TIP: Click on subject to list as thread! ANSI
echo: virus_info
to: ALL
from: KURT WISMER
date: 2004-01-23 23:01:00
subject: News

[cut-n-paste from sophos.com]

W32/Bagle-A

Aliases
W32.Beagle.A{at}mm, Win32.Bbgle.A{at}mm

Type
Win32 worm

Detection
Sophos has received many reports of this worm from the wild.

Description
W32/Bagle-A is a worm that sends itself to addresses harvested from 
files on the hard disk. The worm spoofs the "From" field in emails it 
sends, which means that it may appear to have come from someone you 
know.

W32/Bagle-A arrives in an email with the following characteristics:

Subject line: Hi

Message text:
Test =)
[random characters]
--
Test, yep.

Attached file: .exe

The attached file may appear as a calculator icon. The worm deliberately 
launches the Calculator application as a disguise.

W32/Bagle-A copies itself to bbeagle.exe in the Windows system folder 
and sets the following registry entry to ensure the worm is run at 
logon:

HKCU\Software\Microsoft\Windows\CurrentVersion\Run\d3dupdate.exe

The worm also sets the following registry entries:

HKCU\Software\Windows98\uid
HKCU\Software\Windows98\frun

W32/Bagle-A includes a backdoor component which listens on TCP port 
6777. This allows an attacker to upload and execute arbitrary programs 
on infected computers.

Note that W32/Bagle-A will not activate if the system date is 28 January 
2004 or later.





Troj/Proxin-A

Type
Trojan

Detection
At the time of writing, Sophos has received just one report of this 
Trojan from the wild.

Description
Troj/Proxin-A is a backdoor Trojan. When the Trojan is run on a victim's 
computer that computer will become vulnerable to unauthorised access 
attacks.

When the Trojan is first executed the following registry setting is 
created so that the Trojan is run when Windows starts up:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Window Manager





VBS/Gaggle-B

Aliases
VBS/Gaggle.B, VBS/Gaggl.D, VBS.Gaggle.B{at}mm, VBS_GAGGLE.C

Type
Visual Basic Script worm

Detection
At the time of writing, Sophos has received just one report of this 
worm from the wild.

Description
VBS/Gaggle-B is an email and IRC worm.

In order to run automatically when Windows starts up VBS/Gaggle-B copies 
itself to the file Gaghiel.vbs in the Windows system folder and sets the 
following registry entries to point to this file:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Gaghiel
HKLM\Software\Microsoft\Windows\CurrentVersion\Run Domain Manager\Gaghiel

The worm also drops the file Gaghiel.hta in the Windows startup folder 
and creates or overwrites the file wininit.ini in the Windows folder.

When run the VBS file will first check if the current day of the month 
is greater then twenty five, in which case the Internet Explorer start 
page will be changed to
http://www.gratisweb.com/machinedramon1/sachiel.scr.

The worm will also calculate the sum of the day of the month and the 
month of the year and display a message box if this sum is equal to 27.





W32/Flopcopy-A

Aliases
Win32.HLLW.VB.a, Win32/HLLW.VB.A, W32.HLLW.Flopcopy, WORM_FLOPCOPY.A

Type
Win32 worm

Detection
At the time of writing, Sophos has received just one report of this worm 
from the wild.

Description
W32/Flopcopy-A is a simple worm that spreads by copying itself to the 
floppy disk if a disk is inserted into the floppy drive.

It is intended that the worm arrives on a floppy disk as recycle.exe 
(the file icon is identical to the Windows recycling bin icon). When 
the file is run W32/Flopcopy-A copies itself into the Windows system 
folder as service.exe and creates the following registry value so that 
the worm file runs during the Windows startup process:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\SYS_CLEAN

W32/Flopcopy-A enumerates open windows and if the caption of the windows 
starts with the characters A: the worm attempts to copy itself to drive 
A: with the filename recycle.exe.

