TIP: Click on subject to list as thread! ANSI
echo: dirty_dozen
to: ALL
from: KURT WISMER
date: 2003-03-21 21:05:00
subject: News

[cut-n-paste from sophos.com]

W32/Ganda-A

Type 
Win32 worm 

Detection
At the time of writing Sophos has received just one report of this worm 
from the wild.

Description
W32/Ganda-A is a worm which spreads by sending itself to email 
addresses collected from EML, HTM*, DBX and WAB files on your computer.

W32/Ganda-A creates two copies of itself in your Windows folder. One 
copy is named scandisk.exe; the other is an EXE file with a name 
consisting of eight randomly-chosen lower-case letters.

W32/Ganda-A sets the following registry entry so that it loads 
automatically every time your computer is started:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ScanDisk =
\scandisk.exe

Whilst sending emails, the worm makes an additional copy of itself in 
your Windows folder under the name tmpworm.exe.

W32/Ganda-A scans through RAM, looking for applications which have any 
of the following text strings in memory: virus, firewall, f-secure, 
symantec, mcafee, pc-cillin, trend micro, kaspersky, sophos, norton. 
Processes containing any of the offending strings are terminated. 
Clearly, this is intended to kill off a range of popular security 
products. But it can cause collateral damage: for example, if you have 
a Word document open containing any of the above strings, the worm will 
shut down Word without giving you a chance to save any changes.

W32/Ganda-A infects EXE and SCR files on your hard disk by inserting a 
small loader program which tries to launch a copy of the worm from your 
Windows folder when you close the infected application. Files which are 
modified in this way rely on the original randomly-named worm file 
being present. If you delete the worm files from your Windows folder 
then you will immediately make any modified EXE files uninfectious.

The worm can send emails with several subject line and message text 
combinations, both in English and Swedish.

The English emails can have the following characteristics:

Subject line: Screensaver advice.
Message text: Do you think this screensaver could be considered 
illegal? Would appreciate if you or any one of your friends could check 
it out and answer as soon as humanly possible.

Subject line: Spy pics.
Message text:Here's the screensaver i told you about. It contains 
pictures taken by one of the US spy satellites during one of it's 
missions over iraq. If you want more of these pic's you know where you
can find me. Bye!

Subject line: GO USA !!!!
Message text: This screensaver animates the star spangled banner. 
Please support the US administration in their fight against terror. 
Thanx a lot!

Subject line: G.W Bush animation.
Message text: Here's the animation that the FBI wants to stop. Seems 
like the feds are trying to put an end to peoples right to say what 
they think of the US administration. Have fun!

Subject line: Is USA a UFO?
Message text: Have a look at this screensaver, and then tell me that 
George.W Bush is not an alien. ;-)

Subject line: Is USA always number one?
Message text: Some misguided people actually believe that an american 
life has a greater value than those of other nationalities. Just have 
a look at this pathetic screensaver and then you'll know what i'm 
talking about. All the best.

Subject line: LINUX.
Message text: Are you a windows user who is curious about the linux 
environment? This screensaver gives you a preview of the KDE and GNOME 
desktops. What's more, LINUX is a free system, meaning anyone can 
download it.

Subject line: Nazi propaganda?
Message text: This screensaver has been banned in Germany. It contains 
a number of animated symbols that can be related to the nazi culture. 
What do you think, is it a legitimate ban or not? Please answer asap. 
Thanx!

Subject line: Catlover.
Message text: If you like cats you'll love this screensaver. It's four 
animated kittens running around on the screen. Contact me for more 
clipart. Have fun! ;-)

Subject line: Disgusting propaganda.
Message text: Hello! My 12 year old doughter received this screensaver 
on a CDROM that was sent to her through advertising. I find it 
disturbing that children are now being targets of nazi organizations. 
I would appreciate to hear from you on this matter, as soon as 
possible. Thank you.

In all of these cases the attached file has a random 2-character name 
and an SCR extension (e.g. oc.scr).

The worm also creates entries in the following registry keys:

HKLM\Software\SS\Sent
HKLM\Software\SS\Sent2

W32/Ganda-A sends a rambling diatribe complaining about the Swedish 
education system to a small set of email addresses apparently 
belonging to Swedish journalists. These emails do not contain the worm 
as an attachment.

