PRODUCTS> Computer Virus Alerts - Archive
Virus alerts for July 2004
Current virus alerts here.
Previous
June

By the time you receive the e-mail 'virus alert' it can be too late!
We stock the most efficient anti virus program which checks for updates hourly.

Computer virus alert

Get in touch for a one month free antivirus trial.
Add "Virus Trial" to the Comments area.

Date: July 23, 2004 WORM_BAGLE.AH

This worm is a new variant of the BAGLE worm that spreads via email and network shares. It affects Windows 95, 98, ME, NT, 2000, and XP. This mass-mailing, memory-resident worm propagates via email using a built-in mailing engine that utilizes Simple Mail Transfer Protocol (SMTP). The email it sends contains the following information:

From: <spoofed>

Subject: Re:

Message body: (any of the following)
• >Animals
• >foto3
• >fotogalary
• >fotoinfo
• >Lovely animals
• >Predators
• >Screen
• >The snake

Attachment: (any of the following)
• Cat
• Cool_MP3
• Dog
• Doll
• Fish
• Garry
• MP3
• Music_MP3
• New_MP3_Player

The attachment can have any of the following extension names:
• .com
• .cpl
• .exe
• .scr
• .zip

This worm also propagates via network shares, but does not deliberately search for all available shared folders. Instead, it searches for local folders with names that contain the character string “shar.” It assumes that these folders are shared and drops a copy of itself into these folders.

This worm is also a backdoor. It opens ports to allow remote communication and awaits and processes predefined commands that are sent through these ports. This backdoor capability allows unauthorized users to access and manipulate infected systems.

This BAGLE variant continues to attack NETSKY worms by deleting registry entries created by members of the NETSKY family. It also terminates security programs.

It has another trait common to different BAGLE variants; a predefined self-termination date. If the system date is May 5, 2006, it stops running and deletes the registry entries that allowed it to automatically run at every Windows startup.

If you would like to scan your computer for WORM_BAGLE.AH or thousands of other worms, viruses, Trojans and malicious code, download a free one month trial of F-Secure antivirus. Add "Virus Trial" to the Comments area. Contact Us.

3. Top 10 Most Prevalent Global Malware
(week of: July 16, 2004 to July 22, 2004)

1. PE_ZAFI.B
2. WORM_NETSKY.P
3. WORM_SASSER.B
4. HTML_NETSKY.P
5. WORM_NETSKY.D
6. WORM_RBOT.ZG
7. WORM_NETSKY.B
8. TROJ_AGENT.AE
9. WORM_BAGLE.AH
10. WORM_BAGLE.GEN-1

July 17 2004 WORM_ATAK.A (Low Risk)

WORM_ATAK.A is a worm that propagates via email, using its own Simple Mail Transfer Protocol (SMTP) engine. It looks for email recipients in files with specific extensions, in the infected computer. It runs on Windows 95, 98, ME, NT, 2000, and XP.

Upon execution, this memory-resident worm drops a copy of itself as HINT.EXE in the Windows system folder. This worm modifies the WIN.INI file and the registry, to allow itself to automatically execute at every system startup.

Using its own SMTP (Simple Mail Transfer Protocol) engine to propagate via email, the worm sends email with the following details:

From: (any of the following)

* Andrew
* george
* kevin

Subject: (any of the following)

* Important Data!
* Read the Result!

Message body: Authorized Researcher Only.

Attachment: (any of the following)

* A .zip
* <3-7 random lower-case characters>.zip.

Using double extension names with many spaces in between them, the file contained in the .ZIP attachment is made to appear as a picture file (example: ABCD.GIF. EXE).

The worm obtains target recipients’ email addresses from files with the following extensions found in the local machine:

* ADB
* ASP
* CFG
* CGI
* DBX
* EML
* HTM
* HTM
* JSP
* LOG
* MBX
* MHT
* MSG
* NCH
* ODS
* PHP
* PL
* SHT
* TBB
* TXT
* UIN
* VBS
* WAB
* XML

If you would like to scan your computer for WORM_ATAK.A or thousands of other worms, viruses, Trojans and malicious code, download a free one month trial of F-Secure antivirus. Add "Virus Trial" to the Comments area. Contact Us.

