Spyware, Viruses, & Security forum

General discussion

VIRUS \ Spyware ALERTS - July 29, 2008

Discussion is locked
You are posting a reply to: VIRUS \ Spyware ALERTS - July 29, 2008
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: VIRUS \ Spyware ALERTS - July 29, 2008
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Troj/Agent-HIA

In reply to: VIRUS \ Spyware ALERTS - July 29, 2008

Collapse -
Mal/RarMal-B

In reply to: VIRUS \ Spyware ALERTS - July 29, 2008

Collapse -
Mal/RarMal-A

In reply to: VIRUS \ Spyware ALERTS - July 29, 2008

Collapse -
JS/AutoRun-GV

In reply to: VIRUS \ Spyware ALERTS - July 29, 2008

Collapse -
W32/AutoRun-GW

In reply to: VIRUS \ Spyware ALERTS - July 29, 2008

Category Viruses and Spyware

Type Worm

W32/AutoRun-GW is a worm for the Windows platform.

When run W32/AutoRun-GW copies itself to:
<System>\wmiprvse.exe
<System>\mgrShell.exe

W32/AutoRun-GW sets the following registry entry:

HKCU\Software\Microsoft\Windows\CurrentVersion\Run
winmgmt
<System>\wmiprvse.exe

W32/AutoRun-GW spreads via removable shared drives by copying itself to <Root>\RECYCLER\desktop.exe and creating the file <Root>\autorun.inf that is designed to run the worm when the drive is connected to an uninfected computer. This file autorun.inf is detected as Mal/AutoInf-A.

http://www.sophos.com/security/analyses/viruses-and-spyware/w32autorungw.html?_log_from=rss

Collapse -
Troj/Fujif-Gen

In reply to: VIRUS \ Spyware ALERTS - July 29, 2008

Collapse -
Troj/Dloadr-BPB

In reply to: VIRUS \ Spyware ALERTS - July 29, 2008

Collapse -
Troj/Banloa-FN

In reply to: VIRUS \ Spyware ALERTS - July 29, 2008

Collapse -
JS/Psyme-JM

In reply to: VIRUS \ Spyware ALERTS - July 29, 2008

Collapse -
FakeAlert-AR

In reply to: VIRUS \ Spyware ALERTS - July 29, 2008

Type Trojan

SubType Win32

Similar to other malwares of this family, FakeAlert-AR shows a fake warning message, alarming the user that their machine is infected or at risk. The intention behind all the fake messages is drive users to download the advertised antispyware product.

Characteristics
Characteristics -

Upon execution , the trojan displays fake alert message as shown below.

More: http://vil.mcafeesecurity.com/vil/content/v_147269.htm

Collapse -
Win32.Worm.Autoit.AL

In reply to: VIRUS \ Spyware ALERTS - July 29, 2008

SYMPTOMS:

The presence of

%programfiles%\FlashGuard\FlashGuard.exe
%windrive%\FlashGuard\ReadMe.txt
%windrive%\FlashGuard\FlashGuard.exe

The presence of autorun.inf on removable drives that contains

[autorun]
open=System\Security\DriveGuard.exe -run
shell\Open=&Open
shell\Open\Command=System\Security\DriveGuard.exe -run
shell\Explore=&Explore
shell\Explore\Command=System\Security\DriveGuard.exe -run


TECHNICAL DESCRIPTION:


This worm tries to impersonate a friendly application one that wants to protect your removable drives from other pieces of malware.


The malicious file would copy itself to %programfiles%\FlashGuard\FlashGuard.exe


http://www.bitdefender.com/VIRUS-1000353-en--Win32.Worm.Autoit.AL.html

Collapse -
Troj/Renos-AX

In reply to: VIRUS \ Spyware ALERTS - July 29, 2008

Aliases TROJ_RENOS.ADW
Generic Downloader.x
Hoax.Win32.Renos.varv

Category Viruses and Spyware

Type Trojan

Troj/Renos-AX is a Trojan for the Windows platform.

Troj/Renos-AX includes functionality to access the internet and communicate with a remote server via HTTP.

