Spyware, Viruses, & Security forum

General discussion

VIRUS \ Spyware ALERTS - September 17, 2008

by Marianna Schmudlach / September 16, 2008 3:06 PM PDT

W32/Tilebot-KY


Category Viruses and Spyware

Type Worm


W32/Tilebot-KY is a worm for the Windows platform.

W32/Tilebot-KY includes functionality to access the internet and communicate with a remote server via HTTP.

When first run W32/Tilebot-KY copies itself to <System>\drivers\winlogon.exe.

The following registry entry is created to run W32/Tilebot-KY on startup:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
winlogon.exe
<System>\drivers\winlogon.exe

http://www.sophos.com/security/analyses/viruses-and-spyware/w32tilebotky.html?_log_from=rss

Discussion is locked
You are posting a reply to: VIRUS \ Spyware ALERTS - September 17, 2008
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: VIRUS \ Spyware ALERTS - September 17, 2008
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Troj/PDFEx-S
by Marianna Schmudlach / September 16, 2008 3:07 PM PDT
Collapse -
Troj/Lineag-GI
by Marianna Schmudlach / September 16, 2008 3:08 PM PDT
Collapse -
Troj/Dloadr-BTD
by Marianna Schmudlach / September 16, 2008 3:10 PM PDT
Collapse -
Troj/Agent-HRD
by Marianna Schmudlach / September 16, 2008 3:11 PM PDT
Collapse -
JS/Psyme-JV
by Marianna Schmudlach / September 16, 2008 3:12 PM PDT
Collapse -
VirusResponseLab
by Marianna Schmudlach / September 16, 2008 3:17 PM PDT
Collapse -
Troj/Zlobyp-Gen
by Marianna Schmudlach / September 17, 2008 12:16 AM PDT

Aliases Srizbi.gen.a
Trojan:Win32/Zlob.G
TrojanDownloader:Win32/Zlob.gen!GX
TrojanDownloader:Win32/Zlob.IK

Category Viruses and Spyware

Type Trojan

Troj/Zlobyp-Gen is a family of Trojans for the Windows family that attempt to download and execute other files, often afile in the Zlob or FakeAV family of Trojans.

Some members of Troj/Zlobyp-Gen pretend to be a codec or something similar required to view a video.

http://www.sophos.com/security/analyses/viruses-and-spyware/trojzlobypgen.html?_log_from=rss

Collapse -
Troj/Dropr-AC
by Marianna Schmudlach / September 17, 2008 12:17 AM PDT
Collapse -
Troj/Adclik-Gen
by Marianna Schmudlach / September 17, 2008 12:18 AM PDT
Collapse -
Troj/PWS-ATT
by Marianna Schmudlach / September 17, 2008 12:19 AM PDT
Collapse -
Troj/PWS-ATS
by Marianna Schmudlach / September 17, 2008 12:20 AM PDT
Collapse -
Troj/AutoIt-T
by Marianna Schmudlach / September 17, 2008 12:21 AM PDT
Collapse -
Mal/EncPk-EG
by Marianna Schmudlach / September 17, 2008 12:22 AM PDT
Collapse -
Backdoor:W32/Hupigon.EMV
by Marianna Schmudlach / September 17, 2008 12:24 AM PDT
Collapse -
W32/AutoRun-JL
by Marianna Schmudlach / September 17, 2008 1:12 AM PDT
Collapse -
Troj/WoW-KC
by Marianna Schmudlach / September 17, 2008 1:13 AM PDT
Collapse -
Troj/AutoIt-U
by Marianna Schmudlach / September 17, 2008 1:14 AM PDT
Collapse -
Troj/Agent-HRF
by Marianna Schmudlach / September 17, 2008 5:44 AM PDT
Collapse -
W32/Autorun-JM
by Marianna Schmudlach / September 17, 2008 7:53 AM PDT

Category Viruses and Spyware

Type Worm

W32/Autorun-JM is a worm for the Windows platform. The worm spreads via removable storage devices and network shares.

When W32/Autorun-JM is installed it creates the folder:

<System>\ntfs

and in the folder creates the following files:

Ntfs.exe
Ntfs2.exe
autorun.inf

All three files are detected as W32/Autorun-JM.

The following registry entries are set:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
systemStart
<System>\ntfs\Ntfs.exe

HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
DontShowSuperHidden
2

The worm may disable system tools such as regedit and task manager.

http://www.sophos.com/security/analyses/viruses-and-spyware/w32autorunjm.html?_log_from=rss

Collapse -
W32/AutoInf-O
by Marianna Schmudlach / September 17, 2008 7:54 AM PDT
Collapse -
Troj/Wintrim-H
by Marianna Schmudlach / September 17, 2008 7:55 AM PDT
Collapse -
Troj/Inject-CU
by Marianna Schmudlach / September 17, 2008 7:56 AM PDT
Collapse -
Troj/FakeAV-DN
by Marianna Schmudlach / September 17, 2008 7:57 AM PDT
Collapse -
Troj/FakeAle-HL
by Marianna Schmudlach / September 17, 2008 7:58 AM PDT

Category Viruses and Spyware

Type Trojan

Troj/FakeAle-HL is a Trojan for the Windows platform.

Troj/FakeAle-HL includes functionality to access the internet and communicate with a remote server via HTTP.

When first run Troj/FakeAle-HL copies itself to <System>\lphcjgvj0enf1.exe and creates the following files:

<Temp>\.tt1.tmp.vbs
<System>\blphcjgvj0enf1.scr
<System>\phcjgvj0enf1.bmp

The file blphcjgvj0enf1.scr is detected as Mal/EncPk-CZ, the file phcjgvj0enf1.bmp is detected as Troj/FakeAV-CD and the file .tt1.tmp.vs is detected as VBS/InfSR-A.

http://www.sophos.com/security/analyses/viruses-and-spyware/trojfakealehl.html?_log_from=rss

Collapse -
Troj/Delf-FBD
by Marianna Schmudlach / September 17, 2008 7:59 AM PDT

Aliases Win32/TrojanDownloader.Delf.OGZ
Generic Downloader.x
Trojan.Win32.Small.xut

Category Viruses and Spyware

Type Trojan

Troj/Delf-FBD is a Trojan for the Windows platform.

Troj/Delf-FBD includes functionality to access the internet and communicate with a remote server via HTTP.

When first run Troj/Delf-FBD copies itself to <User>\Application Data\Adobe\Manager.exe.

The following registry entry is created to run Manager.exe on startup:

HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Run
<User>\Application Data\Adobe\Manager.exe

http://www.sophos.com/security/analyses/viruses-and-spyware/trojdelffbd.html?_log_from=rss

Popular Forums
icon
Computer Help 51,912 discussions
icon
Computer Newbies 10,498 discussions
icon
Laptops 20,411 discussions
icon
Security 30,882 discussions
icon
TVs & Home Theaters 21,253 discussions
icon
Windows 10 1,672 discussions
icon
Phones 16,494 discussions
icon
Windows 7 7,855 discussions
icon
Networking & Wireless 15,504 discussions

GREAT SHOWS WITHOUT CABLE

Get live TV over the internet

Say goodbye to cable -- check out the top five live TV streaming services available now.