Spyware, Viruses, & Security forum

General discussion

VIRUS \ Spyware ALERTS - September 19, 2008

by Marianna Schmudlach / September 18, 2008 12:35 PM PDT
Discussion is locked
You are posting a reply to: VIRUS \ Spyware ALERTS - September 19, 2008
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: VIRUS \ Spyware ALERTS - September 19, 2008
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Troj/MDrop-BVU
by Marianna Schmudlach / September 18, 2008 12:36 PM PDT
Collapse -
Troj/Dloadr-BTI
by Marianna Schmudlach / September 18, 2008 12:37 PM PDT
Collapse -
Troj/Agent-HRI
by Marianna Schmudlach / September 18, 2008 12:38 PM PDT
Collapse -
W32/Rbot-GXB
by Marianna Schmudlach / September 18, 2008 2:52 PM PDT
Collapse -
W32/IRCBot-ACT
by Marianna Schmudlach / September 18, 2008 2:54 PM PDT
Collapse -
W32/HostInf-A
by Marianna Schmudlach / September 18, 2008 2:55 PM PDT

Category Viruses and Spyware

Type Worm

W32/HostInf-A is a worm with IRC backdoor functionality for the Windows platform.

W32/HostInf-A modifies the infected computers hosts file.

W32/HostInf-A runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over
the computer via IRC channels.

When first run W32/HostInf-A copies itself to <System>\<temp name>.exe.

http://www.sophos.com/security/analyses/viruses-and-spyware/w32hostinfa.html?_log_from=rss

Collapse -
W32/AutoRun-JN
by Marianna Schmudlach / September 18, 2008 2:56 PM PDT
Collapse -
W32/Autorun-EK
by Marianna Schmudlach / September 18, 2008 2:59 PM PDT

Category Viruses and Spyware

Type Worm

W32/Autorun-EK is a worm for the Windows platform.

When W32/Autorun-EK is installed the following files are created:

<Temp>\rememberthis.exe
<Windows>\UNISNTLV32.exe
<Windows>\services.exe
<Windows>\ulodb3.ini

The exe files are all detected as W32/Autorun-EK. The file ulodb3.ini is a data file and can be deleted.

The following registry entry is created to run UNISNTLV32.exe on startup:

HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{Y479C6A0-OTRV-U5KH-S1UE-E0BC10B4E666}
StubPath
<Windows>\UNISNTLV32.exe

Registry entries are created under:

HKLM\SOFTWARE\rememberthis.exe\rememberthis

http://www.sophos.com/security/analyses/viruses-and-spyware/w32autorunek.html?_log_from=rss

Collapse -
Troj/Inject-CW
by Marianna Schmudlach / September 18, 2008 3:00 PM PDT
Collapse -
Troj/Agent-HRK
by Marianna Schmudlach / September 18, 2008 3:01 PM PDT
Collapse -
Troj/Agent-HRJ
by Marianna Schmudlach / September 18, 2008 3:02 PM PDT
Collapse -
Mal/EncPk-FC
by Marianna Schmudlach / September 18, 2008 3:03 PM PDT
Collapse -
Panda Security's weekly report on viruses and intruders
by Marianna Schmudlach / September 19, 2008 12:36 AM PDT

Virus Alerts, by Panda Security (http://www.pandasecurity.com)

Panda Security's report this week provides information about the
Singu.AM backdoor and the Goldun.TB and Sinowal.VTJ Trojans.

The Singu.AM backdoor copies itself on computers under the name
inetput.exe. When run, it installs itself as a computer service and
opens a port on the victim's computer, so the attacker can control it
remotely and carry out malicious actions: administer connections,
capture keystrokes, configure connection parameters, access the Windows
Registry, etc.

This malicious code is distributed through P2P networks. To tempt users
into downloading it, it uses social engineering techniques, passing
itself off as a fake program, an erotic photo, etc.

The Goldun.TB and Sinowal.VTJ Trojans are distributed in a similar way.

Goldun.TB reaches the victim's computer on an email attachment (photo
here: http://www.flickr.com/photos/panda_security/2865375408/)
pretending to be an ICS warning (an incorrect abbreviation of IPCS:
Internet Service Provider Consortium), and indicating that the Internet
connection will be suspended due to the user's violation of alleged
author rights.

