TIP: Click on subject to list as thread! ANSI
echo: virus_info
to: ALL
from: KURT WISMER
date: 2002-11-12 09:21:00
subject: News (fwd)

[cut-n-paste from sophos.com]

W32/Braid-A 
Aliases 
PE_BRID, W32/Braid{at}MM, I-worm.Bridex, Win32/Brid.A 
 
Type 
Win32 worm 
 
Detection 
Sophos has received several reports of this worm from the wild. 

Description 
W32/Braid-A is an internet worm which emails itself to every contact in 
the Microsoft Outlook address book. 

The worm attempts to exploit a MIME and an IFRAME vulnerability in some 
versions of Microsoft Outlook, Microsoft Outlook Express, and Internet 
Explorer. These vulnerabilities allow an executable attachment to run 
automatically, even if you do not double-click on the attachment. 
Microsoft has issued a patch which secures against these attacks. The 
patch can be downloaded from Microsoft Security Bulletin MS01-027. 
(This patch was released to fix a number of vulnerabilities in 
Microsoft's software, including the ones exploited by this worm.) 

When the worm is first run it copies itself to the Desktop as 
Explorer.exe, to the System folder as Regedit.exe and creates the 
registry entry 

HKCU\Software\Microsoft\Windows\CurrentVersion\Run\regedit = 
C:\WINDOWS\SYSTEM\regedit.exe 

so that this file is run automatically each time the computer is 
restarted. 

The worm drops W32/Flcss to the System folder as Bride.exe. Bride.exe 
is then launched whenever another executable is run. 



W32/Oror-Fam 
Aliases 
I-Worm.Roron, I-Worm.Roron.12, I-Worm.Roron.25, I-Worm.Roron.31, 
I-Worm.Roron.35, I-Worm.Roron.37, I-Worm.Roron.39 
 
Type 
Win32 worm 
 
Detection 
Note: At the time of writing Sophos has received no reports from users 
affected by these worms. However, we have issued this advisory 
following enquiries to our support department from customers. 
 
 
Description 
W32/Oror-Fam is a family of worms, all of which are very similar to 
W32/Oror-B. Like W32/Oror-B, these worms can spread in an number of 
ways, including sending themselves out by email, copying themselves to 
shared drives in networks, and placing copies of themselves in folders 
likely to be shared via the KaZaA peer-to-peer system.

When these worms first run on your computer, they pop up one of a 
number of fake error dialogs to disguise their operation. The first 
form of this dialog has the title "WinZip Self-Extractor License 
Confirmation" and the text "Your version of WinZip Self-Extractor is 
not licensed, or the license information is missing or corrupted. 
Please contact the program vendor or the web site (www.WinZip.com) for 
additional information". The second form of this dialog claims "The 
file expects a newer version of Windows. Upgrade your Windows version." 
The third form of the dialog states "Cannot open file: it does not 
appear to be a valid program. If you downloaded this file, try 
downloading file again".

Even though the worms claim that they have not run, they infect your 
computer under cover of these fake dialogs.

The W32/Oror family of worms create two data files in the Windows 
folder which contain information used by the worms while they are 
running. These data files have innocent-looking names, incorporating 
the first few letters of the computer name forwards and backwards. 
These files have normal-looking extensions, including .DEF, .VXD and 
.SYS. Example of the names of these data files on a computer named 
VICTIM might be:


 dosvictim32.vxd niwmitciv98.sys

If these files are removed whilst the worms are active, the worms 
immediately begin deleting all files on the computer. 

You can find additional details about the W32/Oror family of worms by 
looking at the analysis of W32/Oror-B.
 
 

W32/Oror-B 
Type 
Win32 worm 
 
Detection 
At the time of writing Sophos has received just one report of this worm 
from the wild. 

Description 
W32/Oror-B is a worm that can spread in an number of ways, including 
sending itself out by email, copying itself to shared drives in 
networks, and placing copies of itself in folders likely to be shared 
via the KaZaA peer-to-peer system.

(A number of variants of this worm are known. You can read about these 
by looking at W32/Oror-A and W32/Oror-Fam.)

When W32/Oror-B first runs on your computer, it pops up a fake error 
dialog with the title "WinZip Self-Extractor License Confirmation" and 
the text "Your version of WinZip Self-Extractor is not licensed, or the 
license information is missing or corrupted. Please contact the program 
vendor or the web site (www.WinZip.com)for additional information" 

Under cover of this fake dialog, W32/Oror-B infects your computer. The 
worm writes a varying number of copies of itself. These copies may be 
found in a number of different places, including:


the Windows folder (e.g. C:\WINDOWS)

the System folder (e.g. C:\WINDOWS\SYSTEM)

subfolders of the Program Files folder

folders associated with KaZaA file sharing

The worm runs the copy in your System folder every time you boot up by 
adding a run= line to the [windows] section of your WIN.INI file.

