General discussion

VIRUS \ Spyware ALERTS - August 8, 2008

Discussion is locked
Follow
Reply to: VIRUS \ Spyware ALERTS - August 8, 2008
PLEASE NOTE: Do not post advertisements, offensive materials, profanity, or personal attacks. Please remember to be considerate of other members. If you are new to the CNET Forums, please read our CNET Forums FAQ. All submitted content is subject to our Terms of Use.
Reporting: VIRUS \ Spyware ALERTS - August 8, 2008
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Comments
- Collapse -
Troj/FakeAle-EU
- Collapse -
Troj/Dloadr-BPO
- Collapse -
Troj/Pushdo-Gen

Category Viruses and Spyware

Type Trojan

Troj/Pushdo-Gen is a family of Trojans for the Windows platform.

When members of Troj/Pushdo-Gen are installed they drop and run a further file in memory, usually detected as Troj/Pushu-Gen or Mal/Basine-C. This may then drop further files, including some of the following:

<Windows>\system32\drivers\ip6fw.sys
<Windows>\system32\drivers\netdtect.sys
<System>\drivers\runtime.sys
<System>\drivers\secdrv.sys

These files are used to provide stealthing for the Trojan.

The dropped file in memory will also often attempt to inject further code into Internet Explorer.

http://www.sophos.com/security/analyses/viruses-and-spyware/trojpushdogen.html?_log_from=rss

- Collapse -
Troj/PcClien-MG
- Collapse -
W32/Autorun-HG
- Collapse -
Troj/FakeVir-EK
- Collapse -
Troj/FakeAV-BC

Category Viruses and Spyware

Type Trojan

Troj/FakeAV-BC is a Trojan for the Windows platform.

Troj/FakeAV-BC includes functionality to access the internet and communicate with a remote server via HTTP.

When first run Troj/FakeAV-BC copies itself to <System>\lphcjgvj0enf1.exe and creates the following files:

<Temp&gtMischief.tt1.tmp.vbs
<System>\blphcjgvj0enf1.scr
<System>\phcjgvj0enf1.bmp

The following registry entry is created to run lphcjgvj0enf1.exe on startup:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
lphcjgvj0enf1
<System>\lphcjgvj0enf1.exe

The following registry entry is changed to run blphcjgvj0enf1.scr on startup:

HKCU\Control Panel\Desktop
SCRNSAVE.EXE
<System>\blphcjgvj0enf1.scr

http://www.sophos.com/security/analyses/viruses-and-spyware/trojfakeavbc.html?_log_from=rss

- Collapse -
Troj/FakeAle-EV
- Collapse -
Troj/FakeAV-BF
- Collapse -
Troj/FakeAV-BE
- Collapse -
Troj/Agent-HKB
- Collapse -
ZLOB Enters The Search Engine Market

More than a year ago, Trend Micro threat researchers uncovered a network of over 900 rogue DNS (Domain Name System) servers related to the ZLOB Trojan family. We gave examples showing that these rogue DNS servers are part of click fraud and leakage of personal information.

Just recently, however, we discovered that this network is now targeting four of the most popular search engines. In a large scale click fraud scheme, the ZLOB gang appears to hijack search results and to replace sponsored links with DNS ?tricks?.

More: http://blog.trendmicro.com/

- Collapse -
Troj/Skintrim-B
- Collapse -
Troj/Lineag-DT
- Collapse -
Troj/FakeVir-EL
- Collapse -
Troj/Agent-HKC
- Collapse -
Virus Alerts [Panda Security's weekly report on viruses and

- Panda Security's weekly report on viruses and intruders -
Virus Alerts, by Panda Security (http://www.pandasecurity.com)

This week's PandaLabs report looks at the Boface.A worm, and the
Nabload.*** TR and Exchanger.T Trojans.

Boface.A spreads through social networks (MySpace and Facebook) by
publishing comments that seem to refer to YouTube videos, but actually
take users to web pages where they will get infected.

