ALERTAS EN FORO DE EMERGENCIA - 2

Cerrado
Avatar de Usuario
msc hotline sat
Mensajes: 93500
Registrado: 09 Mar 2004, 20:39
Ubicación: BARCELONA (ESPAÑA)
Contactar:

ALERTAS EN FORO DE EMERGENCIA - 2

Mensaje por msc hotline sat » 30 Abr 2004, 16:14

Y OTRA EMERGENCIA VIRICA DE HOY: NETSKY.AA







Autor Tema

msc hotline sat

Administrator





España

5003 Mensajes Enviado el 27/04/2004 : 10:25:57

--------------------------------------------------------------------------------

Además del reciente Bagle.Z, ya hay que tener en cuenta una nueva variante del NetSky, la AA, que se controlará con proximos DATS 4354, y que mientras tanto se controla con el SDATDAILY:



Descripcion de McAfee para esta nueva variante NETSKY.AA:



_____________________________________________________________________



Virus Name Risk Assessment

W32/Netsky.aa @ MM Corporate User : Low

Home User : Low







Virus Information

Discovery Date: 04/26/2004

Origin: Unknown

Length: 17,408 Bytes

Type: Virus

SubType: Email Worm

Minimum DAT: 4354 (04/28/2004)

Updated DAT: 4354 (04/28/2004)

Minimum Engine: 4.2.40

Description Added: 04/26/2004

Description Modified: 04/26/2004 4:56 PM (PT)

Description Menu

Virus Characteristics

Symptoms

Method Of Infection

Removal Instructions

Variants / Aliases

Rate This page

Print This Page

Email This Page

Legend







Virus Characteristics:

This detection is for a new variant of W32/Netsky. It bears the following characteristics:



harvests email addresses from the victim machine

contains its own SMTP engine to construct outgoing messages

emails arrives as a PIF extension attachment

spoofs the From: address

Mail Propagation



The virus harvests email addresses from files on the victim machine with the following extensions:



.adb

.asp

.cfg

.cgi

.dbx

.dhtm

.doc

.eml

.htm

.html

.jsp

.mbx

.mdx

.mht

.mmf

.msg

.nch

.oft

.php

.ods

.pl

.ppt

.rtf

.sht

.shtm

.stm

.tbb

.txt

.uin

.vbs

.wab

.wsh

.xls

.xml

Messages are constructed using the virus' own SMTP engine. They bear the following characteristics:



From: spoofed (using harvested email addresses)

Subject: (selected from one of the following)



Re: Advice

Re: Application

Re: Approved

Re: Bill

Re: Cheaper

Re: Contacts

Re: Demo

Re: Details

Re: Document

Re: e-Books

Re: Error

Re: Fax number

Re: Final

Re: Hello

Re: Hi

Re: Information

Re: Job

Re: Letter

Re: List

Re: Missed

Re: Movie

Re: Music

Re: Paint file

Re: Patch

Re: Photos

Re: Poster

Re: Presentation

Re: Pricelist

Re: Private

Re: Product

Re: Step by Step

Re: Summary

Re: Tel. Numbers

Re: Text

Re: Text file

Re: Thank you!

Re: War

Re: Website

Body: (selected from one of the following)



For furher details see the attached file.

Here is the file.

Please have a look at the attached file.

Please read the attached file.

Please take the attached file.

Please view the attached file.

See the attached file for details.

Your document is attached.

Your file is attached.

Attachment: (PIF extensions with one of the following filenames)



My_Advice.pif

My_Fax_Numbers.pif

My_Telephone_Numbers.pif

Osam_Bin_Laden_Articel_42.pif

Your_Bill.pif

Your_Contacts.pif

Your_Demo.pif

Your_Description.pif

Your_Details.pif

Your_Digicam_Pictures.pif

Your_Document.pif

Your_Document_Part3.pif

Your_E-Books.pif

Your_Error.pif

Your_Excel_Document.pif

Your_Final_Document.pif

Your_Information.pif

Your_Job.pif

Your_Letter.pif

Your_List.pif

Your_Movie.pif

Your_Music.pif

Your_Paint_File.pif

Your_Patch.pif

Your_Pics.pif

Your_Poster.pif Your_Presentation.pif

Your_Pricelist.pif

Your_Private_Document.pif

Your_Product.pif

Your_Product_List.pif

Your_Software.pif

Your_Summary.pif

Your_Text.pif

Your_Text_File.pif

Your_Website.pif

System Changes



When executed, the following fake error box appears:





The virus installs itself on the victim machine as WINLOGON.SCR:



%WinDir%\WINLOGON.SCR

(%WinDir% = Windows directory, such as c:\windows or c:\winnt)



The following Registry key is added to hook system startup:



HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\

CurrentVersion\Run "Skynetsrevenge" = %WinDir%\WINLOGON.SCR



Top of Page



Symptoms

Outgoing DNS queries to one of the following hard-coded IP addresses:

145.253.2.171

151.189.13.35

193.141.40.42

193.189.244.205

193.193.144.12

193.193.158.10

194.25.2.129

194.25.2.130

194.25.2.131

194.25.2.132

194.25.2.133

194.25.2.134

195.185.185.195

195.20.224.234

212.185.252.136

212.185.252.73

212.185.253.70

212.44.160.8

212.7.128.162

212.7.128.165

213.191.74.19

217.5.97.137

62.155.255.16

Existence of the files and Registry keys detailed above



Top of Page



Method Of Infection

This worm spreads by email, constructing messages using its own SMTP engine.





Top of Page



Removal Instructions

Detection is included in our DAILY DAT (beta) files and will also be included in the next weekly DAT release. In addition to the DAT version requirements for detection, the specified engine version (or greater) must also be used.



____________________________________________________





Evidentemente con la instalacion del SDATDAILY de hoy, se controlarán tanto el Bagle.Z como este ultimo NetSky.AA, entre los 90.300 virus que ya controlamos con ellos: http://download.nai.com/products/mcafee-avert/daily_dats/SDATDAILY.EXE



saludos



ms, 27-04-2004





Virus Research Engineer









COLABORA pulsando banners, para poder seguir ofreciendo esta página

msc hotline sat

Administrator





España

5003 Mensajes Enviado el 27/04/2004 : 16:50:17

--------------------------------------------------------------------------------

Terminada la utilidad eliminadora de este virus ELINETSA v 3.2



En cuanto tengamos acceso al foro normal, la subiremos para que pueda utilizarse



saludos



ms, 27-04-2004

Cerrado

Volver a “ALERTAS VIRICAS y utilidades de eliminacion”