Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

VIRUS \ Spyware ALERTS - January 2, 2009

Jan 1, 2009 10:08AM PST

Discussion is locked

- Collapse -
Troj/PWS-AXI
Jan 1, 2009 10:09AM PST
- Collapse -
Troj/Ezio-I
Jan 1, 2009 10:10AM PST

Category Viruses and Spyware

Type Trojan

Troj/Ezio-I is a Trojan for the Windows platform.

Troj/Ezio-I includes functionality to access the internet and communicate with a remote server via HTTP.

When first run Troj/Ezio-I copies itself to:

<Application Data>\Microsoft\logman.exe
<Application Data>\Microsoft\mstsc.exe
<Windows>\ieudinit.exe
<System>\dllhst3g.exe

The following registry entry is created to run ieudinit.exe on startup:

HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
IEudinit
<Windows>\ieudinit.exe /waitservice

The following registry entry is set:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run
Logman
<Application Data>\Microsoft\logman.exe /waitservice


http://www.sophos.com/security/analyses/viruses-and-spyware/trojezioi.html?_log_from=rss

- Collapse -
W32/Waled-Gen
Jan 1, 2009 1:44PM PST
- Collapse -
Troj/Qhost-AC
Jan 1, 2009 1:45PM PST
- Collapse -
Troj/Pushdo-AB
Jan 1, 2009 1:46PM PST
- Collapse -
Troj/FakeVir-JA
Jan 1, 2009 1:47PM PST
- Collapse -
Mal/Conficker-A
Jan 1, 2009 1:48PM PST
- Collapse -
Virus Alerts [Panda Security's weekly report on viruses and
Jan 1, 2009 11:40PM PST

Panda Security's weekly report on viruses and intruders -

Virus Alerts, by Panda Security (http://www.pandasecurity.com)

This week, the PandaLabs report looks at the backdoor Trojan Emogen.B,
the SystemSecurity adware and the Gafermus.A Trojan.

Emogen.B is a backdoor Trojan that connects to a server and lets
attackers take control of the targeted computer remotely. They will then
be able to monitor system activities and take actions such as
downloading malware, stealing user information, controlling the Command
Prompt window remotely and even starting a chat session with the
infected user.

See an image of the Emogen.B console here:
http://www.flickr.com/photos/panda_security/3128211878/

This backdoor Trojan cannot spread automatically, but uses the usual
means of propagation: P2P networks, physical devices such as CDs or
floppy disks, Internet downloads or FTP file transfers.

SystemSecurity is a fake antivirus-type adware that displays a false
infection report to trick users. If the user clicks the button to
disinfect the computer, it displays a page asking for a fee. (Image
here: http://www.flickr.com/photos/panda_security/3159368914/).

"This type of fraud has become quite popular lately. Malware like this
shows the real financial motivation behind malicious code. Cyber-crooks
will turn to anything to profit from infected users", explains Luis
Corrons, Technical Director of PandaLabs.

Finally in this week's report, we mention Gafermus.A, a Trojan that
tries to connect to certain Web pages to download other malware. Then,
it makes several copies of itself on the infected system using random
names from the Windows services. It cannot spread automatically using
its own means but requires user intervention.

- Collapse -
Troj/FakeAle-JX
Jan 1, 2009 11:42PM PST
- Collapse -
Troj/BDoor-AMV
Jan 1, 2009 11:43PM PST
- Collapse -
Troj/Agent-IMX
Jan 1, 2009 11:44PM PST
- Collapse -
Worm:W32/Downadup.AL
Jan 1, 2009 11:46PM PST

Name : Worm:W32/Downadup.AL
Detection Names : Worm:W32/Downadup.AL
Worm:W32/Downadup.AL

Aliases : Mal/Conficker-A (Sophos)
W32/Conficker.worm.gen.b (Symantec)
Worm:Win32/Conficker.B (Microsoft)

Type: Worm
Category: Malware
Platform: W32


Summary
A standalone malicious program which uses computer or network resources to make complete copies of itself. May include code or other malware to damage both the system and the network.


http://www.f-secure.com/v-descs/worm_w32_downadup_al.shtml

- Collapse -
W32/Autorun.worm.dq
Jan 2, 2009 12:11AM PST
- Collapse -
Troj/Qhost-AC.
Jan 2, 2009 12:14AM PST

No P2P For You!

2 January 2009

The large P2P file sharing community has always been the bane of the music and movie industries due to piracy.

As a result, I could not help but have a little chuckle coming across this particular Trojan - Troj/Qhost-AC.

Rather than surreptitiously redirecting banking websites (as some banking Trojans are known to do), this Trojan attempts to stop the user from accessing popular P2P websites by modifying the HOSTS file.

More: http://www.sophos.com/security/blog/2009/01/2565.html

- Collapse -
Troj/FakeAle-JX
Jan 2, 2009 1:18AM PST
- Collapse -
Troj/Tibia-Gen
Jan 2, 2009 1:33AM PST
- Collapse -
Troj/Spy-BJ
Jan 2, 2009 1:34AM PST
- Collapse -
Troj/JSRedir-F
Jan 2, 2009 1:35AM PST
- Collapse -
Troj/FakeAV-HY
Jan 2, 2009 1:36AM PST
- Collapse -
Troj/FakeAle-KJ
Jan 2, 2009 1:37AM PST
- Collapse -
Troj/Clicker-FE
Jan 2, 2009 1:39AM PST
- Collapse -
Troj/Buchon-Gen
Jan 2, 2009 1:40AM PST
- Collapse -
Troj/Agent-IMZ
Jan 2, 2009 1:41AM PST
- Collapse -
Troj/Agent-IMY
Jan 2, 2009 1:42AM PST
- Collapse -
Bloodhound.Exploit.221
Jan 2, 2009 5:08AM PST
- Collapse -
Bloodhound.Exploit.222
Jan 2, 2009 5:13AM PST
- Collapse -
Bloodhound.Exploit.223
Jan 2, 2009 5:15AM PST
- Collapse -
W32/AutoRun-SX
Jan 2, 2009 7:32AM PST
- Collapse -
W32/AutoRun-SW
Jan 2, 2009 7:34AM PST

Category Viruses and Spyware

Type Worm

W32/AutoRun-SW is a worm for the Windows platform.

When first run W32/AutoRun-SW copies itself to <System>\XP-078F2E4E.EXE and creates the following files:

<System>\RegEx.fne
<System>\com.run
<System>\dp1.fne
<System>\eAPI.fne
<System>\internet.fne
<System>\krnln.fnr
<System>\shell.fne
<System>\spec.fne
<System>\ul.dll
<System>\og.dll
<System>\og.edt
<Temp>\e_4\RegEx.fne
<Temp>\e_4\com.run
<Temp>\e_4\dp1.fne
<Temp>\e_4\eAPI.fne
<Temp>\e_4\internet.fne
<Temp>\e_4\krnln.fnr
<Temp>\e_4\shell.fne
<Temp>\e_4\spec.fne

The files com.run, dp1.fne, internet.fne, krnln.fnr and shell.fne are detected as W32/AutoRun-MO and the file eAPI.fne is detected as Mal/Behav-027.

The files ul.dll, og.dll and og.edt are data files and can be safely removed.

All other files are detected as W32/AutoRun-SW.


More: http://www.sophos.com/security/analyses/viruses-and-spyware/w32autorunsw.html?_log_from=rss

- Collapse -
Troj/DNSChan-ME
Jan 2, 2009 7:35AM PST