Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

VIRUS \ Spyware ALERTS - January 8, 2009

Jan 7, 2009 10:11AM PST

Discussion is locked

- Collapse -
WORM_IRCBOT.CAV
Jan 8, 2009 1:33AM PST

Malware type: Worm

Malware Overview

This worm may be dropped by other malware.

It creates folders and drops several copies of itself. It then creates registry entries to enable its automatic execution at every system startup.

It modifies registry entires to disable automatic Windows Update, various Security Center functions, and firewall settings; to hide files with both System and Read-only attributes; to disable Automatic Windows Update; and as part of its installation routine.

This worm takes advantage of the following software vulnerability to propagate across networks:

Remote Procedure Call (RPC) Distributed Component Object Model (DCOM) Vulnerability
It drops files.

It acts as a server program controlled by an Internet Relay Chat (IRC) bot. It opens a random port and connects to a random server, where it joins a channel. Once connected, it receives several commands from the IRC bot. These commands are executed locally, effectively compromising the affected system.

It bears the icon normally used by Microsoft Word documents to trick users into thinking that it is a legitimate application.

http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM%5FIRCBOT%2ECAV

- Collapse -
W32.Grenail.C!inf
Jan 8, 2009 1:34AM PST
- Collapse -
W32.Grenail.D!inf
Jan 8, 2009 1:35AM PST
- Collapse -
Worm:W32/Downadup.AL
Jan 8, 2009 1:44AM PST

Name : Worm:W32/Downadup.AL
Detection Names : Net-Worm.Win32.Kido.cg
Worm:W32/Downadup.AL
Worm:W32/Downadup.AL

Aliases : Mal/Conficker-A (Sophos)
W32/Conficker.worm.gen.b (Symantec)
Worm:Win32/Conficker.B (Microsoft)

Type: Worm
Category: Malware
Platform: W32

Summary
A standalone malicious program which uses computer or network resources to make complete copies of itself. May include code or other malware to damage both the system and the network.

Removal Tools


ftp://ftp.f-secure.com/anti-virus/tools/beta/fsmrt.zip
ftp://ftp.f-secure.com/anti-virus/tools/beta/f-downadup.zip

Note: please read the text file included in the ZIP for additional details.

Scanning options

Downadup makes use of random extension names in order to avoid detection.

During disinfection scanning options should be set to:


Scan all files

http://www.f-secure.com/v-descs/worm_w32_downadup_al.shtml

- Collapse -
Troj/Renos-CI
Jan 8, 2009 1:45AM PST

Category Viruses and Spyware

Type Trojan

Troj/Renos-CI is a Trojan for the Windows platform.

Troj/Renos-CI includes functionality to access the internet and communicate with a remote server via HTTP.

Troj/Renos-CI downloads files with .gif extensions from multiple websites.
These files are actually executable files and are run once downloaded.

The following registry entry is created to run Troj/Renos-CI on startup:

HKCU\Software\Microsoft\Windows\CurrentVersion\Run
MSFox
<pathname of Troj/Renos-CI>

Registry entries are created under:

HKLM\SOFTWARE\Mozilla\MSFox

http://www.sophos.com/security/analyses/viruses-and-spyware/trojrenosci.html?_log_from=rss

- Collapse -
Troj/FakeAle-KV
Jan 8, 2009 1:47AM PST
- Collapse -
Troj/FakeAle-KU
Jan 8, 2009 1:48AM PST
- Collapse -
Troj/DwnLd-L
Jan 8, 2009 1:49AM PST
- Collapse -
Troj/Bckdr-QRB
Jan 8, 2009 1:50AM PST
- Collapse -
Mal/Banker-G
Jan 8, 2009 1:51AM PST
- Collapse -
Microsoft server worm can spread via USB
Jan 8, 2009 2:31AM PST

By Tom Espiner ZDNet.co.uk
Posted on ZDNet News: Jan 08, 2009

A Microsoft worm that is currently attacking business systems is also a USB worm, security vendor F-Secure has warned.

The worm, which F-Secure calls Downadup, attacks the vulnerability outlined in MS08-067, a Windows Server service flaw that was patched in October.

The worm launches a dictionary attack to attempt to crack user passwords, and uses server-side polymorphism and modification to the Access Control Lists (ACL) "to make network disinfection particularly difficult", F-Secure said in a blog post on Tuesday.

