TIP: Click on subject to list as thread! ANSI
echo: virus_info
to: ALL
from: KURT WISMER
date: 2003-09-06 01:37:00
subject: News

[cut-n-paste from sophos.com]

W32/Neroma-A

Aliases
I-Worm.Nearby

Type
Win32 worm

Detection
At the time of writing Sophos has received no reports from users 
affected by this worm. However, we have issued this advisory following 
enquiries to our support department from customers.

Description
W32/Neroma-A is an internet worm which spreads by emailing itself to 
addresses in the Microsoft Outlook address list.

The worm copies itself to the Windows folder as NEROSYS.EXE and changes 
SYSTEM.INI to run itself on system restart.

Emails have the following characteristics-
Subject line: It's Near 911!
Message text: Nice butt baby!

The attached file bears the name of the executed file (likely to be 
NEROSYS.EXE).

W32/Neroma-A may delete several files within subfolders of the Windows 
folder on the 1st, 4th, 8th, 12th, 16th, 20th, 24th and 28th of every 
month.





W32/SobigF-Dam

Aliases
I-Worm.Sobig.f.dam, W32/Sobig.dam, WORM_SOBIG.F.DAM, W32.Sobig.F.Dam

Type
Junk

Detection
Sophos has received several reports of this virus from the wild.

Description
W32/SobigF-Dam is a damaged version of W32/Sobig-F.

This version does not work and any files can simply be deleted.





Troj/JSurf-A

Aliases
VBS/JunkSurf-A

Type
Trojan

Detection
Sophos has received several reports of this Trojan from the wild.

Description
Troj/JSurf-A arrives via an HTML email exploiting a vulnerability fixed 
in the Cumulative Patch of Internet Explorer (MS03-032).

The email contains a Object Data tag that runs a VBS script on a remote 
site. The script drops an EXE in the C:\ drive as DRG.EXE. This 
component of Troj/JSurf-A connects to a remote website, downloads a DLL 
to C:\Program Files\win32.dll and then runs regsvr32.exe to register it 
on the system.

The Trojan relies upon a vulnerability in Microsoft's software. 
Microsoft issued a patch which reportedly fixes the problem in August 
2003. The patch can be found at 
www.microsoft.com/technet/security/bulletin/MS03-032.asp.





XM97/Phone-B

Aliases
Macro.Excel97.Phoneman.b, X97M.Phoneman, X97M_PHONEMAN.A

Type
Excel 97 macro virus

Detection
At the time of writing Sophos has received just one report of this 
virus from the wild.

Description
XM97/Phone-B is a variant of XM97/Phone-A that has been modified to 
contain extra junk routines.





W32/Quaters-A

Aliases
W32.Blare{at}MM, I-Worm.Blare, W32/Blurt{at}MM

Type
Win32 worm

Detection
At the time of writing Sophos has received just one report of this worm 
from the wild.

Description
W32/Quaters-A is an internet worm which spreads by emailing itself to 
all addresses in the Microsoft Outlook address list and via IRC 
channels.

The worm attempts to copy itself to C:\PROGRA~1\ACCOUNT_DETAILS.DOC.EXE 
and adds the following entry to the registry to run itself on system 
restart:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\
Windows Task Manager = C:\PROGRA~1\ACCOUNT_DETAILS.DOC.EXE

Emails have the following characteristics-

Subject line: absent or randomly chosen from the following:
Your Account Infomation.
Your Account is on hold.
Your Account has been suspended.
Account Infomation.
Account Invoice.
Email Account Infomation.
This quaters invoice.
Account Billing Information.
YOUR ACCOUNT REF: 
Account,  is on hold.
ORDER CONFIRMATION: 

Message text: absent or constructed from the following:
Dear Sir,

Please can you check that your account information is up to date.
Your details are attached to this email.
Please can you confirm that your account information is correct.
Your current details are attached to this email.
Please find attached this quaters invoice for your Internet Account.