W32/Ganda-A contains the text:
[WORM.SWEDENSUX] Coded by Uncle Roger in Hõrnsand, Sweden, 03.03. I am 
being discriminated by the swedish schoolsystem. This is a response to 
eight long years of discrimination.




W32/Cult-A

Aliases 
W32.Cult, I-Worm.Cult, W32.HLLW.Cult{at}mm 

Type 
Win32 worm 

Detection
At the time of writing Sophos has received no reports from users 
affected by this worm. However, we have issued this advisory following 
enquiries to our support department from customers.

Description
W32/Cult-A is a worm and backdoor Trojan.

W32/Cult-A spreads via file sharing on KaZaA networks and by emailing 
itself to random email addresses. The email will have the following 
characteristics:

Subject line: Hi, I sent you an eCard from BlueMountain.com
Message text: To view your eCard, open the attachment If you have any 
comments or questions, please visit 
http://www.bluemountain.com/customer/index.pd
Attached file: BlueMountaineCard.pif

When first run, the worm displays a false error message with the text
"The instruction at 0x776456de referenced memory at 0x6235525g3. The 
memory could not be read Click on OK to terminate the application", 
copies itself to the Windows System folder as winupdate.exe and 
creates the following registry entry so that winupdate.exe is run 
automatically each time Windows is started:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft auto update
= winupdate.exe

The worm creates the folder %System%\Kazaa\, copies itself to this 
folder as DivX 5.03 Codecs.exe, Download accelarator.exe, PaintShop 
Pro 7 Crack_By_Force.exe, SMS_sender.exe and ZoneAlarm Pro KeyGen.exe 
and creates the following registry entry so that the %System%\Kazaa\ 
folder is shareable on Kazaa networks:

HKCU\Software\Kazaa\LocalContent\Dir0 = 012345:C:\WINDOWS\SYSTEM\kazaa\

W32/Cult-A allows a remote intruder to access and control the computer 
via IRC channels.

When run, W32/Cult-A tries to connect to a remote IRC server and join a 
specific channel. W32/Cult-A then runs in the background as a server 
process, listening for commands to execute.

The worm also creates several registry entries under
HKLM\Software\Microsoft\WDXDriver to store encrypted IRC server 
addresses.





W32/Deborm-R

Aliases 
MultiDropper-FL, Worm.Win32.Deborm.r, Win32/Nebiwo.B, W32.HLLW.Nebiwo 

Type 
Win32 worm 

Detection
At the time of writing Sophos has received just one report of this 
worm from the wild.

Description
W32/Deborm-R is a network worm which carries and installs Trojans. 
When run, the worm searches for shares named C or C$ on the local IP 
subnet that have no password. If a share is found the worm will attempt 
to copy itself to one of the following folders in the share:

Windows\Start Menu\Programs\Startup
Documents and Settings\All Users\Start Menu\Programs\Startup
Winnt\Profiles\All Users\Start Menu\Programs\Startup

W32/Deborm-R will attempt to install the Trojans Troj/Litmus-203, 
Troj/Sdbot-Fam and Troj/KillAV-Q.

The worm also adds the following registry entry, containing the name of 
the worm file so that it is run each time Windows is started:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\NAV Live Update





W32/Oror-T

Aliases 
I-Worm/Roron.51, W32/Oror.gen.a{at}MM 

Type 
Win32 worm 

Detection
At the time of writing Sophos has received just one report of this 
worm from the wild.

Description
W32/Oror-T is a variant of the W32/Oror family of internet worms. 
Please refer to the description of W32/Oror-R for more detail.





W32/Bibrog-B

Aliases 
W32/BIBROG.C{at}MM, I-Worm.Academia 

Type 
Win32 worm 

Detection
At the time of writing Sophos has received just one report of this 
worm from the wild.

Description
W32/Bibrog-B arrives in an email with the following characteristics:

Subject line: Fwd:La Academia Azteca
Message text: La cacademia azteca (muy bueno) no es virus!
Attached file: academia.exe

When the worm is first executed a game is activated for the user to 
play.

La Cacademia, Tienes 18 balas Score: 0

At the same time the worm is copied to
C:\\manzana.exe,
C:\\academia.exe,
C:\\itch.exe and
C:\\itcj.exe

When Windows next starts up the worm will be activated, causing it to 
email contacts in the victim's Outlook address book.

W32/Bibrog-B drops two BMP files, osiris.bmp and quiettime.bmp. The two 
files are alternately used as the backdrop for the Windows Desktop 
each time Windows starts up.