More: http://news.zdnet.com/2424-9595_22-258763.html

- Collapse -
Once Again, Bogus Promos Used to Seed Malware
Jan 8, 2009 2:35AM PST

The conclusion of the recent holiday season didn?t stop cybercriminals from creating new spoofed promos to distribute malware, of course.

Very much similar to the social-engineering campaign that used McDonald?s and Coca-Cola, yet another spam run that distributes malware was recently found by Trend Micro researchers.

Popular brands such as Ikea, Symantec, Jack Daniel?s, and British Airways were all used for this recent campaign. Spam emails are sent, promoting a coupon and instructing the recipient to open the attached coupon to cash in on savings. But instead of a coupon, the attachment actually contains malware that compromises the victim?s computer.

Below are screenshots of sample spam emails with their corresponding attachments:

http://blog.trendmicro.com/

- Collapse -
Win32/Fruspam.A
Jan 8, 2009 2:38AM PST

Date Published:
8 Jan 2009

Last Updated:
8 Jan 2009

Characteristics
Type : Worm

Category : Win32

Also known as: Trojan.Win32.Buzus.afqp (Kaspersky), Mal/CryptBox-A (Sophos), Hacktool.Spammer (Symantec)

Description
Win32/Fruspam.A is a mass-mailing worm that sends spam messages through its in-built SMTP engine.

http://www.ca.com/us/securityadvisor/virusinfo/virus.aspx?id=77083

- Collapse -
W32/Conficker.worm.gen.b
Jan 8, 2009 4:14AM PST

Type Virus SubType Generic Worm

Overview -
This detection is for a worm that exploits the MS08-067 vulnerability that exists, in Microsoft Windows Server Service, which may allow for remote code execution. The flaw lies in the improper handling of specially-crafted (malicious) RPC requests.

Characteristics
Characteristics -

When executed, the worm copies itself using a random name to the %Sysdir% folder.

(Where %Sysdir% is the Windows system folder; e.g. C:\Windows\System32)

It modifies the following registry key to create a randomly-named service on the affected syetem:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\{random}\Parameters\
ServiceDll = "Path to worm" HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\{random}\
ImagePath = %SystemRoot%\system32\svchost.exe -k netsvcs

More: http://vil.mcafeesecurity.com/vil/content/v_153710.htm

- Collapse -
Troj/FakeAle-KW
Jan 8, 2009 10:02AM PST

Aliases Win32/TrojanDownloader.Delf.ODS
not-a-virus:FraudTool.Win32.Antivirus2009.dw
Generic Dropper.bw

Category Viruses and Spyware

Type Trojan

Troj/FakeAle-KW is a Trojan for the Windows platform.

Troj/FakeAle-KW includes functionality to access the internet and communicate with a remote server via HTTP.

When first run Troj/FakeAle-KW copies itself to <System>\explorer32.exe.

The following registry entry is created to run explorer32.exe on startup:

HKCU\Software\Microsoft\Windows\CurrentVersion\Run
ieupdate
<System>\explorer32.exe

http://www.sophos.com/security/analyses/viruses-and-spyware/trojfakealekw.html?_log_from=rss

- Collapse -
Troj/Bdoor-ARK
Jan 8, 2009 10:04AM PST
- Collapse -
Troj/Agent-IOL
Jan 8, 2009 10:05AM PST
- Collapse -
Troj/Agent-IOK
Jan 8, 2009 10:06AM PST
- Collapse -
Troj/Agent-IOJ
Jan 8, 2009 10:07AM PST
- Collapse -
Troj/Agent-IOI
Jan 8, 2009 10:08AM PST
- Collapse -
Mal/TinyDL-X
Jan 8, 2009 10:09AM PST
- Collapse -
Mal/IRCBot-H
Jan 8, 2009 10:10AM PST
- Collapse -
Mal/FakeAV-R
Jan 8, 2009 10:12AM PST
- Collapse -
Mal/Banker-F
Jan 8, 2009 10:13AM PST
- Collapse -
Win32.Worm.Downadup.Gen
Jan 8, 2009 10:16AM PST

( W32.Downadup, W32/Worm.AHGV, Net-Worm.Win32.Kido.bg )

TECHNICAL DESCRIPTION:

Win32.Worm.Downadup is a worm which relies on the Microsoft Windows Server Service RPC Handling Remote Code Execution Vulnerability (MS08-67) for spreading on other computers in the local network. The authors took various approaches to make this malware especially fast spreading and hard to remove.

More: http://www.bitdefender.com/VIRUS-1000462-en--Win32.Worm.Downadup.Gen.html