Troj/Renos-AX changes settings for Microsoft Internet Explorer, including search settings, by modifying values under:

HKCU\Software\Microsoft\Internet Explorer\Main\Search Bar
HKCU\Software\Microsoft\Internet Explorer\Main\Search Page
HKCU\Software\Microsoft\Internet Explorer\Main\Start Page
HKLM\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Search_URL
HKLM\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page
HKLM\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page
HKLM\SOFTWARE\Microsoft\Internet Explorer\Search\

Registry entries affecting internet security may be set under:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones

The following registry entry is set:

HKCU\Software\Microsoft\Internet Explorer\Main
Enable Browser Extensions
yes

http://www.sophos.com/security/analyses/viruses-and-spyware/trojrenosax.html?_log_from=rss

Collapse -
Troj/Mdrop-BUJ

In reply to: VIRUS \ Spyware ALERTS - July 29, 2008

Collapse -
Troj/Iframe-AL

In reply to: VIRUS \ Spyware ALERTS - July 29, 2008

Collapse -
Troj/FakeAle-DO

In reply to: VIRUS \ Spyware ALERTS - July 29, 2008

Aliases FakeAlert-AG.gen

Category Viruses and Spyware

Type Trojan

Troj/FakeAle-DO is a Trojan for the Windows platform.

Troj/FakeAle-DO includes functionality to access the internet and communicate with a remote server via HTTP.

When first run Troj/FakeAle-DO copies itself to <System>\lphcjgvj0enf1.exe and creates the following files:

<Temp>\.tt1.tmp.vbs
<System>\blphcjgvj0enf1.scr
<System>\phcjgvj0enf1.bmp

The following registry entry is created to run lphcjgvj0enf1.exe on startup:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
lphcjgvj0enf1
<System>\lphcjgvj0enf1.exe

The following registry entry is changed to run blphcjgvj0enf1.scr on startup:

More: http://www.sophos.com/security/analyses/viruses-and-spyware/trojfakealedo.html?_log_from=rss

Collapse -
Troj/BHO-GI

In reply to: VIRUS \ Spyware ALERTS - July 29, 2008

Aliases Trojan.Win32.BHO.fby

Category Viruses and Spyware

Type Trojan

Troj/BHO-GI is a Trojan for the Windows platform.

The Troj/BHO-GI is registered as a COM object and Browser Helper Object (BHO) for Microsoft Internet Explorer, creating registry entries under:

HKCR\CLSID\{76086C05-4D0A-4B92-9219-2E3FE8C553F9}
HKCR\Interface\{4937D5D1-2039-409A-BD83-FEC9B39B2356}
HKCR\Interface\{CAF9D798-C659-4B9B-8E19-EE27C3D04EE7}
HKCR\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{76086C05-4D0A-4B92-9219-2E3FE8C553F9

Registry entries are set as follows:

HKCR\BhoNew.Bho.1\CLSID
(default)
{76086C05-4D0A-4B92-9219-2E3FE8C553F9}

HKCR\BhoNew.Bho\CLSID
(default)
{76086C05-4D0A-4B92-9219-2E3FE8C553F9}

Registry entries are created under:

HKCR\BhoNew.Bho

http://www.sophos.com/security/analyses/viruses-and-spyware/trojbhogi.html?_log_from=rss

Collapse -
Troj/Agent-HID

In reply to: VIRUS \ Spyware ALERTS - July 29, 2008

Category Viruses and Spyware

Type Trojan

Troj/Agent-HID is a Trojan for the Windows platform.

Troj/Agent-HID includes functionality to access the internet and communicate with a remote server via HTTP.

When Troj/Agent-HID is installed the following file is created:

<System>\tabcteng.dll

The file tabcteng.dll is registered as a service named "Netman" (replacing any existing services named "Netman"). Registry entries are created or modified under:

HKLM\SYSTEM\CurrentControlSet\Services\Netman

http://www.sophos.com/security/analyses/viruses-and-spyware/trojagenthid.html?_log_from=rss

Collapse -
Troj/Agent-HIB

In reply to: VIRUS \ Spyware ALERTS - July 29, 2008

Category Viruses and Spyware

Type Trojan

Troj/Agent-HIB is a backdoor Trojan which allows a remote intruder to gain access and control over the computer.

Troj/Agent-HIB includes functionality to access the internet and communicate with a remote server via HTTP.

When first run Troj/Agent-HIB makes randomly named copies of itself in the Windows system folder.

Registry entries such as the following are created to run these copies on startup:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
<randomly generated string>
<System>\<copy of Trojan>

The Trojan is registered as a new system driver service with a display name of "Websense CPM Report Scheduler" and a startup type of automatic, so that it is started automatically during system startup. Registry entries are created under:

HKLM\SYSTEM\CurrentControlSet\Services

http://www.sophos.com/security/analyses/viruses-and-spyware/trojagenthib.html?_log_from=rss

Collapse -
Mal/RarMal-B

In reply to: VIRUS \ Spyware ALERTS - July 29, 2008

Popular Forums

icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

SMART HOME

This one tip will help you sleep better tonight

A few seconds are all you need to get a better night's rest.