Windows Desktop backdrop

Windows Desktop backdrop

W32/Bibrog-B attempts to create copies of the worm in the shared 
folders of the KaZaA, Grokster and Morpheus peer-to-peer applications. 
The same files will also be copied to the shared folder of the ICQ 
messaging application.

The following five HTM files are dropped to the My Documents folder:
acafug.htm
citibank.htm
hotmail.htm
msn.htm
yahoo.htm

The latter four of these HTM files are faked versions of genuine 
internet pages that contain a form for login into a service. 
Information entered into the login form of any of these fake pages 
will cause the details to be sent to the attacker.

The worm monitors the address window of Internet Explorer and if 
certain addresses are found then one of the above files will be 
substituted in place of the real address. The following substitutions 
will occur:

http://hotmail.passport.com to \hotmail.htm
http://mail.yahoo.com to \yahoo.htm
http://www.citibank.com/us/cards/ to \citibank.htm
http://www.fbi.gov to \acafug.htm
http://login.passport.net to \msn.net
http://loginnet.passport.net to \hotmail.htm

Additionally the following substitution will occur however the 
substitute address appears to be no longer available:

http://send.greetings.yahoo.com to http://www.cjd.itesm.mx





W32/Nicehello-A

Aliases 
I-Worm.Nicehello, Win32/NiceDay.A, W32.Nicehello{at}mm 

Type 
Win32 worm 

Detection
At the time of writing Sophos has received no reports from users 
affected by this worm. However, we have issued this advisory following 
enquiries to our support department from customers.

Description
W32/Nicehello-A is a worm that arrives in an email with one of the 
following sets of characteristics:

Subject line: Codigo fuente
Message text: Hola, te mando el codigo fuente que te prometi, esta 
comprimido; ya sabes esto es solo para vos!!. Saludos
Attached file: condigo.exe

Subject line: Mis primeras animaciones
Message text: Te mando la primera animacion en flash sobre nuestros 
amigos; espero tus comentarios, recuerda que es solo para vos
Attached file: animacion.exe

Subject line: parche
Message text: El parche del programa que me pediste. Cualquier cosa 
estoy para ayudarte. recuerda que es solo para vos
Attached file: parche.exe

Subject line: Actualizacion de programa
Message text: Recien puedo enviarte la actualizacion, es que tuve mucho 
trabajo, recuerda que es solo para vos
Attached file: actualizacion.exe

Subject line: Datos ultimo trimistre
Message text: Los datos del ultimo trimestre esta en el archivo 
adjunto, estan comprimidos, recuerda que es solo para vos
Attached file: datos.exe

Subject line: Presentaciones PowerPoint
Message text: Las presentaciones en power point que tenia que
mandarte, estan comprimidas en el archivo adjunto, recuerda que es 
solo para vos
Attached file: presentaciones.exe

Subject line: ahora el juego va a funcionar
Message text: El parche para el juego que mas te gusta, esta 
comprimido, recuerda que es solo para vos
Attached file: parchejuego.exe

Subject line: Fotos ultima fiesta
Message text: Hola, como estas, te mando las fotos de la ultima fiesta, 
por cierto tienes una cara!!!. , recuerda que es solo para vos. bye
Attached file: fotos.exe

Subject line: Video de la ultima reunion de amigos, recuerda que es 
solo para vos
Message text: Hola, te mando el video de la ultima fiesta, no se ve 
muy bien pero algo es algo, recuerda que es solo para vos
Attached file: video.exe

Subject line: Animaciones en flash de nuestros politicos
Message text: Mira las animaciones sobre la clase politica del pais, 
recuerda que es solo para vos
Attached file: politicos.exe

When the worm is first run a copy is intended to be created in the 
folder C:\Windows\system or C:\winnt\system32 with the filename 
sys64dvr.exe. A bug will cause the worm to be copied to 
C:\Windows\systemsys64dvr.exe or C:\winnt\system32sys64dvr instead.

The following registry entry will be created to run the worm when 
Windows starts up:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\
System 64 Driver for Games = sys64dvr.exe

Since the worm is not copied to the correct location the worm will not 
be run when Windows starts up.

W32/Nicehello-A sends an email to the attacker with details of the 
victim's MSN account.

W32/Nicehello-A displays a message box containing the text "Microsoft 
Windows XP or greater required!"





