Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

VIRUS \ Spyware ALERTS - October 14, 2008

Oct 13, 2008 11:51AM PDT

Discussion is locked

- Collapse -
Troj/Mdrop-BWE
Oct 13, 2008 11:52AM PDT
- Collapse -
Troj/MailBom-AX
Oct 13, 2008 11:53AM PDT
- Collapse -
Troj/JSRedir-B
Oct 13, 2008 11:54AM PDT
- Collapse -
Troj/FakeAle-IG
Oct 13, 2008 11:55AM PDT
- Collapse -
Troj/FakeAle-IF
Oct 13, 2008 11:55AM PDT
- Collapse -
Troj/DwnLdr-HJC
Oct 13, 2008 11:56AM PDT
- Collapse -
Troj/Bckdr-QPV
Oct 13, 2008 11:58AM PDT
- Collapse -
Troj/Agent-HXD
Oct 13, 2008 11:58AM PDT
- Collapse -
W32/AutoRun-LO
Oct 13, 2008 2:46PM PDT

Category Viruses and Spyware

Type Worm

W32/AutoRun-LO is a worm for the Windows platform that spreads via removable drives.

When run W32/AutoRun-LO copies itself to <System>\regedit32.exe.

W32/AutoRun-LO installs itself as a service with the name "BackGround switch", a description of "BackGround Switch Disktop Control" and a startup type of automatic.

Registry entries are created under:

HKLMSYSTEM\CurrentControlSet\Enum\Root\LEGACY_BACKGROUND_SWITCH\
HKLM\SYSTEM\CurrentControlSet\Services\BackGround switch\


http://www.sophos.com/security/analyses/viruses-and-spyware/w32autorunlo.html?_log_from=rss

- Collapse -
W32/AutoRun-LN
Oct 13, 2008 2:47PM PDT
- Collapse -
Troj/FakeAle-IH
Oct 13, 2008 2:48PM PDT
- Collapse -
Troj/DwnLdr-HJE
Oct 13, 2008 2:49PM PDT
- Collapse -
Troj/Agent-HXE
Oct 13, 2008 2:50PM PDT
- Collapse -
W32/Rbot-GXD
Oct 14, 2008 1:01AM PDT
- Collapse -
W32/AutoRun-LR
Oct 14, 2008 1:02AM PDT
- Collapse -
Troj/DwnLdr-HJF
Oct 14, 2008 1:03AM PDT
- Collapse -
Troj/ByteV-AD
Oct 14, 2008 1:04AM PDT
- Collapse -
Troj/ByteV-AC
Oct 14, 2008 1:05AM PDT
- Collapse -
Troj/Agent-HXF
Oct 14, 2008 1:06AM PDT
- Collapse -
Troj/Iframe-BD
Oct 14, 2008 1:25AM PDT
- Collapse -
Troj/Iframe-BA
Oct 14, 2008 1:26AM PDT
- Collapse -
Troj/FakeAV-EQ
Oct 14, 2008 1:27AM PDT

Aliases Trojan.Win32.FraudPack.ajz
TROJ_FRAUDPA.ANK
Win32/Yektel.A

Category Viruses and Spyware

Type Trojan

Troj/FakeAV-EQ is a Trojan for the Windows platform.

When first run Troj/FakeAV-EQ copies itself to <System>\ieexplorer32.exe and creates the file:

<System>\winsrc.dll

The file winsrc.dll is registered as a COM object and Browser Helper Object (BHO) for Microsoft Internet Explorer, creating registry entries under:

HKCR\CLSID\{037C7B8A-151A-49E6-BAED-CC05FCB50328}
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{037C7B8A-151A-49E6-BAED-CC05FCB50328

http://www.sophos.com/security/analyses/viruses-and-spyware/trojfakeaveq.html?_log_from=rss

- Collapse -
Troj/FakeAle-IJ
Oct 14, 2008 1:28AM PDT

Aliases Generic FakeAlert.d
Trojan:Win32/Wantvi.I
HASH(0x9f85360)

Category Viruses and Spyware

Type Trojan

Troj/FakeAle-IJ is a Trojan for the Windows platform.

When Troj/FakeAle-IJ is installed the following files are created:

<Current Folder>\delself.bat
<System>\brastk.exe
<System>\dllcache\beep.sys
<System>\dllcache\figaro.sys

The files beep.sys and figaro.sys are detected as Mal/FakeAle-C. The file brastk.exe is detected as Troj/FakeAle-IG.

The following registry entries are created to run brastk.exe on startup:

HKCU\Software\Microsoft\Windows\CurrentVersion\Run
brastk
<System>\brastk.exe

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
brastk
<System>\brastk.exe

http://www.sophos.com/security/analyses/viruses-and-spyware/trojfakealeij.html?_log_from=rss

- Collapse -
Troj/DwnLdr-HJG
Oct 14, 2008 1:29AM PDT
- Collapse -
Troj/Dloadr-BVR
Oct 14, 2008 1:30AM PDT
- Collapse -
Troj/BanSpy-J
Oct 14, 2008 1:31AM PDT
- Collapse -
Troj/Agent-HXG
Oct 14, 2008 1:32AM PDT

Aliases TROJ_AGENT.ASFC

Category Viruses and Spyware

Type Trojan

Troj/Agent-HXG is a Trojan for the Windows platform.

The Troj/Agent-HXG is registered as a COM object and Browser Helper Object (BHO) for Microsoft Internet Explorer, creating registry entries under:

HKCR\CLSID\{500BCA15-57A7-4eaf-8143-8C619470B13D}
HKCR\TypeLib\{9233C3C0-1472-4091-A505-5580A23BB4AC}
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{500BCA15-57A7-4eaf-8143-8C619470B13D}

Registry entries are set as follows:

HKCR\XML.XML.1\CLSID
(default)
{500BCA15-57A7-4eaf-8143-8C619470B13D}

HKCR\XML.XML\CLSID
(default)
{500BCA15-57A7-4eaf-8143-8C619470B13D}

Registry entries are created under:

HKCR\XML.XML

http://www.sophos.com/security/analyses/viruses-and-spyware/trojagenthxg.html?_log_from=rss

- Collapse -
Sus/Iframe-K
Oct 14, 2008 1:34AM PDT
- Collapse -
Sus/Iframe-G
Oct 14, 2008 1:35AM PDT
- Collapse -
Sus/Spy-B
Oct 14, 2008 1:36AM PDT