Regards, Billing Team.
Regards, Support Team.

Attached file: can have any name but may be one of the following:
Your Account.Doc.EXE
Account Details.Doc.EXE
Your Account Info.Doc.EXE
Account Information.Doc.EXE
Billing Information.Doc.EXE
Invoice.Doc.EXE
Account Update.Doc.EXE
Account Status.Doc.EXE
Your Account Status.Doc.EXE

The worm overwrites SCRIPT.INI so that it sends a copy of the worm over 
IRC channels as a file called CHAIN_MAIL_WORLD_RECORD.IRC along with 
the message "Hey, Do you want to take part of the iRC chain mail world 
record? If so all you have to do is load up the program add your irc 
nick and press submit! Just rename the file from .irc to .exe and your 
ready to go!"

W32/Quaters-A creates the file C:\WIN32.SORT.IT.OUT.BLAIR.TXT which 
contains the text "Infected by the WIN32.SORT-IT-OUT-BLAIR Virus!" and 
proceeds to overwrite several script files within C:\inetpub\wwwroot 
(e.g. default.html) with this file.

W32/Quaters-A will attempt a denial-of-service attack on 
www.number-10.gov.uk on the 11th of any month, and may display the 
message

"INFECTED BY: WIN32.SORT-IT-OUT-BLAIR

Dear Tony Blair,
Why are you spending all our taxes on illegal immigrants!?!
How about you stop worrying about other countries and worry about 
ours???
Stop spending money on immigrants and spend it on things like OAP's who 
fought to keep this country free but are now getting treated worst than 
illegal immigrants!
How about spend a little money on the NHS or the education system!?!
Think about it Mr Blair.
Your career depends on it.

We've had enough."

Finally, W32/Quaters-A attempts to terminate several processes related 
to anti-virus and security software, e.g. SWEEP95.EXE, SWNETSUP.EXE, 
ZONEALARM.EXE, ANTI-TROJAN.EXE





W32/Cailont-B

Aliases
W32.Nolor.B{at}mm

Type
Win32 worm

Detection
At the time of writing Sophos has received just one report of this worm 
from the wild.

Description
W32/Cailont-B is an email aware worm.

The subject line, message text and attachment filename of the email are 
produced by concatenating several randomly chosen phrases.

The email contains an HTML component which itself contains a Visual 
Basic Script which drops and runs W32/Cailont-B.

When run W32/Cailont-B copies itself to various folders on the system 
which may include:

C:\Program Files\Microsoft Office\Office\startup
C:\Windows\System\viewers
C:\Windows\All Users\Start Menu\Programs\Startip
C:\Windows\Start Menu\Programs\StartUp
C:\Windows\System

W32/Cailont-B will also drop the Visual Basic Script version of itself 
in one or more files with a DAT extension. These files are detected as 
VBS/Cailont-A.





W32/Blaster-F

Aliases
Worm.Win32.Lovesan, W32.Blaster.Worm, WORM_MSBLAST, Worm/Lovsan

Type
Win32 worm

Detection
At the time of writing Sophos has received no reports from users 
affected by this worm. However, we have issued this advisory following 
enquiries to our support department from customers.

Description
W32/Blaster-F is functionally equivalent to W32/Blaster-A, except for 
the following changes:


    * The worm filename used is enbiei.exe
    * The registry entry used has been changed to
      HKLM\Software\Microsoft\Windows\CurrentVersion\Run\www.hidro.4t.com
    * The target for the distributed denial-of-service attack has been 
changed to tuiasi.ro
    * The internal message has been changed to the following text in 
Romanian:
      "Nu datzi la fuckultatea de Hidrotehnica!!! Pierdetzi timp ul 
degeaba...Birsan te cheama pensia!!!Ma pis pe diploma!!!!!!"

      In English this translates to:

      "Don't go to the Hydrotechnics faculty!!! You are wasting your 
time... Birsan, your pension awaits!!! I urinate on the diploma!!!!!!"