W32/Yaha-R

Type 
Win32 worm 

Detection
At the time of writing Sophos has received just one report of this 
worm from the wild.

Description
W32/Yaha-R is a worm from the Yaha family.

W32/Yaha-R shares many of the characteristics of W32/Yaha-Q.

However, W32/Yaha-R stores itself on your hard disk under different 
file names to those used by the -Q variant. W32/Yaha-R places the files 
wintask32.exe and exeloader.exe into your system folder. (The -Q 
variant uses the names mstask32.exe and exeloader.exe.)





W32/Lovgate-A

Aliases 
WORM_LOVGATE.A 

Type 
Win32 worm 

Detection
Sophos has received several reports of this worm from the wild.

Description
W32/Lovgate-A is a worm and backdoor Trojan. The worm spreads across 
the local network by copying itself into folders with the following 
names:

billgt.exe
Card.EXE
docs.exe
fun.exe
hamster.exe
humor.exe
images.exe
joke.exe
midsong.exe
news_doc.exe
pics.exe
PsPGame.exe
s3msong.exe
searchURL.exe
SETUP.EXE
tamagotxi.exe

W32/Lovgate-A also attempts to spread via email by sending itself to 
email addresses collected from *.ht* files. Emails sent to these 
addresses will have the following characteristics:

Subject: Documents
Message body: Send me your comments...
Attached file: Docs.exe

Subject: Roms
Message body: Test this ROM! IT ROCKS!.
Attached file: Roms.exe

Subject: Pr0n!
Message body: Adult content!!! Use with parental advisory.
Attached file: Sex.exe

Subject: Evaluation copy
Message body: Test it 30 days for free.
Attached file: Setup.exe

Subject: Help
Message body: I'm going crazy... please try to find the bug!
Attached file: Source.exe

Subject: Beta
Message body: Send reply if you want to be official beta tester.
Attached file: _SetupB.exe

Subject: Do not release
Message body: This is the pack ;)
Attached file: Pack.exe

Subject: Last Update
Message body: This is the last cumulative update.
Attached file: LUPdate.exe

Subject: The patch
Message body: I think all will work fine.
Attached file: Patch.exe

Subject: Cracks!
Message body: Check our list and mail your requests!
Attached file: CrkList.exe

The worm also attempts to reply to emails found in the user's inbox.
The worm uses the following attachment names for these emails:

billgt.exe
Card.EXE
docs.exe
fun.exe
hamster.exe
humor.exe
images.exe
joke.exe
midsong.exe
news_doc.exe
pics.exe
PsPGame.exe
s3msong.exe
searchURL.exe
SETUP.EXE
tamagotxi.exe

W32/Lovgate-A copies itself into the Windows system folder as 
rpcsrv.exe, syshelp.exe, WinGate.exe, winrpc.exe and WinRpcsrv.exe and 
sets the following registry entries:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Module Call 
initialize = "RUNDLL32.EXE reg.dll ondll_reg"

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\syshelp
= "\syshelp.exe"

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\WinGate initialize = 
"\WinGate.exe -remoteshell"

HKLM\Software\CLASSES\txtfile\shell\open\command = "winrpc.exe %1"

On Windows NT the worm drops the files ily.dll, task.dll, reg.dll and 
win32vxd.dll into the Windows system folder. These files are also 
detected as W32/Lovgate-A.

W32/Lovgate-A is also a backdoor Trojan that provides an attacker with 
unauthorized access to the user's computer and can send notification 
email messages to the attacker.





W32/Yaha-Q

Aliases 
W32.Yaha.P{at}mm, I-Worm.Lentin.n 

Type
Win32 worm 

Detection
Sophos has received several reports of this worm from the wild.

Description
W32/Yaha-Q is a worm that most commonly arrives in an email, but may 
also find its way on to a computer via network shared drives.

The email that the worm arrives in can have any one of a very large 
selection of subject lines and message texts. The email may also be
spoofed meaning, that it may not necessarily have arrived from the 
sender listed in the "From" field of the user's email client.

W32/Yaha-Q copies itself to the files exeloader.exe and mstask32.exe 
in the Windows system folder.

The following registry entries will be created to start the worm when 
Windows starts up:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\
MicrosoftServiceManager = \mstask32.exe
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices\
MicrosoftServiceManager = \mstask32.exe

The registry entry HKCR\exefile\shell\open\command will be updated so 
that the copy of the worm exeloader.exe is run whenever an EXE file is 
executed.

