 22, 2008 2:07 AM PST
Collapse -
W32/Autorun-AT
by Marianna Schmudlach / January 22, 2008 3:30 AM PST
Collapse -
Troj/Sub7-DR
by Marianna Schmudlach / January 22, 2008 3:31 AM PST
Collapse -
Sus/Dropper-AE
by Marianna Schmudlach / January 22, 2008 3:32 AM PST
Collapse -
Troj/Tanto-H
by Marianna Schmudlach / January 22, 2008 3:49 AM PST

Name Troj/Tanto-H
Type Trojan

Affected operating systems Windows

Side effects Allows others to access the computer
Downloads code from the internet
Installs itself in the Registry

Protection available since 22 January 2008

http://www.sophos.com/security/analyses/trojtantoh.html

Collapse -
Troj/Dloadr-BHS
by Marianna Schmudlach / January 22, 2008 3:50 AM PST
Collapse -
Troj/Nuclear-BD
by Marianna Schmudlach / January 22, 2008 3:52 AM PST
Collapse -
Troj/Nuclear-BC
by Marianna Schmudlach / January 22, 2008 3:53 AM PST
Collapse -
Troj/Tometa-G
by Marianna Schmudlach / January 22, 2008 3:54 AM PST
Collapse -
Troj/Psyme-HH
by Marianna Schmudlach / January 22, 2008 3:55 AM PST
Collapse -
Root compromise responsible for hacked sites
by Marianna Schmudlach / January 22, 2008 7:59 AM PST

22 January 2008

Readers will have probably read about the series of sites that have recently been compromised with something a little more sophisticated than the regular attack [1,2]. Over the past week or so, aside from ensuring the appropriate detections are in place, we have been trying to track down more information about the attack.

So what is it about these attacks that makes them sophisticated?

a malicious script tag pointing to a randomly named Javascript file is injected into page content. This makes it impossible to reliably detect the compromised page itself.
the randomly created Javascript file is created on the fly, upon the request for that file (ie. when the user browses the compromised page containing the malicious script tag).
malicious content is served up apparently randomly - requested pages from a compromised web server will only sometimes contain the malicious script tag. In contrast to the bulk of kit-created attack sites, this attack does not appear to monitor the requesting IP address. Malicious content may be delivered multiple times to the same client.
The malicious Javascript itself is fairly ordinary. It uses obfuscation to evade detection/analysis, and attempts to exploit several browser vulnerabilities in order to infect the victim with a Win32 Trojan. Detection for the malicious script as Mal/ExpJS-D was added last week. The Trojan it delivers uses obfuscation as well to evade detection. The payloads from the last batch of sites I checked earlier on today continued to be detected as Mal/Behav-184.

More: http://www.sophos.com/security/blog/2008/01/1010.html

Popular Forums

icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

FALL TV PREMIERES

Your favorite shows are back!

Don’t miss your dramas, sitcoms and reality shows. Find out when and where they’re airing!