0
   

New Virus Warning

 
 
Wilso
 
Reply Tue 13 May, 2003 07:29 am
BHPSteel - Virus Alert W32/Fizzer@MM - BHPSteel

This is a mass mailling virus with multiple functions. If you recieve emails from unknown sources which contain an attachment, do not double click the attachment without first verifying the source of the email. McAfee virus definitions 4.0.4263 are being distributed to detect this virus.

Virus Characteristics
This mass-mailing worm has many components and an internal timer to trigger different processes at different times. These include:

Mass-mailing itself to addresses gathered from different places

Outlook Contacts list
Windows Address Book (WAB)
Addresses found on the local system
Randomly manufactured addresses
IRC bot (Internet Relay Chat)
AIM bot (AOL Instant Messenger)
Keylogger
KaZaa worm
HTTP server
Remote access server
Self-updating mechanism
Anti-virus software termination

The worm contains its own SMTP engine and uses the default SMTP server as specified in the Internet Account Manager registry settings. It can also use any one of several hundred different external SMTP servers.

The worm arrives as an email attachment in various messages. The from address can be forged such that the apparent sender is not the actual sender. Message body and subject lines vary, as do attachment names. Attachments use standard executable extensions (.com, .exe, .pif, .scr). Such as:

Subject: why?
Body: The peace
Attachment: desktop.scr
Subject: Re: You might not appreciate this...
Body: lautlach
Attachment: service.scr
Subject: Re: how are you?
Body: I sent this program (Sparky) from anonymous places on the net
Attachment: Jesse20.exe
Subject: Fwd: Mariss995
Body: There is only one good, knowledge, and one evil, ignorance.
Attachment: Mariss995.exe
Subject: Re: The way I feel - Remy Shand
Body: Nein
Attachment: Jordan6.pif

When the attachment is run, the worm extracts several files to the WINDOWS (%WinDir%) directory.

initbak.dat - A copy of the worm
iservc.exe - A copy of the worm
ProgOp.exe (15,360 bytes) - Process handling
iservc.dll (7,680 bytes) - Handles timing and windows hooking/keylogging
The worm creates a registry run key to load itself at system startup:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\
Run "SystemInit" = C:\WINDOWS\ISERVC.EXE
It also modifies the handling of files with a .TXT extension, such that accessing a .TXT file results in the worm being run:

HKEY_CLASSES_ROOT\txtfile\shell\open\command
"(Default)" = C:\WINDOWS\ProgOp.exe 0 7 'C:\WINDOWS\NOTEPAD.EXE %1'
'C:\WINDOWS\initbak.dat' 'C:\WINDOWS\ISERVC.EXE'
It creates a new CLASSES ROOT key with a similar association:

HKEY_CLASSES_ROOT\Applications\ProgOp.exe
On WinNT/2K/XP systems the worm creates a service named S1TRACE.
Mailing routine
After several minutes, the worm uses its own SMTP engine to send itself to all addresses on the Outlook Contacts List. It also sends itself to random addresses. Such as:

Part 1

Random name (from internal list)
Part 2

Random number (optional)
Part 3

@Random domain (from internal list)
aol.com
earthlink.com
gte.net
hotmail.com
juno.com
msn.com
netzero.com
yahoo.com
The subject and message body are constructed from a large list of English and German words and phrases carried within the virus body. The attachment name is also constructed from a list of names followed by a number followed by .com, .exe, .pif, or .scr. Additionally filenames may be chosen by copying the name of a valid file on the infected senders machine (ie.desktop.ini -> desktop.scr).

IRC Bot
The worm pings many different IRC servers. When it receives a reply, it connects to a channel on that server using many different internal usernames, and waits for further instructions from an attacker. The list of IRC servers includes:

irc2p2pchat.net
irc.idigital-web.com
irc.cyberchat.org
irc.othernet.org
irc.beyondirc.net
irc.chatx.net
irc.cyberarmy.com
irc.gameslink.net
AOL Bot
The worm connects to an AIM site to register a new, randomly named, user (in a similar fashion to the AIM-Canbot trojan It then connects to an AIM chat server on port 5190, joins a chat session, and listens for further instructions.

Self-updating
The worm connects to a geocities user page to download updates. However, at the time of this writing that user site did not exist.