W32/Yaha-Q contains a long list of anti-virus, windows management and 
security applications whose processes are terminated if they are found 
to be running. The worm will also terminate any process that have an 
associated window with the any of the following titles:
Windows Task Manager
System Configuration Utility
Registry Editor
Process Viewer

HKLM\Software\Microsoft\Windows\CurrentVersion\ZoneCheck will be set to 
any of the following web sites:
pakistan.gov.pk
paki.com
pcb.gov.pk
comsats.com
kse.com.pk

The registry entry HKLM\Software\Microsoft\Snakes will be created and 
will contain the values Author, Comments, Version and Web.

W32/Yaha-Q will carry out the following four operations when executed 
on a Wednesday:

1) Modify the Internet Explorer start page via the registry entry
HKU\Software\Microsoft\Internet Explorer\Main\Start Page. The new start 
page will be http://www.indiansnakes.cjb.net.

2) Append a link to the web site http://www.indiansnakes.cjb.net to all 
HTM and HTML files found in the folder inetpub/wwwroot/.

3) Spread to network shares.

4) Create a randomly named text file in the Windows folder containing 
any one of the following five blocks of text:

iNDiAn snAKeS pReSAnTs : W32/yAHA 2.00 ...

"=================================================
iNDiAn snAKeS pReSAnTs : W32/yAHA 2.00
wE aRe tHe gREaT inDIaNs
------------------------
sNAkE p0iSoN wiLL fUCk pAKIs
n0w wE aRe a tEAm..
bEWarE oF tHe p0iSoN oF tHe snAKeS..

bACK oFF paKI hAckERs,uR dAyS aRe oVeR..
pAkIsTaN's IT fUtuRe iS iN uR hANd..
U sToP..wE sToP..

u sTarTeD.. wE fInIshED...
=================================================

bY R0xx,c0bra,dEviL inCArNatE
visIT uS : http://indiansnakes.cjb.net"


"=================================================
iNDiAn snAKeS pReSAnTs : W32/yAHA 2.00
wE aRe tHe gREaT inDIaNs
---------------------------
thiS iS juST thE begiNNinG..
s00000 mUcH t0 c0mE..
n0 moRe pAK shiT wiLL be toleRATeD..
tiME f0r somE payBACK..

thERe iS nothING likE teAM w0rk..

iNDiAN snAKeS wiTH hARD p0iSoN..
wE wiLL bE BACk....
=================================================
 iNDiAn snAKeS 
* c0Bra
* R0xx
* kiNG c0Bra
* snaKeEyEs
* dEViL inCARnATe

http://indiansnakes.cjb.net"


"=================================================
iNDiAn snAKeS pReSAnTs : W32/yAHA 2.00
wE aRe tHe gREaT inDIaNs
-------------------------
iNdIaN IT exPeRTs.. aRe u bUSy eArNiNg m0nEy ???
d0 s0mEthInG f0r uR c0untRY yaaaaar...
c0mE aNd w0rK wIth uS..

bUt hEy wE aInT aNy IT eXpeRTs.. wHy ???
bEcAuSE wE d0nT hAvE ceRtiFicAtEs wHiCh u hAvE b0ugHt..

aLL wE aRe... wE aRe tHe gReAt iNdiAnS
d0 u tHinK wE aRe g00d..
tHeN d0 a faVouR f0R uS.. juSt rEspEcT uS..
aND exPLaiN t0 uS.. whY u R n0t rEtaLiaTinG t0 pAkI hAckErS..

n0 0thEr sHiTs nEEdEd..
----------------------------------------------------------
R0xx 
c0bra 
dEviL inCaRnaTE 
==================================================
http://www.indiansnakes.cjb.net"


"========================================================
iNDiAn snAKeS pReSAnTs : W32/yAHA 2.00
wE aRe tHe gREaT inDIaNs
------------------------
to gigabyte :: chEErS pAL, kEEp uP tHe g00d w0rK..buT W32.HLLP.YahaSux 
is.. lolz ;)

to Mr Roger Thompson ::
| [technical director of malicious code research for TruSecure Corp]
| --------------------------------------------------------------
| wE arE n0t p0litiCaLy m0tiVatEd sIr...
| wE aRe jUsT rEtaLiaTinG t0 pAkI hAckErS aNd tHeiR sHiT hAcktIviSm..
| hahha Yaha.K suCCessfuLL by lUck ??? eVeR heARd s0meThinG liKe thiS
| a w0rM maDe anD spReaD bY luCk...hehehe lolz..
| aNd fiNallY wE kn0w dAmN weLL wHaT tHe heLL wE aRe doinG...
| thE w0rlD pUshEd uS to tHe dArK siDe..cAnT hElp iT.. no reTReaT no 
suRRenDeR
| --------------------------------------------------------------