3. Top 10 Most Prevalent Global Malware
(week of: July 9, 2004 to July 15, 2004)

1. PE_ZAFI.B
2. WORM_NETSKY.P
3. HTML_NETSKY.P
4. HTML_IFRMEXP.GEN
5. WORM_LOVGATE.F
6. WORM_NETSKY.D
7. WORM_RBOT.ZG
8. TROJ_AGENT.AE
9. PE_FUNLOVE.4099
10. WORM_NETSKY.B

July 5, 2004
F-Secure has declared a Medium Risk Virus Alert to control the spread of WORM_BAGLE. F-Seciure has received several infection reports indicating that this worm is spreading in Japan, Korea, and Taiwan.

This worm is known to spread via email using its own Simple Mail Transfer Protocol (SMTP) engine. It also spreads via network shares. It drops copies of itself as the following files in the Windows system folder:

loader_name.exe
loader_name.exeopen
loader_name.exeopenopen

Its email arrives with any of the following lines as subject:

Re: Msg reply
Re: Hello
Re: Yahoo!
Re: Thank you!
Re: Thanks :)
RE: Text message
Re: Document
Incoming message
Re: Incoming Message
RE: Incoming Msg
RE: Message Notify
Notification
Changes..
Update
Fax Message
Protected message
RE: Protected message
Forum notify
Site changes
Re: Hi
Encrypted document

Get in touch for a one month free antivirus trial.
Add "Virus Trial" to the Comments area.

July 01 JavaScript Trojan - JS_JECT.A (Low Risk)

JS_JECT.A is a non-destructive Trojan script that typically arrives as an encrypted JavaScript file embedded in malicious Web pages. It exploits several vulnerabilities in Internet Explorer that allow it to download and execute malicious files on a computer system. This Trojan is currently spreading in the wild, and runs on Windows 95, 98, ME, NT, 2000, and XP.

Upon execution, this Trojan script attempts to load a file called MD.HTM. It then replaces the contents of the MD.HTM file with the contents of a malicious file called SHELLSCRIPT_LOADER.JS, which is downloaded from a specific malicious Web site.

Next, it creates an IFRAME named "myiframe", that, when accessed, runs and downloads another malicious file, SHELLSCRIPT.JS (also from the above-mentioned Web site). The downloaded file, SHELLSCRIPT.JS, exploits the ADODB.Stream vulnerability in Internet Explorer that allows the download and execution of the file MSITS.EXE from the Web site mentioned above. If the download is successful, this Trojan script renames MSITS.EXE to WMPLAYER.EXE and installs it in the following directory:

C:\Program Files\Windows Media Player

Finally, this script checks the infected system's local hard drive for the presence of the file, MAIN.MHT. If this file is not found, this Trojan script again attempts to access the above-mentioned Web site in order to download MAIN.CHM. The file, MAIN.CHM, contains another script, MAIN.HTM. This Trojan script also attempts to load a file named REDIR.PHP.

If you would like to scan your computer for JS_JECT.A or thousands of other worms, viruses, Trojans and malicious code, download a free one month trial of F-Secure antivirus. Add "Virus Trial" to the Comments area. Contact Us.

3. 10 Most Prevalent In-the-Wild Viruses & Malware.
(week of: June 25, 2004 to July 1, 2004)

1. PE_ZAFI.B
2. TROJ_AGENT.AC
3. WORM_NETSKY.P
4. HTML_NETSKY.P
5. WORM_NETSKY.D
6. WORM_NETSKY.Z
7. WORM_NETSKY.C
8. WORM_NETSKY.B
9. WORM_NETSKY.Q
10. JAVA_BYTEVER.A

Contact Us. Add "Virus Trial" to the Comments area.