Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

VIRUS \ Spyware ALERTS - December 30, 2008

Dec 29, 2008 10:15AM PST

Discussion is locked

- Collapse -
Troj/MDrop-BUY
Dec 29, 2008 10:16AM PST
- Collapse -
Troj/AdClick-FH
Dec 29, 2008 10:17AM PST
- Collapse -
PlayMp3
Dec 29, 2008 10:18AM PST
- Collapse -
Hotbar
Dec 29, 2008 10:19AM PST

Category Adware or PUA

Type Adware

Hotbar is advertising supported software from www.hotbar.com, www.wowpapers.com and www.easyscreensavers.com.

Hotbar consists of plugins for Microsoft Internet Explorer and Microsoft Outlook or Outlook Express.

When the browser is active Hotbar delivers advertisements (specific to the sites visited) in the form of links and popup ads.

Advertising links are added to outgoing email messages.

Hotbar may download and install updates of its software at any time without notification that it is doing so.

When Hotbar is installed the following files and folders are typically created:

http://www.sophos.com/security/analyses/adware-and-puas/hotbar.html?_log_from=rss

- Collapse -
Trojan.Downexec.C!inf
Dec 29, 2008 10:23AM PST
- Collapse -
W32/Sdbot.worm!3AFA6720
Dec 29, 2008 10:25AM PST

Type Virus SubType Internet Worm

Characteristics -

System Changes

These are general defaults for typical path variables. (Although they may differ, these examples are common.):
%WinDir% = \WINDOWS (Windows 9x/ME/XP/Vista), \WINNT (Windows NT/2000)
%SystemDir% = \WINDOWS\SYSTEM (Windows 98/ME), \WINDOWS\SYSTEM32 (Windows XP/Vista), \WINNT\SYSTEM32 (Windows NT/2000)
%ProgramFiles% = \Program Files

The following exploits may be used for this worms spread:

http://vil.mcafeesecurity.com/vil/content/v_153691.htm

- Collapse -
Troj/Mdrop-BVN
Dec 29, 2008 11:29PM PST
- Collapse -
Troj/Mdrop-BVB
Dec 29, 2008 11:30PM PST
- Collapse -
Troj/DocDrop-F
Dec 29, 2008 11:31PM PST
- Collapse -
Troj/Dloadr-CDS
Dec 29, 2008 11:32PM PST
- Collapse -
Troj/Dload-ES
Dec 29, 2008 11:33PM PST
- Collapse -
Troj/Bckdr-QQU
Dec 29, 2008 11:34PM PST
- Collapse -
Troj/Bckdr-QQT
Dec 29, 2008 11:35PM PST
- Collapse -
Troj/Agent-IMN
Dec 29, 2008 11:35PM PST
- Collapse -
Troj/Agent-IMM
Dec 29, 2008 11:36PM PST
- Collapse -
Troj/Agent-IML
Dec 29, 2008 11:37PM PST
- Collapse -
SuperJuan
Dec 29, 2008 11:39PM PST
- Collapse -
Trojan.Downexec.C
Dec 30, 2008 12:04AM PST
- Collapse -
Email-Worm:W32/Waledac.A
Dec 30, 2008 12:06AM PST

Name : Email-Worm:W32/Waledac.A
Aliases : Trojan:W32/Waledac.A (Microsoft)

Size: 387072
Type: Email-Worm
Category: Malware
Platform: W32

Summary
This type of worm is embedded in an e-mail attachment, and spreads using the infected computer's e-mailing networks.

http://www.f-secure.com/v-descs/email-worm_w32_waledac_a.shtml

- Collapse -
W32/SdBot-DKH
Dec 30, 2008 12:43AM PST

Category Viruses and Spyware

Type Worm

W32/SdBot-DKH is a worm for the Windows platform.

When first run W32/SdBot-DKH copies itself to <System>\msddll.exe.

The file msddll.exe is registered as a new system driver service named "msddll", with a display name of "msddll" and a startup type of automatic, so that it is started automatically during system startup. Registry entries are created under:

HKLM\SYSTEM\CurrentControlSet\Services\msddll

The following registry entry is set:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions
GON
<pathname of the Trojan executable>

W32/SdBot-DKH may attempt to spread over weakly protected network shares and via exploiting MS04-011.

http://www.sophos.com/security/analyses/viruses-and-spyware/w32sdbotdkh.html?_log_from=rss

- Collapse -
Troj/FakeVir-IX
Dec 30, 2008 12:44AM PST
- Collapse -
Troj/Dloadr-CDT
Dec 30, 2008 12:45AM PST
- Collapse -
Troj/Agent-IMC
Dec 30, 2008 12:46AM PST
- Collapse -
W32.Downadup.B
Dec 30, 2008 1:58AM PST
- Collapse -
Exploit:SymbOS/SMSCurse.A
Dec 30, 2008 1:59AM PST

Name : Exploit:SymbOS/SMSCurse.A
Detection Names : Exploit:SymbOS/SMSCurse.A

Type: Exploit
Category: Malware
Platform: SymbOS

Summary
Exploit:/SymbOS/SMSCurse.A is a Denial-of-Service (DoS) exploit that affects messaging components of phones that use Symbian Series 60 versions 2.6, 2.8, 3.0, 3.1, and Sony Ericsson UiQ devices.

When the exploit crashes SMS messaging on a phone, the phone remains otherwise completely functional. The only effect is that it cannot receive any new SMS/MMS messages.

http://www.f-secure.com/v-descs/exploit_symbos_smscurse_a.shtml

- Collapse -
W32/Confick-C
Dec 30, 2008 3:47AM PST
- Collapse -
Troj/Agent-IMP
Dec 30, 2008 3:48AM PST