[cut-n-paste from sophos.com]
Name Troj/SpyAge-B
Type
* Spyware Trojan
Affected operating systems
* Windows
Side effects
* Steals information
* Installs itself in the Registry
Aliases
* Win32/Wigon.D
* Spy-Agent.bv.dr
* Trojan.Win32.Agent.ady
Prevalence (1-5) 3
Description
Troj/SpyAge-B is a Trojan for the Windows platform.
Advanced
Troj/SpyAge-B is a Trojan for the Windows platform.
When Troj/SpyAge-B is installed the following files are created:
\main.sys
\reg.sys
The file reg.sys is also detected as Troj/SpyAge-B. The file main.sys
is detected as Troj/Devspy-Fam.
The file main.sys is registered as a new system driver service named
"EXAMPLE". Registry entries are created under:
HKLM\SYSTEM\CurrentControlSet\Services\EXAMPLE
Name W32/Looked-CP
Type
* Virus
How it spreads
* Infected files
Affected operating systems
* Windows
Side effects
* Downloads code from the internet
* Installs itself in the Registry
Prevalence (1-5) 2
Description
W32/Looked-CP is a prepending virus for the Windows platform.
Advanced
W32/Looked-CP is a prepending virus for the Windows platform.
When first run, W32/Looked-CP copies itself to
\uninstall\rundl132.exe and \Logo1_.exe.
W32/Looked-CP creates the following registry entry in order to be run
itself on startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
load
\uninstall\rundl132.exe
W32/Looked-CP also creates the file \RichDll.dll. This file
is also detected as W32/Looked-CP.
Name W32/TrigXF-A
Type
* Worm
How it spreads
* Chat programs
Affected operating systems
* Windows
Prevalence (1-5) 2
Description
W32/TrigXF-A is an instant messaging worm for the Windows platform.
Advanced
W32/TrigXF-A is an instant messaging worm for the Windows platform.
W32/TrigXF-A includes functionality to access the internet and
communicate with a remote server via HTTP.
When W32/TrigXF-A is installed the following files are created:
\instr32.exe
\windebug.log
\windebug2.log
Name W32/Sality-AI
Type
* Virus
How it spreads
* Infected files
Affected operating systems
* Windows
Side effects
* Drops more malware
Aliases
* Virus.Win32.Sality.l
* W32/Sality.K
* W32/Sality.n
* Win32/Sality.NAE
* W32.HLLP.Sality.O
Prevalence (1-5) 2
Description
W32/Sality-AI is a virus for the Windows platform.
Advanced
W32/Sality-AI is a virus for the Windows platform.
When W32/Sality-AI is installed the file \wmimgr32.dll is
created. This file is detected as W32/Sality-I.
Name W32/Brontok-DB
Type
* Worm
How it spreads
* Email messages
* Network shares
Affected operating systems
* Windows
Side effects
* Sends itself to email addresses found on the infected computer
* Uses its own emailing engine
* Installs itself in the Registry
Aliases
* Win32/Brontok.G worm
* W32/Rontokbro.gen{at}MM
* Email-Worm.Win32.Brontok.q
* WORM_RONTOKBRO.H
Prevalence (1-5) 2
Description
W32/Brontok-DB is a worm for the Windows platform.
Advanced
W32/Brontok-DB is a worm for the Windows platform.
When first run W32/Brontok-DB copies itself to:
\Local Settings\Application Data\csrss.exe
\Local Settings\Application Data\inetinfo.exe
\Local Settings\Application Data\lsass.exe
\Local Settings\Application Data\services.exe
\Local Settings\Application Data\smss.exe
\ShellNew\bronstab.exe
\eksplorasi.exe
The following registry entries are created to run W32/Brontok-DB on
startup:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Tok-Cirrhatus
\Local Settings\Application Data\smss.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Bron-Spizaetus
\ShellNew\bronstab.exe
The following registry entry is changed to run eksplorasi.exe on
startup:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
Explorer.exe "\eksplorasi.exe"
The following registry entry is set, disabling system software:
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
DisableRegistryTools
1
W32/Brontok-DB will restart the computer whenever the user opens a
command prompt.
Registry entries are set as follows:
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
NoFolderOptions
1
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
DisableCMD
0
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Hidden
0
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
HideFileExt
1
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
ShowSuperHidden
0
Name W32/Feebs-BK
Type
* Worm
How it spreads
* Email attachments
Affected operating systems
* Windows
Side effects
* Sends itself to email addresses found on the infected computer
* Drops more malware
* Forges the sender's email address
* Uses its own emailing engine
Prevalence (1-5) 2
Description
W32/Feebs-BK is an email worm for the Windows platform.
Advanced
W32/Feebs-BK is an email worm for the Windows platform.
W32/Feebs-BK includes functionality to access the internet and
communicate with a remote server via HTTP.
When run, the worm creates the files
\.exe (Detected as Mal/Packer)
\ * Origin: Doc's Place BBS Fido Since 1991 docsplace.tzo.com (1:123/140)
SEEN-BY: 633/267
@PATH: 123/140 500 379/1 633/267
|