TIP: Click on subject to list as thread! ANSI
echo: virus
to: ALL
from: KURT WISMER
date: 2003-05-04 23:13:00
subject: News

[cut-n-paste from sophos.com]

W32/Kullan-A

Aliases
W32.HLLW.Kullan, TROJ_TAMPONAI.A, Worm.Win32.Kullan

Type
Win32 worm

Detection
At the time of writing Sophos has received no reports from users 
affected by this worm. However, we have issued this advisory following 
enquiries to our support department from customers.

Description
W32/Kullan-A is a complex worm with backdoor functionality that targets 
available network shared resources.

When executed the worm copies itself to the Windows system folder with 
the filename Services.exe and sets the following registry entries:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HKCU\Software\Microsoft\Windows\CurrentVersion\Run

or

HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\load
HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\run

and adds the full path to Services.exe to:

HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\shell

Running as a background process the worm uses the "net view" command to 
be able to drop a copy of itself to the Start Menu folder of the 
available computer using the computer name as a filename.

As a backdoor the worm provides access to confidential information such 
as OS type, keystroke logs and email details.

W32/Kullan-A may also change the Win.ini and System.ini files to make 
sure the worm will be executed at the next restart.





W32/Cailont-A

Aliases
Nolor

Type
Win32 worm

Detection
At the time of writing Sophos has received just one report of this worm 
from the wild.

Description
W32/Cailont-A is an internet worm which sends itself out by email.

W32/Cailont-A creates seven files in your system folder. The files 
explorer.exe, kernel32.exe, netdll.dll and serscg.dll are copies of the 
worm. The file setup.htm is a web page containing a Visual Basic Script 
which creates and launches the worm (this identity detects this file as 
VBS/Cailont-A). The files Netsn.dll and Bsbk.dll are raw base64-encoded 
copies of the worm and script files (these files are harmless on their 
own and can be deleted).

W32/Cailont-A adds the value:

explorer = "\SYSTEM\FOLDER\explorer.exe"

to the registry key:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run

This means that the worm will run automatically every time you start 
your computer.

W32/Cailont-A sends emails with the following characteristics:

Subject line: Re:baby!your friend send this file to you !
Message text: Read this file

Subject line: HELP??-
Message text: Help...

Subject line: Re:Get Password mail...
Message text: Enjoy

Subject line: Re:Get Password mail...
Message text: Read File attach .

Subject line: Re:Binladen_Sexy.jpg
Message text: run File Attach to extract:BinladenSexy.jpg...

Subject line: The Sexy story and 4 sexy picture of BINLADEN !
Message text: Enjoy! BINLADEN:SEXY..

Subject line: Re:I Love You...OKE!
Message text: Souvenir for you from file attach...

Subject line: A Greeting-card for you .
Message text: See the Greeting-card .

Subject line: Re:Kiss you..^{at}^
Message text: Read file attach

Subject line: Guide to fuck ...
Message text: I like Sexy with you.

Subject line: Re:Baby! 2000USD,Win this game...
Message text: Play the game from file attach

Subject line: Help
Message text: Help.

W32/Cailont-A names its attachment:

xxx.KISS.OK.EXE

or:

xxx.HTM

where xxx varies from email to email.





W32/Coronex-A

Aliases
I-Worm.Coronex.a, W32/Coronex.worm, Win32/Sars.A, W32.Coronex{at}mm, 
WORM_CORONEX.A

Type
Win32 worm

Detection
At the time of writing Sophos has received no reports from users 
affected by this worm. However, we have issued this advisory following 
enquiries to our support department from customers.

Description
W32/Coronex-A is an internet worm which emails itself to every contact 
in the Windows address book.

The email characteristics vary depending upon the current day of the 
week, as follows:

Sender address: sars{at}hotmail.com
Subject line: Severe Acute Respiratory Syndrome
Attached file: sars.exe

Sender address: sars2{at}hotmail.com
Subject line: I need your help
Message text: Severe Acute Respiratory Syndrome
Attached file: corona.exe

Sender address: corona{at}hotmail.com
Subject line: Virus Alert!
Message text: SARS Virus
Attached file: virus.exe

Sender address: virus{at}yahoo.com
Subject line: Corona Virus
Message text: honk kong
Attached file: hongkong.exe

Sender address: deaths{at}china.com
Subject line: deaths virus
Attached file: deaths.exe

Sender address: virus{at}china.com
Subject line: SEE Ya
Attached file: sars2.exe

Sender address: virus2{at}china.com
Subject line: SARS Virus
Message text: SARS Corona Virus
Attached file: cv.exe

When first run, the worm displays a message box with the text "SARS 
Virus, corona virus", copies itself to the Windows folder as Corona.exe 
and creates the following registry entry so that corona.exe is run 
automatically each time Windows is started:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\PC-Config32
= %WINDOWS%\corona.exe -A

The worm copies itself to the C:\My Downloads folder using 1 of the 24 
filenames listed below, depending upon the current hour of the day:

Age Of Mythology.exe
Battlefield 1942 (full).exe
Black Hawk Down (full).exe
Command & Conquer: Generals.exe
Cossacks Full Version.exe
Dark Age of Camelot.exe
Doom 3.exe
Grand Theft Auto 3 (full).exe
Jedi Knight II.exe
Master Of Orion 3.exe
Medel Of Honor: Allied Assault.exe
Oni full.exe
Quake 3 Full Version.exe
Rainbow 6 Full.exe
Return to Castle Wolfenstien (Full).exe
Starcraft full.exe
The Lord of the Rings.exe
The Sims: Unleashed.exe
Tribes 2 (full).exe
Ultima Online.exe
Unreal 2: The Awakening (full).exe
Unreal.exe
Warcraft III Full.exe
White and Black.exe

When run with a -A command line switch (i.e. on startup), the worm runs 
continuously in the background and emails itself when the time is 1 
minute past any hour.

The worm also changes the start page for Microsoft Internet Explorer by 
setting the registry entry

HKCU\Software\Microsoft\Internet Explorer\Main\Start Page
= http://www.who.int/csr/don/2003_04_19/en

 
--- MultiMail/Win32 v0.43
* Origin: Try Our Web Based QWK: DOCSPLACE.ORG (1:123/140)
SEEN-BY: 633/267 270
@PATH: 123/140 500 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.