In early September 2003, a 24-year-old Romanian was reported by the 
media to have been arrested in connection with the W32/Blaster-F worm. 
However, the Romanian police later denied this.





W32/Lovgate-P

Type
Win32 worm

Detection
At the time of writing Sophos has received just one report of this worm 
from the wild.

Description
W32/Lovgate-P is a version of W32/Lovgate-L which has been infected 
with W32/Parite-A and then packed with a compression tool.

W32/Lovgate-P is functionally identical to W32/Lovgate-L. The 
W32/Parite-A infection is neutralised by the compression.

When the worm is run the W32/Parite-A component will generate a Windows 
error similar to:

The application or DLL  is not a valid Windows image. Please 
check against your installation diskette.

The exact error message displayed will vary slightly depending on the 
version of Microsoft Windows.





W32/Raleka-B

Aliases
W32.HLLW.Raleka, Win32/Raleka.A, Worm.Win32.Raleka.b

Type
Win32 worm

Detection
Sophos has received several reports of this worm from the wild.

Description
W32/Raleka-B is a network worm which uses the Microsoft DCOM RPC 
vulnerability to propagate across a network.

The worm will attempt to connect to vulnerable computers and upload and 
execute the following files:
svchost.exe, ntrootkit.exe, ntrootkit.reg and service.exe

Svchost.exe is a copy of the worm itself.
Ntrootkit.exe is a copy of the backdoor Trojan Troj/RtKit-11.
Ntrootkit.reg is a file used to run Troj/RtKit-11 on Windows XP systems.
Service.exe is a legitimate utility.

The worm will attempt to download and install the Microsoft patch for 
the DCOM RPC vulnerability.

W32/Raleka-B includes backdoor functionality. The worm will attempt to 
contact IRC servers and await instructions from a remote attacker.

Microsoft has issued a patch for the vulnerability exploited by this 
worm. The patch is available from 
www.microsoft.com/technet/security/bulletin/MS03-026.asp.





W32/Nugosh-A

Aliases
Win32/Dumaru.C, W32.Dumaru.B{at}mm

Type
Win32 worm

Detection
At the time of writing Sophos has received just one report of this worm 
from the wild.

Description
W32/Nugosh-A is a mass mailing worm that spreads to email addresses 
found in files on the local hard drive. The message sent has the 
following characteristics:

Subject line: Use this patch immediately !
Attached File: patch.exe
From: "Microsoft" 
Message text: Dear friend , use this Internet Explorer patch now!
There are dangerous virus in the Internet now!
More than 500.000 already infected!

W32/Nugosh-A copies itself as dllreg.exe to the Windows folder, as 
load32.exe and vxdmgr.exe to the Windows system folder, and as 
rundllw.exe to the StartUp folder.

The worm creates the following registry key to run itself on system 
start:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\load32

The worm also changes the run parameter in the [Windows] section of 
win.ini and the shell parameter in the [Boot] section of system.ini.

W32/Nugosh-A drops a keylogging component as guid32.dll, an IRC-based 
distributed denial-of-service Trojan as windrive.exe and a hacked 
utility to export Outlook Express and Internet Explorer passwords as 
winimg.exe, all to the Windows system folder. These are all detected as 
W32/Nugosh-A.