The email attaches a supposed 6-month activity report which it refers to
in the message body. This report is compressed in a .ZIP file. If users
decompress and try to open the false report, they will be allowing a
copy of the Goldun.TB Trojan onto their computer.

The Sinowal.VTJ Trojan, on the other hand, reaches mailboxes in an email
pretending to come from a user who accuses the recipient of sending a
virus to his computer via email.

The email subject is "I am wait (sic) your reply"
(http://www.flickr.com/photos/panda_security/), and it has an attached
file it refers to in the email body, which supposedly contains proof of
the user's sending of malicious emails.

On opening the file (.ZIP format) and running the content (executable
file that looks like a PDF document), users will be entering a copy of
the Sinowal.VTJ Trojan onto their computer.

Once on the computer, this malicious code tries to download a
configuration file from a Russian domain, previously used to distribute
banker malware. It also releases a series of malicious files on the
system.

"It is an ingenious social engineering technique. In both cases
cyber-crooks threaten users (cut off their Internet connection or take
legal action). This way, users are tempted into viewing the proof
against them, and on doing so, are infected," explains Luis Corrons,
technical director of PandaLabs.

Collapse -
Troj/PWSLin-Gen
by Marianna Schmudlach / September 19, 2008 12:39 AM PDT
Collapse -
Troj/IRCBot-ACN
by Marianna Schmudlach / September 19, 2008 12:40 AM PDT
Collapse -
Troj/Buzus-Gen
by Marianna Schmudlach / September 19, 2008 12:41 AM PDT
Collapse -
Troj/Proxy-IR
by Marianna Schmudlach / September 19, 2008 12:42 AM PDT
Collapse -
Troj/MalDoc-N
by Marianna Schmudlach / September 19, 2008 12:43 AM PDT
Collapse -
Troj/Lineag-GK
by Marianna Schmudlach / September 19, 2008 12:44 AM PDT
Collapse -
Troj/Dropr-AD
by Marianna Schmudlach / September 19, 2008 12:45 AM PDT
Collapse -
Troj/Dloadr-BTJ
by Marianna Schmudlach / September 19, 2008 12:46 AM PDT
Collapse -
Troj/Small-EMG
by Marianna Schmudlach / September 19, 2008 12:47 AM PDT
Collapse -
Troj/Agent-HRL
by Marianna Schmudlach / September 19, 2008 12:48 AM PDT
Collapse -
OnlinePcGuard Downloader
by Marianna Schmudlach / September 19, 2008 12:49 AM PDT
Collapse -
PremierOpinion
by Marianna Schmudlach / September 19, 2008 12:50 AM PDT
Collapse -
Troj/Dialer-Gen
by Marianna Schmudlach / September 19, 2008 12:51 AM PDT
Collapse -
W32/Sohana-BI
by Marianna Schmudlach / September 19, 2008 2:07 AM PDT

Aliases W32/YahLover.worm

Category Viruses and Spyware

Type Worm

W32/Sohana-BI is a worm for the Windows platform.

W32/Sohana-BI includes functionality to access the internet and communicate with a remote server via HTTP.

When first run W32/Sohana-BI copies itself to:

<Windows>\gphone.exe
<System>\gphone.exe

and creates the file <System>\autorun.ini.

The following registry entry is created to run gphone.exe on startup:

HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Yahoo Messengger
<System>\gphone.exe

http://www.sophos.com/security/analyses/viruses-and-spyware/w32sohanabi.html?_log_from=rss

Collapse -
W32/Virut-Gen
by Marianna Schmudlach / September 19, 2008 2:08 AM PDT
Collapse -
Troj/FakeAV-DP
by Marianna Schmudlach / September 19, 2008 2:09 AM PDT
Collapse -
Troj/Dloadr-BTK
by Marianna Schmudlach / September 19, 2008 2:11 AM PDT
Popular Forums
icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

CNET FORUMS TOP DISCUSSION

Help, my PC with Windows 10 won't shut down properly

Since upgrading to Windows 10 my computer won't shut down properly. I use the menu button shutdown and the screen goes blank, but the system does not fully shut down. The only way to get it to shut down is to hold the physical power button down till it shuts down. Any suggestions?