The worm runs the copy in your Windows folder every time you logon to 
the network (or to Windows) by adding an entry in your registry like 
this:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\
LoadSystemProfile = "wormname.exe powprof.dll, LoadCurrentUserProfile"

W32/Oror-B uses a random value for wormname above. This random name 
includes the start of your computer name written backwards, and ends 
in 16.exe, 32.exe or 98.exe.

W32/Oror-B sometimes adds additional values to the registry to run one
or more of the files it has placed in your Program Files folders. 
These values are added to:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run

W32/Oror-B sets the following value in your registry so that whenever 
you launch an EXE file, the worm runs first before launching the 
program you actually chose:

HKCR\exefile\shell\open\command wormname.exe "%1" %*

The worm uses misleading filenames when copying itself to shared 
folders, including:

Counter Strike 1.5 (Editor).exe
Div X 5.4 Bundle.exe
Download Accelerator 5.5.exe
Dreamweaver_5.0_Patch.exe
GTA 3 Bonus Cars(part1).exe
KaZaA Media Desktop v2.0.8.exe
Nero Burning Rom 5.6.0.3.exe
NFS 5 Bonus Cars.exe
Serials 2K 7.2 (by SNTeam).exe
Serials2002_8.0(17.08.02).exe
WinAmp_3.2_Cool.exe
WinZip 8.2.exe 

and filenames built from strings such as: 

ACDSee
cRedit_CarDs_gEn
DMX tHeMe 
EminemDesktop
Madonna Desktop 
MeGa HACK 
Zip Password Recovery 

During this process the worm creates autorun.inf files referencing the 
dropped EXE files. 

W32/Oror-B spreads via email. The worm selects the content of its 
emails randomly from an internal list. The subject line of the email 
can contain strings such as: 

Blondes Forever
Blondinkii
Microsoft Bulgaria
sent you a Yahoo! Greeting
Vajno
Virus Alert
WinAmp Team
Yahoo! Games
Yahoo! Toolbar 

The message text varies with the subject line chosen. W32/Oror-B 
attaches itself as one of the following files: 

[TNT]Gen.exe
Blondes.exe
Blondies.exe
IE_0274_bg.exe
IE_0276_Setup.exe
IE50_032_Setup.exe
Iguana1.0_skin.exe
Yahoo!Autumn.exe
Yahoo!Chess.exe
Yahoo!Tomcats.exe 
Yahoo!Toolbar.exe 

W32/Oror-B may send its attachments so that they attempt to exploit 
vulnerabilities in some versions of Microsoft Outlook, Microsoft 
Outlook Express, and Internet Explorer. These vulnerabilities allow an 
executable attachments to run automatically, even if you do not 
double-click on the attachment. Microsoft has issued patches which 
secure against these attacks. Be sure to download these patches from 
Microsoft if you have not done so already.

If you have mIRC installed, W32/Oror-B drops an IRC backdoor Trojan 
script into your mIRC folder. This backdoor Trojan is detected by 
Sophos Anti-Virus as mIRC/Oror-B.
 


Troj/Zasil-A 
Aliases 
Downloader-BN, Trojan.Zasil, TrojanClicker.Win32.Zasil, TROJ/Topmine.A 
 
Type 
Trojan 
 
Detection 
At the time of writing Sophos has received no reports from users 
affected by this Trojan. However, we have issued this advisory 
following enquiries to our support department from customers. 
 
 
Description 
Troj/Zasil-A creates and executes the file registry.exe in the Windows 
folder and then displays a pornographic JPG image. 

The file registry.exe creates the following registry entry, which 
starts registry.exe when Windows starts up: 

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Registry Services 

Each time registry.exe is executed the Trojan will attempt to download 
a text file from the internet that contains links to scripts that 
access pages from lists of website addresses contained in the scripts. 
The Trojan may also access a spyware script that reports the IP address 
being used by the active Trojan. 

Troj/Zasil-A leaves multiple copies of the dropped executable and the 
JPG file in the Windows Temp folder.

The JPG graphic is of a naked middle-aged blonde woman sitting on a 
table and advertises a pornographic website.
 



VBS/Likun-A 
Aliases 
VBS/Gichty.gen virus 
 
Type 
Visual Basic Script worm 
 
Detection 
At the time of writing Sophos has received no reports from users 
affected by this worm. However, we have issued this advisory following 
enquiries to our support department from customers. 

