Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

VIRUS \ Spyware ALERTS - October 6, 2008

Oct 5, 2008 2:35PM PDT

Discussion is locked

- Collapse -
Troj/Bifrose-WK
Oct 6, 2008 1:06AM PDT
- Collapse -
Troj/Agent-HVM
Oct 6, 2008 1:07AM PDT
- Collapse -
Troj/Agent-HVL
Oct 6, 2008 1:09AM PDT
- Collapse -
W32/Sality-AM
Oct 6, 2008 1:10AM PDT

Aliases Win32/Sality.gen
W32/Sality.dll
New Win32.s

Category Viruses and Spyware

Type Virus

W32/Sality-AM is a virus for the Windows platform.

The virus includes the functionality to download additional files from a remote location.

When first run, the virus may infect executables in the root folder, files on network shares, and files it may find based on the following registry locations:

HKCU\Software\Microsoft\Windows\CurrentVersion\Run
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKCU\Software\Microsoft\Windows\ShellNoRoam\MUICache

http://www.sophos.com/security/analyses/viruses-and-spyware/w32salityam.html?_log_from=rss

- Collapse -
W32/AutoRun-LA
Oct 6, 2008 1:11AM PDT
- Collapse -
Troj/FakeAle-HZ
Oct 6, 2008 1:12AM PDT
- Collapse -
Troj/DwnlDr-HIS
Oct 6, 2008 1:13AM PDT
- Collapse -
Troj/DwnLdr-HIR
Oct 6, 2008 1:14AM PDT
- Collapse -
Troj/Agent-HVO
Oct 6, 2008 1:15AM PDT
- Collapse -
Troj/Agent-HVN
Oct 6, 2008 1:16AM PDT
- Collapse -
Downloader.Misapp!zip
Oct 6, 2008 2:13AM PDT
- Collapse -
W32/Tilebot-KZ
Oct 6, 2008 6:40AM PDT

Category Viruses and Spyware

Type Worm

W32/Tilebot-KZ is a worm for the Windows platform.

W32/Tilebot-KZ includes functionality to access the internet and communicate with a remote server via HTTP.

When first run W32/Tilebot-KZ copies itself to <System>\drivers\LBTWiz.exe.

The following registry entry is created to run LBTWiz.exe on startup:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
LBTWiz.exe
<System>\drivers\LBTWiz.exe

http://www.sophos.com/security/analyses/viruses-and-spyware/w32tilebotkz.html?_log_from=rss

- Collapse -
Troj/Dload-DV
Oct 6, 2008 6:41AM PDT
- Collapse -
Troj/Dload-DU
Oct 6, 2008 6:42AM PDT
- Collapse -
Troj/Dload-DT
Oct 6, 2008 6:43AM PDT
- Collapse -
Troj/Agent-HVR
Oct 6, 2008 6:44AM PDT
- Collapse -
Troj/Agent-HVQ
Oct 6, 2008 6:45AM PDT
- Collapse -
Troj/Agent-HVP
Oct 6, 2008 6:46AM PDT

Category Viruses and Spyware

Type Trojan

When first run, Troj/Agent-HVP copies itself to the following location:

<System>\systeminit.exe

Troj/Agent-HVP also overwrites the following Windows system file with a malicious version:

<System>\drivers\beep.sys

The following registry entry is created in order to ensure that this file is loaded even in safe mode:

HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal
beep.sys
beep

http://www.sophos.com/security/analyses/viruses-and-spyware/trojagenthvp.html?_log_from=rss

- Collapse -
W32.Poskiwing
Oct 6, 2008 6:48AM PDT
- Collapse -
W32/Dugert-A
Oct 6, 2008 11:03AM PDT

Aliases Win32.HLLP.Dugert.a

Category Viruses and Spyware

Type Virus


W32/Dugert-A is a virus for the Windows platform, not including
Windows 95, 95, ME or earlier.

W32/Dugert-A infects executable files with an extension of EXE located
on drives C: - Z:.

W32/Dugert-A tries to avoid infecting system executables.

The virus creates temporary files in the current folder named
<random1>.<random2> where <random1> is a random number within the range
0 - 9999 and <random2> is a random number within the range 0 - 999.

http://www.sophos.com/security/analyses/viruses-and-spyware/w32dugerta.html?_log_from=rss

- Collapse -
Troj/Zlob-AOX
Oct 6, 2008 11:14AM PDT

Aliases Trojan.Zlob

Category Viruses and Spyware

Type Trojan

Troj/Zlob-AOX is a downloader Trojan for the Windows platform.

The installer for Troj/Zlob-AOX drops a randomly named DLL to the System folder and registers this DLL as a COM object and Browser Helper Object (BHO) for Microsoft Internet Explorer, creating registry entries under:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{5D682D50-876E-454C-90BE-EFE6028FE389}
HKCR\TypeLib\{15C7D7AD-A87A-4C0D-9D8B-637FCD3488EF}
HKCR\Interface\{7400E82A-929B-462A-BA8D-A7ED73843144}
HKCR\Interface\{1D745E53-A313-4CC4-9D5D-F6B655BE9167}
HKCR\CLSID\{5D682D50-876E-454C-90BE-EFE6028FE389}
HKCR\gigant.Bho
HKCR\monamia2

The installer then creates a hidden instance of Microsoft Internet Explorer to activate the DLL.

http://www.sophos.com/security/analyses/viruses-and-spyware/trojzlobaox.html?_log_from=rss

- Collapse -
Troj/Mdrop-BWC
Oct 6, 2008 11:16AM PDT

Category Viruses and Spyware

Type Trojan

Troj/Mdrop-BWC drops the file <Windows>\Debug\<Random Number>.dll which is detected as Mal/Emogen-N.

Troj/Mdrop-BWC disables security applications by creating the following registry value for each <Executable Name> it disables:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\<Executable Name>
Debugger
IFEOFILE

http://www.sophos.com/security/analyses/viruses-and-spyware/trojmdropbwc.html?_log_from=rss

- Collapse -
Troj/Dloadr-BUP
Oct 6, 2008 11:17AM PDT

Category Viruses and Spyware

Type Trojan

Troj/Dloadr-BUP is a downloader Trojan for the Windows platform.

When first run Troj/Dloadr-BUP copies itself to <Windows>\updater.com with the hidden, system and read-only attributes set and creates the following registry entries to run updater.com on startup:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceEx
Windows Updater
updater.com

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Windows Updater
updater.com

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows Updater
updater.com

The following registry entries are set, disabling system software:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system
DisableRegistrytools
1

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\system
DisableTaskMgr
1

http://www.sophos.com/security/analyses/viruses-and-spyware/trojdloadrbup.html?_log_from=rss

- Collapse -
Troj/Dloadr-BUO
Oct 6, 2008 11:18AM PDT
- Collapse -
Mal/PHPInfo-A
Oct 6, 2008 11:19AM PDT