Keylogger
The worm captures typed keystrokes and stores them in a encrypted file named iservc.klg within the Windows directory.
KaZaa worm
The worm retrieves the default download directory for KaZaa from the registry and copies itself to that location using random filenames.

HTTP server
The worm runs an HTTP server on a configured port. The webserver acts as a command-console, displaying information about the infected system (System time, connection information, OS version, IRC and AIM information). It also allows an attacker to kick-off certain functions, such as a Denial of Service attack, mail propagation, AOL/IRC bot commands, and anti-virus software termination).

Remote access server
The worm creates a remote console by listening on a configured TCP port.
Anti-virus software termination
The worm attempts to terminate processes that contain the following phrases in their names:

ANTIV
AVP
F-PROT
NMAIN
SCAN
TASKM
VIRUS
VSHW
VSS
  • Topic Stats
  • Top Replies
  • Link to this Topic
Type: Discussion • Score: 0 • Views: 1,854 • Replies: 7
No top replies

 
Letty
 
  1  
Reply Tue 13 May, 2003 08:40 am
Well, I'll be, Wilso. I was just coming in here to post the exact same warning. Does Zone alarm help? I have no idea what sorta protection bellsouth offers. I need to check on that, cause my Norton has never acted right.

Thanks...
0 Replies
 
bobsmyth
 
  1  
Reply Tue 13 May, 2003 08:56 am
New Virus Warning
Thanks, Wilso. Just sent a caution out to all my near and dear.
0 Replies
 
Wilso
 
  1  
Reply Wed 14 May, 2003 12:24 am
Letty wrote:
Well, I'll be, Wilso. I was just coming in here to post the exact same warning. Does Zone alarm help? I have no idea what sorta protection bellsouth offers. I need to check on that, cause my Norton has never acted right.

Thanks...


I don't know anything about it. I just post the warnings I get at work, because I know they're not hoaxes.
0 Replies
 
MisterEThoughts
 
  1  
Reply Wed 18 Jun, 2003 12:54 am
thank you soo much thats scary i will stay alert
0 Replies
 
Phoenix32890
 
  1  
Reply Wed 18 Jun, 2003 05:18 am
I have a very simple way around this. Ever since last year, when I kept getting Klez virii, (they were spotted by my Norton), I have just made it my business NEVER to open an attachment. Most of the stuff that I get from friends are jokes..........if they can't send them straight, I don't want them. (I get way too many jokes anyway Rolling Eyes ).
0 Replies
 
Airb
 
  1  
Reply Wed 18 Jun, 2003 04:44 pm
Letty wrote:
Well, I'll be, Wilso. I was just coming in here to post the exact same warning. Does Zone alarm help? I have no idea what sorta protection bellsouth offers. I need to check on that, cause my Norton has never acted right.

Thanks...


ZoneAlarm would only be of marginal help. It would most likely prevent the Http server from being able to access the internet and would also most likely block the remote access.

I suspect it wouldn't have any impact on stopping the proliferation of the worm or the exploiting of the other misc. processes (kazaa,key logger, etc.).

But as others have already mentioned attachments are inherently evil until proven otherwise. And even then I don't trust em Smile
0 Replies
 
Frank Apisa
 
  1  
Reply Wed 18 Jun, 2003 04:54 pm
I'm with Phoenix on this.

I don't open attachments unless I specifically ask for something and am expecting it.

Thanks for the warning.
0 Replies
 
 

Related Topics

Clone of Micosoft Office - Question by Advocate
Do You Turn Off Your Computer at Night? - Discussion by Phoenix32890
The "Death" of the Computer Mouse - Discussion by Phoenix32890
Windows 10... - Discussion by Region Philbis
Surface Pro 3: What do you think? - Question by neologist
Windows 8 tips thread - Discussion by Wilso
GOOGLE CHROME - Question by Setanta
.Net and Firefox... - Discussion by gungasnake
Hacking a computer and remote access - Discussion by trying2learn
 
  1. Forums
  2. » New Virus Warning
Copyright © 2024 MadLab, LLC :: Terms of Service :: Privacy Policy :: Page generated in 0.04 seconds on 05/05/2024 at 06:37:04