The worm will kill off the following processes if they are running:
AGENTSVR.EXE
ANTS.EXE
APLICA32.EXE
APVXDWIN.EXE
ATCON.EXE
ATUPDATER.EXE
ATWATCH.EXE
AVSYNMGR.EXE
BLACKD.EXE
BLACKICE.EXE
CFIADMIN.EXE
CFIAUDIT.EXE
CFINET.EXE
CFINET32.EXE
DEFWATCH.EXE
DRWATSON.EXE
FAST.EXE
FRW.EXE
GUARD.EXE
IAMAPP.EXE
IAMSERV.EXE
ICLOAD95.EXE
ICLOADNT.EXE
ICMON.EXE
ICSUPP95.EXE
ICSUPPNT.EXE
LOCKDOWN.EXE
LOCKDOWN2000.EXE
LUALL.EXE
LUCOMSERVER.EXE
MCAGENT.EXE
MCUPDATE.EXE
MGUI.EXE
MINILOG.EXE
MOOLIVE.EXE
MSCONFIG.EXE
MSSMMC32.EXE
NDD32.EXE
NETSTAT.EXE
NISSERV.EXE
NISUM.EXE
NMAIN.EXE
NPROTECT.EXE
NSCHED32.EXE
NVARCH16.EXE
PAVPROXY.EXE
PCCIOMON.EXE
PCFWALLICON.EXE
PERSFW.EXE
POPROXY.EXE
PVIEW95.EXE
REGEDIT.EXE
RTVSCN95.EXE
SAFEWEB.EXE
SPHINX.EXE
SPYXX.EXE
SS3EDIT.EXE
SYSEDIT.EXE
TAUMON.EXE
TC.EXE
TCA.EXE
TCM.EXE
TDS2-98.EXE
TDS2-NT.EXE
TDS-3.EXE
UPDATE.EXE
VPC42.EXE
VPTRAY.EXE
VSECOMR.EXE
VSHWIN32.EXE
VSMAIN.EXE
VSMON.EXE
VSSTAT.EXE
WATCHDOG.EXE
WEBSCANX.EXE
WGFE95.EXE
WRADMIN.EXE
WRCTRL.EXE
WRCTRL.EXE
ZAPRO.EXE
ZATUTOR.EXE
ZAUINST.EXE
ZONEALARM.EXE





W32/Blaster-E

Aliases
Worm.Win32.Lovesan, W32.Blaster.Worm, WORM_MSBLAST.GEN

Type
Win32 worm

Detection
At the time of writing Sophos has received just one report of this worm 
from the wild.

Description
W32/Blaster-E is functionally equivalent to W32/Blaster-A, except for 
the following changes:


    * The registry entry used has been changed to
      HKLM\Software\Microsoft\Windows\CurrentVersion\
      Run\Windows Automation
    * The target for the Distributed Denial-of-Service attack has been 
changed to kimble.org
    * The internal message has been changed to
      "I dedicate this particular strain to me ANG3L -
      hope yer enjoying yerself and dont forget the
      promise for me B/DAY !!!!."






W32/Tzet-A

Type
Win32 worm

Detection
At the time of writing Sophos has received just one report of this worm 
from the wild.

Description
W32/Tzet-A is a network worm. When run the worm creates the following 
files in the folder C:\\System32:

AUTHEXEC.BAT
A batch file used by the worm and detected by this identity

IGLMTRAY.EXE
A Trojan detected by Sophos Anti-Virus as Troj/Flood-DP

IGLXTRAY.EXE
A Trojan detected by Sophos Anti-Virus as Troj/Flood-DP

LRSS.INI
A mIRC configuration file used by the worm

MDDE32.EXE
A clean utility for terminating processes

NNA.EXE
A Trojan downloaded by W32/Tzet-A. Nna.exe is detected by Sophos 
Anti-Virus as Troj/Apher-H.

PRINTF_CORE.EXE
A Trojan detected by Sophos Anti-Virus as Troj/Delsha-C

VIDRIV.EXE
A clean utility to hide/show windows

WMPT.EXE
A clean utility called PSExec

WSUBSYS.WAV
The main component of the worm

XCOPY.DLL
A text file containing a list of IP domains

The worm adds the following registry entry to run the file iglmtray.exe 
when Windows starts up:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\WUPD

W32/Tzet-A searches the local network for computers with weak or no 
passwords on the administrator or admin accounts to which it can copy 
itself.






 
--- MultiMail/Win32 v0.43
* Origin: Try Our Web Based QWK: DOCSPLACE.ORG (1:123/140)
SEEN-BY: 633/267 270
@PATH: 123/140 500 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.