Descripcion de McAfee:
_________________
Virus Name Risk Assessment
W32/Bagle.az@MM Corporate User : Medium
Home User : Medium
Virus Information
Discovery Date: 09/28/2004
Origin: Unknown
Length: Varies
Type: Virus
SubType: Email
Minimum DAT: 4395 (09/28/2004)
Updated DAT: 4395 (09/28/2004)
Minimum Engine: 4.3.20
Description Added: 09/28/2004
Description Modified: 09/28/2004 3:01 PM (PT)
Description Menu
Virus Characteristics
Symptoms
Method Of Infection
Removal Instructions
Variants / Aliases
Rate This page
Print This Page
Email This Page
Legend
Virus Characteristics:
-- Update Sep 28, 2004 --
Due to an increase in prevalence, the risk assessment of this threat has been raised to Medium.
--
If you think that you may be infected with this threat, and are unsure how to check your system, you may download the Stinger tool to scan your system and remove the virus if present. This is not required for McAfee users as McAfee products are capable of detecting and removing the virus with the latest update. (see the removal instructions below for more information).
Note: Receiving an email alert stating that the virus came from your email address is not an indication that you are infected as the virus often forges the from address.
This is a mass-mailing worm with the following characteristics:
contains its own SMTP engine to construct outgoing messages
harvests email addresses from the victim machine
the From: address of messages is spoofed
contains a remote access component
copies itself to folders that have the phrase shar in the name (such as common peer-to-peer applications; KaZaa, Bearshare, Limewire, etc)
Mail Propagation
The details are as follows:
From : (address is spoofed)
Subject :
Re:
Re: Hello
Re: Thank you!
Re: Thanks
Re: Hi
Body Text:
Attachment: (with an extension of .exe, .scr, .com or .cpl)
Price
price
Joke
The virus copies itself into the Windows System directory as BAWINDO.EXE. For example:
C:\WINDOWS\SYSTEM32\bawindo.exe
It also creates other files in this directory to perform its functions:
C:\WINDOWS\SYSTEM32\bawindo.exeopen
C:\WINDOWS\SYSTEM32\bawindo.exeopenopen
The following Registry key is added to hook system startup:
HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\Run "bawindo" = "C:\WINDOWS\SYSTEM32\bawindo.exe"
A mutex is created to ensure only one instance of the worm is running at a time. One of the following mutex names is used in an attempt to stop particular variants of W32/Netsky running on the infected machine:
'D'r'o'p'p'e'd'S'k'y'N'e't'
_-oOaxX|-+S+-+k+-+y+-+N+-+e+-+t+-|XxKOo-_
[SkyNet.cz]SystemsMutex
AdmSkynetJklS003
____--->>>>U<<<<--____
_-oO]xX|-S-k-y-N-e-t-|Xx[Oo-_
The worm opens port 81 (TCP) and a random UDP port on the victim machine.
Top of Page
Symptoms
Outgoing messages matching the described characteristics
Files/Registry keys as described
Port 81 (TCP) open on the victim machine
Top of Page
Method Of Infection
Mail Propagation
This virus constructs messages using its own SMTP engine. Target email addresses are harvested from files with the following extensions on the victim machine:
.wab
.txt
.msg
.htm
.shtm
.stm
.xml
.dbx
.mbx
.mdx
.eml
.nch
.mmf
.ods
.cfg
.asp
.php
.pl
.wsh
.adb
.tbb
.sht
.xls
.oft
.uin
.cgi
.mht
.dhtm
.jsp
The virus spoofs the sender address by using a harvested address in the From: field.
The virus avoids sending itself to addresses containing the following:
@hotmail
@msn
@microsoft
rating@
f-secur
news
update
anyone@
bugs@
contract@
feste
gold-certs@
help@
info@
nobody@
noone@
kasp
admin
icrosoft
support
ntivi
unix
bsd
linux
listserv
certific
sopho
@foo
@iana
free-av
@messagelab
winzip
winrar
samples
abuse
panda
cafee
spam
pgp
@avp.
