TIP: Click on subject to list as thread! ANSI
echo: virus_info
to: ALL
from: KURT WISMER
date: 2003-08-08 20:40:00
subject: News

[cut-n-paste from sophos.com]

Troj/SView-A

Aliases
Worm.Win32.Randex.d, W32/Slanper.worm.gen, Win32/Slanper.B, 
Backdoor.Roxy, BKDR_SONE.A

Type
Trojan

Detection
At the time of writing Sophos has received just one report of this 
Trojan from the wild.

Description
Troj/SView-A is a backdoor Trojan which allows unauthorised remote 
access to the computer over a network.

The Trojan adds an entry to the registry at
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
to run itself on system restart.





W32/Lovgate-L

Type
Win32 worm

Detection
Sophos has received several reports of this worm from the wild.

Description
W32/Lovgate-L is functionally similar to W32/Lovgate-J except that this 
variant copies itself to the Windows system folder as WINEXE.EXE and 
changes the following registry entry so that WINEXE.EXE is run before 
an EXE file:

HKCR\exefile\shell\open\command

Please refer to W32/Lovgate-J for more information.





W32/Mimail-A

Aliases
W32.Mimail.A{at}mm WORM_MIMAIL_A

Type
Win32 worm

Detection
Sophos has received many reports of this worm from the wild.

Description
W32/Mimail-A is a worm that arrives with the following characteristics:

Subject line: your account 
Message text:
Hello there, I would like to inform you about important information
regarding your email address. This email address will be expiring.
Please read attachment for details.
---
Best regards, Administrator
Attached file: message.zip

W32/Mimail-A spoofs the From field of the sent emails using the email 
address admin{at}.

Inside the message.zip compressed file, is another file called 
message.html. If this file is opened, the worm will copy itself to

C:\\exe.tmp
and
C:\\videodrv.exe

The worm exploits a known security vulnerability. A patch has been 
available from Microsoft for some months which reportedly fixes the 
vulnerability.

W32/Mimail-A adds the following entry to the registry to run itself on 
system restart:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\VideoDriver
=C:\\videodrv.exe

The worm looks for email addresses in files on the local drive. It 
attempts to exclude the following extensions from its search:

    * AVI

    * BMP

    * CAB

    * COM

    * DLL

    * EXE

    * GIF

    * JPG

    * MP3

    * MPG

    * OCX

    * PDF

    * PSD

    * RAR

    * TIF

    * VXD

    * WAV

    * ZIP

It places the email addresses it finds in the file 
C:\\eml.tmp





Troj/Autoroot-A

Aliases
Exploit.Win32.Autorooter

Type
Trojan

Detection
At the time of writing Sophos has received no reports from users 
affected by this Trojan. However, we have issued this advisory 
following enquiries to our support department from customers.

Description
Troj/Autoroot-A attempts to exploit a security vulnerability in 
Microsoft's DCOM RPC interface to invoke the backdoor Trojan 
Troj/IRCBot-G and thus allow unauthorised remote access to the 
compromised computer.

Microsoft has issued a patch for the vulnerability exploited by this 
Trojan. The patch is available from 
http://www.microsoft.com/technet/security/bulletin/MS03-026.asp.






 
--- MultiMail/Win32 v0.43
* Origin: Try Our Web Based QWK: DOCSPLACE.ORG (1:123/140)
SEEN-BY: 633/267 270
@PATH: 123/140 500 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.