PRODUCTS > Computer Virus Alerts - Maintenance
Virus alerts for April 2006
Current virus alerts here.
Computer virus alert
By the time you receive the e-mail 'virus alert' it can be too late!
We stock the most efficient anti virus program which checks for updates hourly
.

Contact Us for a free antivirus trial to the end of this month.
Add "Virus Trial" to the Comments area.
Free trial antivirus

Most recent malware, computer viruses, worms, Trojan horses, spyware and adware.

Backdoor.Naninf.E - BKDR_BREPBOT.A - Infostealer.Yohokie - Trojan.Slapew - Backdoor.Haxdoor.M Infostealer.Sealoln - Downloader.Booli.A - Trojan.Mdropper.J - Bloodhound.Exploit.74

Confused? What is malware? Click here for the definition.

June 16 2006 Backdoor Naninf.E

Backdoor.Naninf.E is a Trojan horse with back door capabilities that lowers security settings on the compromised computer.

Also Known As: BKDR_BREPBOT.A [Trend]

Type: Trojan Horse
Infection Length: 12,800 bytes

Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP

Damage - Payload: Opens a back door on the compromised computer.

When Backdoor.Naninf.E is executed, it performs the following actions:

1. May copy itself as the following file:

%System%\svchon32.exe

Note: %System% is a variable that refers to the System folder. By default this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).

2. Adds the value:

"ProtocolModuleCmd"="svchon32.exe" to the registry subkeys:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run so that it runs every time Windows starts.

3. Creates the mutex "svchon32.exe" so that only one instance of it runs on the compromised computer at any one time.

4. Attempts to bypass the Windows Firewall by creating the following temporary .bat file, which adds the Trojan executable file to the list of trusted applications for the firewall:

%Temp%\[RANDOM NAME].bat

Note: %Temp% is a variable that refers to the Windows temporary folder. By default, this is C:\Windows\TEMP (Windows 95/98/Me/XP) or C:\WINNT\Temp (Windows NT/2000).

5. Attempts to end the following processes, some of which may be security-related:

* winzip.exe
* scanregw.exe
* update.exe
* mcvsrte.exe
* teatimer.exe
* kpf4gui.exe
* kpf4ss.exe
* wupdmgr.exe
* wuauclt.exe
* wuauclt1.exe
* symwsc.exe
* savscan.exe
* mrt.exe
* ad-watch.exe
* gcasserv.exe
* ccevtmgr.exe
* ccapp.exe
* nmain.exe
* navw32.exe
* gcasdtserv.exe
* mcupdate.exe
* mcshield.exe

6. Attempts to open a back door by connecting to an IRC server at one of the following domains, on TCP port 8080:

* 163.1.213.194
* 66.108.20.7
* 67.164.54.64
* 69.216.104.25
* 69.220.225.80
* 69.254.144.52
* 24.178.108.231
* 24.231.133.199
* 24.248.188.53
* 65.26.31.192
* 24.3.168.130

7. Connects to an IRC channel and listen for commands. These commands typically allow the remote attacker to perform various unauthorized actions on the compromised computer. It is reported that these actions include:

* Downloading and executing remote files
* Deleting the Trojan itself

Contact Us for a free antivirus trial to the end of this month.
Add "Virus Trial" to the Comments area.
Free trial antivirus

What is malware?

Malware is software designed to infiltrate or damage a computer system, without the owner's consent. The term is a combination of "mal-" (or perhaps "malicious") and "software", and describes the intent of the creator, rather than any particular features. Malware is commonly taken to include computer viruses, worms, Trojan horses, spyware and adware. In law, malware is sometimes known as a computer contaminant.

Malware should not be confused with defective software, that is, software which has a legitimate purpose but contains errors or bugs.

Most Prevalent Global Malware
(from June 10 to June 16 2006)

Backdoor.Naninf.E
BKDR_BREPBOT.A [Trend]
Infostealer.Yohokie
Trojan.Slapew
Backdoor.Haxdoor.M
Infostealer.Sealoln
Downloader.Booli.A
Trojan.Mdropper.J
Bloodhound.Exploit.74
Bloodhound.Exploit.73
Backdoor.Eterok.C
Bloodhound.Exploit.72
Backdoor.Daserf
JS.Yamanner@m
JS/Yamanner@MM [McAfee], JS_YAMANER.A [Trend Micro],
Yamanner.A [F-Secure], JS/Yamann-A [Sophos]
Downloader.Swif.B
Trojan.Skowr
TROJ_SKOWR.A [Trend]
W32.Detnat.G
Downloader.Bancos
W32.Detnat.F

June 10 2006 Infostealer.Bancos

Infostealer.Bancos is a generic detection for various threats that steal passwords entered into forms in Web browsers. NOTE : Definitions prior to May 10, 2006 may detect this threat as PWSteal.Bancos

Also Known As: PWSteal.Bancos

Type: Trojan Horse
Infection Length: 911962 (dropper), 258048 (trojan)

Systems Affected: Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows XP

Damage

* Payload Trigger: Often triggered by visiting a financial Web site.
* Payload:
o Releases confidential info: Collects passwords

Our antivirus programs use Infostealer.Bancos as a generic detection when detecting many individual but varied password stealing programs.

Infostealer.Bancos variants steal passwords to financial Web sites by either:

* Displaying fake browser windows that look like the sign in pages for legitimate financial Web sites.
* Logging data entered into legitimate browser windows that belong to financial institutions.

In these cases, a generic detection is used because it protects against many password stealers that share similar characteristics.

Contact Us for a free antivirus trial to the end of this month.
Add "Virus Trial" to the Comments area.
Free trial antivirus

Most Prevalent Global Malware
(from June 04 to June 10 2006)

W32.Nopir.D
W32.Serwab@mm
W32.Timeserv@mm
W32.Fijjy
Downloader.Bancos!gen
Bloodhound.NsAnti
W32.Detnat.E
Trojan.Silm
Backdoor.Ginwui.C
Trojan.Mdropper.I
Bloodhound.Exploit.71
Perl.Lekbot
SB.Starbugs
W97M.Tored.A
W2KM_TORED.A [Trend Micro]
Backdoor.Haxdoor.L
Trojan.Emcodec.D
SymbOS.Commdropper.E
Infostealer.Bancos.AB
SymbOS.Commwarrior.J
Commwarrior.K [F-Secure]
W32.Beagle.FC
SymbOS.Romride.E
Romride.E [F-Secure]
SymbOS.Romride.D
Romride.D [F-Secure]
SymbOS.Commdropper.D
Commdropper.F [F-Secure]
SymbOS.Romride.C
Romride.C [F-Secure]
SymbOS.Commwarrior.L
Commwarrior.M [F-Secure]
SymbOS.Commwarrior.K
Commwarrior.L [F-Secure]
Trojan.Looksky
SymbOS.Romride.B
Romride.B [F-Secure]