Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

VIRUS \ Spyware ALERTS - October 10, 2008

Oct 9, 2008 3:19PM PDT

W32/Malas-H

Category Viruses and Spyware

Type Worm


W32/Malas-H is a worm for the Windows platform.

When first run W32/Malas-H copies itself to:

<User>\Application Data\usrinit.exe
<User>\Local Settings\startup.exe
<Temp>\systray.exe
<Common Files>\AdobeUpdate.exe
<Program Files>\XPCode\SexGame.exe
<Program Files>\XPCode\SexGameList.pif
<Program Files>\XPCode\SexScreenSaver.scr

http://www.sophos.com/security/analyses/viruses-and-spyware/w32malash.html?_log_from=rss

Discussion is locked

- Collapse -
Troj/Rootkit-DW
Oct 9, 2008 3:20PM PDT
- Collapse -
Troj/FakeAle-IE
Oct 9, 2008 3:21PM PDT
- Collapse -
Troj/Bancban-QZ
Oct 9, 2008 3:22PM PDT
- Collapse -
Troj/Agent-HWP
Oct 10, 2008 1:18AM PDT
- Collapse -
Troj/Psyme-KF
Oct 10, 2008 1:19AM PDT
- Collapse -
Troj/Dloadr-BVI
Oct 10, 2008 1:20AM PDT
- Collapse -
Troj/Agent-HWR
Oct 10, 2008 1:22AM PDT
- Collapse -
Troj/Agent-HWQ
Oct 10, 2008 1:23AM PDT
- Collapse -
Mal/ObfJS-X
Oct 10, 2008 1:25AM PDT
- Collapse -
W32/Yahlov-A
Oct 10, 2008 1:27AM PDT
- Collapse -
W32/Agent-HWS
Oct 10, 2008 1:28AM PDT
- Collapse -
Troj/Iframe-BA
Oct 10, 2008 1:29AM PDT
- Collapse -
Mal/Autorun-C
Oct 10, 2008 1:30AM PDT
- Collapse -
- Panda Security's weekly report on viruses and intruders -
Oct 10, 2008 2:40AM PDT

Virus Alerts, by Panda Security (http://www.pandasecurity.com)

This week's PandaLabs report looks at the Lydra.AO Trojan, the Redvoz.A
backdoor Trojan and the Autorun.AHS worm.

Lydra.AO records users' activity on the infected computer and sends it
to the malware author. To do so, it remains active in the Windows memory
and starts capturing keystrokes and mouse movements. It also collects
email addresses found in files with certain extensions.

It stores the information gathered, together with the PC hardware and
software data, and sends it to the malware author via email. To do so,
it uses its own SMTP or MAPI engine.

Redvoz.A is a backdoor Trojan that connects to a remote server, which
allows the creator to run arbitrary commands on the infected computer
and take control of the system.

This new malicious code creates a system service for managing network
policies displayed by default by system services and third-party
applications. This service is run continuously and cannot be stopped,
making it difficult to remove. As the service is in a loop, the threat
is recreated if it is deleted.

Autorun.AHS is a worm designed to spread through the floppy disk drive.
When run on the computer, it modifies specific Registry entries to make
it seem as though the Task Manager, Windows Registry, Folder options and
Explorer files have been enabled. What it really does though, is replace
the Internet Explorer start page for a malicious page. It also modifies
the Windows Registry to run on every system startup.

- Collapse -
W32/Yahlov-A
Oct 10, 2008 4:56AM PDT
- Collapse -
W32/Nuwar-F
Oct 10, 2008 4:57AM PDT
- Collapse -
Troj/PhpShell-R
Oct 10, 2008 4:58AM PDT
- Collapse -
Troj/Invo-Zip
Oct 10, 2008 4:59AM PDT
- Collapse -
Troj/DwnLdr-HIX
Oct 10, 2008 5:00AM PDT
- Collapse -
Troj/Brkseed-A
Oct 10, 2008 5:01AM PDT
- Collapse -
Troj/Agent-HWT
Oct 10, 2008 5:02AM PDT
- Collapse -
Casino
Oct 10, 2008 6:04AM PDT
- Collapse -
Fenomen Game Downloader
Oct 10, 2008 6:05AM PDT
- Collapse -
REFOG Personal Monitor
Oct 10, 2008 6:06AM PDT

Aliases Spyware.KGBSpy
Monitor.Win32.KGBSpy.bg
Monitor.Win32.KGBSpy.bh
Monitor.Win32.KGBSpy.bj

Category Adware or PUA

Type System Monitor

"REFOG Personal Monitor" is a spyware application.

When "REFOG Personal Monitor" is installed the following folders are typically created:

<User>\Application Data\MPK\
<System>\MPK\

and the following links are created:

<System>\runkgb.lnk
<System>\runrefog.lnk

The following registry entry is changed to run <System>\MPK\MPK.exe on startup:

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
<System>\userinit.exe,<System>\MPK\MPK.exe

http://www.sophos.com/security/analyses/adware-and-puas/refogpersonalmon_wSVQ9xoI.html?_log_from=rss

- Collapse -
Sus/EncPk-FL
Oct 10, 2008 6:08AM PDT
- Collapse -
Sus/UnkPacker
Oct 10, 2008 6:09AM PDT
- Collapse -
Sus/Sality-A
Oct 10, 2008 6:10AM PDT

Category Suspicious behavior and files

Type Suspicious behavior

What's been detected Sus/Sality-A exhibits characteristics commonly, but not exclusively, found in malware.

Sus/Sality-A is a file that displays characteristics or behavior typically associated with malware.

Sus/Sality-A is a file that may have been infected by W32/Sality-AM.

Please send a sample to Sophos support to assist in improving our technology.

http://www.sophos.com/security/analyses/suspicious-behavior-and-files/sussalitya.html?_log_from=rss

- Collapse -
Troj/Swizzor-OH
Oct 10, 2008 11:33AM PDT
- Collapse -
Troj/Poison-AH
Oct 10, 2008 11:34AM PDT
- Collapse -
Troj/Poison-AG
Oct 10, 2008 11:35AM PDT