Description 
VBS/Likun-A copies itself to the Windows folder as win32dll.vbs and 
sets the following registry entry to run itself when Windows starts:

HKCU\Software\Microsoft\Windows\CurrentVersion\Run\WinLoader32

VBS/Likun-A then sets the following registry entry to cause Windows to 
shut down when it starts:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Kernel32 = 
c:\Windows\rundll32.exe user,exitwindows

VBS/Likun-A attempts to send itself to all entries in the Windows 
address book but contains a bug and so does not work successfully.

Finally VBS/Likun-A deletes all files with extension MP3 on all drives.
 
 


W32/Merkur-A 
Aliases 
W32/Mylka.A 
 
Type 
Win32 worm 
 
Detection 
At the time of writing Sophos has received no reports from users 
affected by this worm. However, we have issued this advisory following 
enquiries to our support department from customers. 

Description 
W32/Merkur-A arrives in an email with the following characteristics: 

Subject line: Update Your Anti-virus Software.
Message text: 
Here is a patch for your AV software, it will cover all the
latest out breaks of worms ect (worms as in virus not earth
worms! lol)
Attached file: AVupdate.exe. 

When executed W32/Merkur-A will create the following copies of itself:
C:\WINDOWS\taskman.exe
C:\AutoExec.exe
C:\Windows\System\AVupdate.exe
C:\Program Files\uninstall.exe
C:\Windows\Notepad.exe
C:\windows\screensaver.exe 

The following copies of the worm will be created if the respective 
folders already exist:
C:\program files\kazaa\my shared folder\IPspoofer.exe
C:\program files\kazaa\my shared folder\Virtual Sex Simulator.exe
C:\program files\bearshare\shared\IPspoofer.exe
C:\program files\bearshare\shared\Virtual Sex Simulator.exe
C:\program files\eDonkey2000\incoming\IPspoofer.exe
C:\program files\eDonkey2000\incoming\Virtual Sex Simulator.exe 

These copies of the worm enable the worm to spread over the KaZaA, 
Bearshare and eDonkey2000 peer-to-peer networks. 

The worm may create the following registry entry, which will point
to the file C:\Windows\System\AVupdate.exe and will run the worm when 
Windows starts up: 

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\AVupdate 

The file script.ini will be created in the folder C:\mIRC if that 
folder already exists. This mIRC script will attempt to send a copy of 
the worm to users who join the current channel. This script is 
detected by Sophos Anti-Virus as mIRC/Merkur-A. 

The file pr0n.bat will be created in the root folder. This batch file 
will delete all JPG, MPG, BMP and AVI files from the folders:
C:\Program Files\KaZaA\My Shared Folder\
C:\Program Files\bearshare\shared\
C:\Program Files\eDonkey2000\incoming\ 

This batch file is detected by Sophos Anti-Virus as Troj/Merkur-A.
 
 


W32/Opaserv-F 
Aliases 
Worm.Win32.Opasoft.a 
 
Type 
Win32 worm 
 
Detection 
Sophos has received several reports of this worm from the wild. 
 
 
Description 
W32/Opaserv-F is a variant of W32/Opaserv-A and is a worm that spreads 
via network shares. 

When executed the worm will create a file called marco!.scr in the 
Windows folder on the current drive. W32/Opaserv-F then adds the 
following registry entry to run itself when the system starts: 

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\cronos = 
\marco!.scr 

The worm attempts to copy itself to the Windows folder on networked 
computers with open shared drives. When the worm has successfully 
infected another computer it creates (locally) a file called gay.ini 
which is a copy of the win.ini file from the newly infected computer. 
The worm modifies this file to ensure the worm copy will be run on 
system start and then copies gay.ini back to win.ini on the newly 
infected computer. 

W32/Opaserv-F searches local IP addresses for open C: shares and 
attempts to copy itself to the Windows folder of the share. Once the 
local area network has been scanned the worm will start performing the 
same search on the internet starting at a randomly generated IP 
address. As a result anyone connected to the internet who has file 
sharing enabled and who enables NETBIOS over TCP/IP is potentially 
vulnerable to this worm. 

W32/Opaserv-F also attempts to connect to a website that is currently 
unavailable. This attempted connection is most likely intended as a 
means of updating the worm executable.
 
 

 

--- MultiMail/MS-DOS v0.27
* Origin: Try Our Web Based QWK: DOCSPLACE.ORG (1:123/140)
SEEN-BY: 24/903 120/544 123/140 500 400/300 490/33 633/104 260 262 267 270
SEEN-BY: 633/285 634/383 640/954 690/682 770/215 771/4020 774/605 2432/200
@PATH: 123/140 500 774/605 633/260 285

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.