noreply
local
root@
postmaster@
Peer To Peer Propagation
Files are created in folders that contain the phrase shar :
Microsoft Office 2003 Crack, Working!.exe
Microsoft Windows XP, WinXP Crack, working Keygen.exe
Microsoft Office XP working Crack, Keygen.exe
Porno, sex, oral, anal cool, awesome!!.exe
Porno Screensaver.scr
Serials.txt.exe
KAV 5.0
Kaspersky Antivirus 5.0
Porno pics arhive, xxx.exe
Windows Sourcecode update.doc.exe
Ahead Nero 7.exe
Windown Longhorn Beta Leak.exe
Opera 8 New!.exe
XXX hardcore images.exe
WinAmp 6 New!.exe
WinAmp 5 Pro Keygen Crack Update.exe
Adobe Photoshop 9 full.exe
Matrix 3 Revolution English Subtitles.exe
ACDSee 9.exe
Process Killing
The virus contains code to kill processes matching the following list of file names, belonging to other worms and products which could be used to identify or interfere with its actions:
alogserv.exe
APVXDWIN.EXE
ATUPDATER.EXE
AUPDATE.EXE
AUTODOWN.EXE
AUTOTRACE.EXE
AUTOUPDATE.EXE
Avconsol.exe
AVENGINE.EXE
AVPUPD.EXE
Avsynmgr.exe
AVWUPD32.EXE
AVXQUAR.EXE
blackd.exe
ccApp.exe
ccEvtMgr.exe
ccProxy.exe
ccPxySvc.exe
CFIAUDIT.EXE
DefWatch.exe
DRWEBUPW.EXE
ESCANH95.EXE
ESCANHNT.EXE
FIREWALL.EXE
FrameworkService.exe
ICSSUPPNT.EXE
ICSUPP95.EXE
LUALL.EXE
LUCOMS~1.EXE
mcagent.exe
mcshield.exe
MCUPDATE.EXE
mcvsescn.exe
mcvsrte.exe
mcvsshld.exe
navapsvc.exe
navapw32.exe
NISUM.EXE
nopdb.exe
NPROTECT.EXE
NUPGRADE.EXE
OUTPOST.EXE
PavFires.exe
pavProxy.exe
pavsrv50.exe
Rtvscan.exe
RuLaunch.exe
SAVScan.exe
SHSTAT.EXE
SNDSrvc.exe
symlcsvc.exe
UPDATE.EXE
UpdaterUI.exe
Vshwin32.exe
VsStat.exe
VsTskMgr.exe
Downloading
This threat contacts a list of websites to retrieve a file named WS.JPG. At the time of writing, this file was not available on any of the sites.
Registry Entry Removal
In both of the following startup locations
HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\
CurrentVersion\Run
The following keys for other worms and security products are deleted:
"My AV"
"Zone Labs Client Ex"
"9XHtProtect"
"Antivirus"
"Special Firewall Service"
"service"
"Tiny AV"
"ICQNet"
"HtProtect"
"NetDy"
"Jammer2nd"
"FirewallSvr"
"MsInfo"
"SysMonXP"
"EasyAV"
"PandaAVEngine"
"Norton Antivirus AV"
"KasperskyAVEng"
"SkynetsRevenge"
"ICQ Net"
Remote Access Component
The virus listens on port 81 TCP and a random UDP port for remote connections.
Top of Page
Removal Instructions
All Users :
Use the specified DAT files for detection and removal.
Alternatively, the following EXTRA.DAT packages are being made available prior to the regularly scheduled weekly DAT release (working with EXTRA.DAT files ).
EXTRA.DAT
SUPER EXTRA.DAT
Additional Windows ME/XP removal considerations
Stinger
Stinger has been updated to assist in detecting and repairing this threat.
Manual Removal Instructions
To remove this virus "by hand", follow these steps:
Reboot the system into Safe Mode (hit the F8 key as soon as the Starting Windows text is displayed, choose Safe Mode.
Delete the following files from your WINDOWS System directory (typically C:\Windows\System or C:\Winnt\System32)
bawindo.exe
bawindo.exeopen
bawindo.exeopenopen
Edit the registry
Delete the "bawindo.exe" value from
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\Run
Reboot the system into Default Mode
McAfee System Compliance Profiler
Create a rule that matches a file
- Choose SYSTEM_DIR from the drop-down
- Type in BAWINDO.EXE for the file name
- Choose "File does not exist" in the next drop-down
Create a rule that matches a file
- Choose SYSTEM_DIR from the drop-down
- Type in BAWINDO.EXEOPEN for the file name
- Choose "File does not exist" in the next drop-down
Create a rule that matches a file
- Choose SYSTEM_DIR from the drop-down
- Type in BAWINDO.EXEOPENOPEN for the file name
- Choose "File does not exist" in the next drop-down
_____________
Se recomienda comprobar que el antivirus es´té actualizado y controle esta nueva variante.
saludos
ms, 29-09-2004