To do this, the worm inserts a link in comments posted on both networks
to take users to a fake web page that resembles the actual YouTube site.
When the user tries to watch the video they are encouraged to install
the latest Flash Player version. However, if they do so, they will be
actually letting a copy of the worm into their computers.

Nabload.*** tries to trick users by playing a video of the playboy girl
Kelly Key, while it downloads banker malware in the background in order
to run and install it on the infected system. Once installed on the
computer, the process.exe and orkut.exe files run silently waiting to
collect the user's banking data.

Nabload.*** uses the following link to avoid raising suspicion while the
infection takes place: http://www.youtube.com/watch?v=4CSu1b9IJJ0

Exchanger.T is a Trojan that reaches systems via email in messages like
these: "Madonna admits to extra marital affair", "Dog killed by stray
golf ball", "McCain goes out on negative campaign against Obama", etc.

These messages include a link to an URL that supposedly takes victims to
the news story. However, on accessing it, users are advised to download
an Adobe Flash Player update to watch it. However, the user will
actually install Trj/Exchanger.T, a Trojan designed to download the
Application/AntivirusXP2008 malware to the infected computer. This
malware is a fake antivirus ("Antivirus XP 2008" ) which sends out spam
messages to spread the infection.

- Collapse -
XF97/Yagnuul-D
- Collapse -
W32/Archivar-A
- Collapse -
Troj/Renos-BA

Category Viruses and Spyware

Type Trojan

Troj/Renos-BA is a Trojan for the Windows platform.

Troj/Renos-BA includes functionality to access the internet and communicate with a remote server via HTTP, and known to download Troj/FakeAle-ES.

When first run Troj/Renos-BA copies itself to <System&gtMischief<random name>.exe and creates the following files:

<Temp&gtMischief.tt1.tmp.vbs
<System&gtMischief<random name>.scr
<System&gtMischief<random name>.bmp

where the file <random name>.scr is the Sysinternals Bluescreen Screen Saver and the file <random name>.bmp is an image file that contains so called warning related to the spyware allegedly detected on the infected computer.

The file tt1.tmp.vbs contains code related to disabling system restore.

http://www.sophos.com/security/analyses/viruses-and-spyware/trojrenosba.html?_log_from=rss

- Collapse -
Troj/Lineag-DV
- Collapse -
Troj/FakeVir-EB
- Collapse -
Troj/FakeAv-BH
- Collapse -
Troj/Dloadr-BPQ
- Collapse -
Troj/Bdoor-ANA
- Collapse -
Troj/FakeAle-EX

Category Viruses and Spyware

Type Trojan

Troj/FakeAle-EX changes the computer wallpaper to display a fake warning message that the computer is infected.

Troj/FakeAle-EX changes the screensaver to one that simulates the computer continually crashing and rebooting.

Troj/FakeAle-EX drops the following files which are clean and can be safely deleted:
<System>\blphcrrsj0el6c.scr - blue screen of death screensaver
<System>\phcrrsj0el6c.bmp - clean wallpaper image with infection message

Troj/FakeAle-EX sets the following registry entries:

HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
NoDispBackgroundPage
1

HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
NoDispScrSavPage
1

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
lphcrrsj0el6c
<System>\lphcrrsj0el6c.exe

http://www.sophos.com/security/analyses/viruses-and-spyware/trojfakealeex.html?_log_from=rss

- Collapse -
Troj/FakeAle-EW
- Collapse -
Troj/Bdoor-ANB

Category Viruses and Spyware

Type Trojan

Troj/Bdoor-ANB copies itself to <Windows>\services.exe.

Troj/Bdoor-ANB creates the following registry values:

HKCU\Software\Microsoft\Internet Explorer\Desktop
id

HKCU\Software\Microsoft\Internet Explorer\Desktop
host

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Services
<Windows>\services.exe

Troj/Bdoor-ANB disables Windows Firewall.

http://www.sophos.com/security/analyses/viruses-and-spyware/trojbdooranb.html?_log_from=rss

- Collapse -
Mal/VB-Y
- Collapse -
Mal/Pophot-B

CNET Forums