=========================================================

bY R0xx ,c0bra,dEviL inCArNatE
viSIt uS : http://indiansnakes.cjb.net"


"==============================================
iNDiAn snAKeS pReSAnTs : W32/yAHA 2.00
wE aRe tHe gREaT inDIaNs..
------------------------------------------
ab0uT Yaha 2.00 :
maIn miSsIon iS t0 dd0s 5 paKi weBshits..
fuCk paKi sYstEmS bY sEndinG eXploitEd daTa pAckeTs..

deDIcaTed to :
* Trend Micro Corp ( f0r exceLLeNT anaLYsiS lolz ;) )
* Klez auTHoR
* SQL Slammer auTHoR
* inDIan haCKeRs & VXeRs
* inDiAn s0 caLLeD IT eXpeRTs
* pe0pLeS wh0 fiGHt agAINsT coRRupti0n ( i guEss itS alm0st NULL )
* aLL mEmbERs of iNDiAn sNAKeS
* t0 mY bEsT friENd

thIs iS a waR beTweeN inDia & paK hAckeRS..
n0 c0untrY shouLD gEt inVolvEd..
------------------------------------------
> R0xx >
http://www.indiasnakes.cjb.net
"





W32/Deloder-A

Type 
Win32 worm 

Detection 
Sophos has received several reports of this worm from the wild.

Description
W32/Deloder-A is a network worm which spreads to random IP addresses 
and installs a backdoor Trojan.

When first run, the worm drops the files Psexec.exe and inst.exe to the 
current folder and creates the following registry entry so that the 
worm executable is run automatically each time Windows is started:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\messnger
= 

The worm attempts to connect to port 445 of target computers which is 
the NetBIOS port for Windows 2000 and XP, hence the worm is only likely 
to spread to computers running Windows 2000 or XP.

W32/Deloder-A copies itself to shares on the remote computer as 
Dvldr32.exe and tries to install a backdoor Trojan component inst.exe 
to the startup folders

C$\WINNT\All Users\Start Menu\Programs\Startup\,
C\WINDOWS\Start Menu\Programs\Startup\ and
C$\Documents and Settings\All Users\Start Menu\Programs\Startup\
inst.exe, so that inst.exe is run automatically each time the target 
computer is restarted.

W32/Deloder-A queries the remote computer for a valid username and then
attempts to logon using a brute force method to crack the password. 
This involves trying a list of common 'weak' passwords.

If the worm is unable to get a valid username it attempts to logon via 
the IPC$ share.

The worm uses the valid utility Psexec.exe to remotely set the
attributes for inst.exe and Dvldr32.exe to read-only, to launch 
inst.exe and Dvldr32.exe and to disable the network shares C$, D$, E$, 
F$, IPC$ and ADMIN$.

When run, the backdoor component inst.exe drops the files explorer.exe,
VNCHooks.dll, omnithread_rt.dll and rundll32.exe to the Fonts folder 
and cygwin1.dll to the System32 folder and creates the following 
registry entries so that both explorer.exe and rundll32.exe are run 
automatically on startup:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Explorer =
%Fonts%\explorer.exe and
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\TaskMan =
%Fonts%\rundll32.exe,

%Fonts%\rundll32.exe is a backdoor Trojan which allows unauthorized 
access to the computer via IRC channels.

Each time %Fonts%\rundll32.exe is run the Trojan tries to connect to a 
remote IRC server and join a specific channel.

%Fonts%\rundll32.exe then runs in the background as a server process, 
listening for commands to execute.

%Fonts%\explorer.exe is the valid application 'VNC server for Win32'.

The worm will only run on Windows 2000 and XP operating systems, but 
the backdoor components will also run on Win9x and Windows NT.

 
--- MultiMail/Win32 v0.43
* Origin: Try Our Web Based QWK: DOCSPLACE.ORG (1:123/140)
SEEN-BY: 633/267 270
@PATH: 123/140 500 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.