The message box will display the following Spanish text:
"Oracion antes de entrar al internet:
Satelite nuestro que estas & en el cielo,
Acelerado sea tu link,
Venga a nosotros tu hipertexto,
Hagase tu conexion en lo real como en lo virtual,
Danos hoy el download de cada dia,
Perdona el cafe en el Teclado,
Asi como nosotros perdonamos a nuestros proveedores,
No nos dejes caer la conexion,
Y libranos de todo Virus,
En nombre del Server, del Modem y del santo User-name.
Log-in.
GEDZAC LABS 2003
VBS/Gaghiel.C by MachineDramon
Hecho en el Perú, Calidad Mundial
Sachiel2015{at}latinmail.com, 15, Gaghiel."

VBS/Gaggle-B sends itself to all entries of the Windows address book 
and email addresses found in HTML, HTM, ASP or PHP files on the system. 
The worm uses one of the following subjects lines, message texts and 
attachment filenames when sending itself:

Subject lines:
Ouija Online
Espias del mas alla
Advertencia de Envio Spam
Registro
Investigacion

Message Texts:
Alguna vez tuviste curiosidad por saber los misterios de
la Ouija, ahora podras conocerlos e incluso jugarla en tu Pc
Mira el tablero interactivo que te enviamos, para obtener informacion
presiona el boton INFO o visita nuestro web: http://www.gratisweb.com/
machinedramon1/gaghiel.html

Has escuchado alguna vez de las psicofonias o videos psiquicos?
Visita nuestra web: http://www.gratisweb.com/machinedramon1/gaghiel.html
Escucha la voz de los muertos, (*$*)

Su Cuenta ha sido denunciada por el envio de Spam(Correo no Deseado).
De repetirse la situación se procederá a la clausura de su cuenta de e-mail.
Los detalles en el informe adjunto.
Atentamente Security IQEl S.A.

Su registro se ha realizado con exito, su nombre y clave de usuario
estan en el texto adjunto, así como las normas y derechos de cada usuario.
Su UserName y Clave son de uso personal y no deben ser revelados, el unico
responsable de ellos es usted
Atentamente Security IQEl S.A.

La investigación que solicitó, tardara aún en resolverse, los
resultados parciales los encontrara en el texto adjunto.
En 15 días le comunicaremos los resultados finales.
Atentamente Security IQEl S.A.

Attachment filenames:
OuijaTabler.hta
Psicofonia.hta
Informe2-p.hta
UserRegister.hta
InformeUFO.hta

The worm uses the registry entry HKCU\Software\Gedzac Labs to store 
information about successfully sent emails.

The worm creates the HTML file AngeldelMar.html in the Windows system 
folder and attempts to disable and delete several anti-virus related 
products and system tools such as regedit, sfc and msconfig.

The worm searches all folders on fixed and remote drives for files with 
the following extensions: HTML, HTM, HTA, PHP, ASP, SHTML, SHTM, PHTML, 
PHTM and SFC.

For each file found the word "Gaghiel" will be prepended to that file 
and the HTML VBScript component will be appended to the file. Any VBS or 
VBE files found on fixed or remote drives will be overwritten by the 
worm.

The Microsoft Outlook Express settings will be adjusted so that email is 
sent in HTML format using the infected file C:\Windows\Gaghiel.html as 
the stationery template. These changes will be made via the three 
entries Message Sent HTML, Compose Use Stationery and Stationery Name 
in the following registry entry:

HKCU\Identities\\Software\Microsoft\
Outlook Express\5.0\Mail

In order to spread via IRC VBS/Gaggle-B checks for an installation of 
the mIRC client and if found drops the file Mirc.chat into the 
installation folder and modifies the mirc.ini file to reference this 
file. The file Mirc.chat is detected as mIRC/Gaggle-B.

VBS/Gaggle-B might also display the error:
"Error 13
Esta Pagina Requiere Controles ActiveX para ser mostrada en su totalidad
Presione Actualizar y Acepte"

 
--- MultiMail/Win32 v0.43
* Origin: Try Our Web Based QWK: DOCSPLACE.ORG (1:123/140)
SEEN-BY: 633/267 270
@PATH: 123/140 500 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.