NUEVA VARIANTE DE BAGLE.AZ PARA EL QUE MCAFEE CREA DATS 4395

Cerrado
Avatar de Usuario
msc hotline sat
Mensajes: 93500
Registrado: 09 Mar 2004, 20:39
Ubicación: BARCELONA (ESPAÑA)
Contactar:

NUEVA VARIANTE DE BAGLE.AZ PARA EL QUE MCAFEE CREA DATS 4395

Mensaje por msc hotline sat » 29 Sep 2004, 09:49

La gran propagacion detectada de la nueva variante del virus BAGLE.AZ ha hehco que McAfee haya creado DATS atipicos antes de hora, los DAT 4395 que ya lo detectan y eliminan:



Descripcion de McAfee:

_________________



Virus Name Risk Assessment

W32/Bagle.az@MM Corporate User : Medium

Home User : Medium







Virus Information

Discovery Date: 09/28/2004

Origin: Unknown

Length: Varies

Type: Virus

SubType: Email

Minimum DAT: 4395 (09/28/2004)

Updated DAT: 4395 (09/28/2004)

Minimum Engine: 4.3.20

Description Added: 09/28/2004

Description Modified: 09/28/2004 3:01 PM (PT)

Description Menu

Virus Characteristics

Symptoms

Method Of Infection

Removal Instructions

Variants / Aliases

Rate This page

Print This Page

Email This Page

Legend







Virus Characteristics:

-- Update Sep 28, 2004 --

Due to an increase in prevalence, the risk assessment of this threat has been raised to Medium.

--



If you think that you may be infected with this threat, and are unsure how to check your system, you may download the Stinger tool to scan your system and remove the virus if present. This is not required for McAfee users as McAfee products are capable of detecting and removing the virus with the latest update. (see the removal instructions below for more information).













































Note: Receiving an email alert stating that the virus came from your email address is not an indication that you are infected as the virus often forges the from address.







This is a mass-mailing worm with the following characteristics:



contains its own SMTP engine to construct outgoing messages

harvests email addresses from the victim machine

the From: address of messages is spoofed

contains a remote access component

copies itself to folders that have the phrase shar in the name (such as common peer-to-peer applications; KaZaa, Bearshare, Limewire, etc)

Mail Propagation



The details are as follows:



From : (address is spoofed)

Subject :



Re:

Re: Hello

Re: Thank you!

Re: Thanks :)

Re: Hi

Body Text:



:)

:))

Attachment: (with an extension of .exe, .scr, .com or .cpl)



Price

price

Joke

The virus copies itself into the Windows System directory as BAWINDO.EXE. For example:



C:\WINDOWS\SYSTEM32\bawindo.exe

It also creates other files in this directory to perform its functions:



C:\WINDOWS\SYSTEM32\bawindo.exeopen

C:\WINDOWS\SYSTEM32\bawindo.exeopenopen

The following Registry key is added to hook system startup:



HKEY_CURRENT_USER\Software\Microsoft\Windows\

CurrentVersion\Run "bawindo" = "C:\WINDOWS\SYSTEM32\bawindo.exe"

A mutex is created to ensure only one instance of the worm is running at a time. One of the following mutex names is used in an attempt to stop particular variants of W32/Netsky running on the infected machine:



'D'r'o'p'p'e'd'S'k'y'N'e't'

_-oOaxX|-+S+-+k+-+y+-+N+-+e+-+t+-|XxKOo-_

[SkyNet.cz]SystemsMutex

AdmSkynetJklS003

____--->>>>U<<<<--____

_-oO]xX|-S-k-y-N-e-t-|Xx[Oo-_

The worm opens port 81 (TCP) and a random UDP port on the victim machine.



Top of Page



Symptoms

Outgoing messages matching the described characteristics

Files/Registry keys as described

Port 81 (TCP) open on the victim machine



Top of Page



Method Of Infection

Mail Propagation

This virus constructs messages using its own SMTP engine. Target email addresses are harvested from files with the following extensions on the victim machine:



.wab

.txt

.msg

.htm

.shtm

.stm

.xml

.dbx

.mbx

.mdx

.eml

.nch

.mmf

.ods

.cfg

.asp

.php

.pl

.wsh

.adb

.tbb

.sht

.xls

.oft

.uin

.cgi

.mht

.dhtm

.jsp

The virus spoofs the sender address by using a harvested address in the From: field.



The virus avoids sending itself to addresses containing the following:



@hotmail

@msn

@microsoft

rating@

f-secur

news

update

anyone@

bugs@

contract@

feste

gold-certs@

help@

info@

nobody@

noone@

kasp

admin

icrosoft

support

ntivi

unix

bsd

linux

listserv

certific

sopho

@foo

@iana

free-av

@messagelab

winzip

google

winrar

samples

abuse

panda

cafee

spam

pgp

@avp.

noreply

local

root@

postmaster@

Peer To Peer Propagation



Files are created in folders that contain the phrase shar :



Microsoft Office 2003 Crack, Working!.exe

Microsoft Windows XP, WinXP Crack, working Keygen.exe

Microsoft Office XP working Crack, Keygen.exe

Porno, sex, oral, anal cool, awesome!!.exe

Porno Screensaver.scr

Serials.txt.exe

KAV 5.0

Kaspersky Antivirus 5.0

Porno pics arhive, xxx.exe

Windows Sourcecode update.doc.exe

Ahead Nero 7.exe

Windown Longhorn Beta Leak.exe

Opera 8 New!.exe

XXX hardcore images.exe

WinAmp 6 New!.exe

WinAmp 5 Pro Keygen Crack Update.exe

Adobe Photoshop 9 full.exe

Matrix 3 Revolution English Subtitles.exe

ACDSee 9.exe

Process Killing



The virus contains code to kill processes matching the following list of file names, belonging to other worms and products which could be used to identify or interfere with its actions:



alogserv.exe

APVXDWIN.EXE

ATUPDATER.EXE

AUPDATE.EXE

AUTODOWN.EXE

AUTOTRACE.EXE

AUTOUPDATE.EXE

Avconsol.exe

AVENGINE.EXE

AVPUPD.EXE

Avsynmgr.exe

AVWUPD32.EXE

AVXQUAR.EXE

blackd.exe

ccApp.exe

ccEvtMgr.exe

ccProxy.exe

ccPxySvc.exe

CFIAUDIT.EXE

DefWatch.exe

DRWEBUPW.EXE

ESCANH95.EXE

ESCANHNT.EXE

FIREWALL.EXE

FrameworkService.exe

ICSSUPPNT.EXE

ICSUPP95.EXE

LUALL.EXE

LUCOMS~1.EXE

mcagent.exe

mcshield.exe

MCUPDATE.EXE

mcvsescn.exe

mcvsrte.exe

mcvsshld.exe

navapsvc.exe

navapw32.exe

NISUM.EXE

nopdb.exe

NPROTECT.EXE

NUPGRADE.EXE

OUTPOST.EXE

PavFires.exe

pavProxy.exe

pavsrv50.exe

Rtvscan.exe

RuLaunch.exe

SAVScan.exe

SHSTAT.EXE

SNDSrvc.exe

symlcsvc.exe

UPDATE.EXE

UpdaterUI.exe

Vshwin32.exe

VsStat.exe

VsTskMgr.exe

Downloading



This threat contacts a list of websites to retrieve a file named WS.JPG. At the time of writing, this file was not available on any of the sites.



http://www.24-7-transportation.com

http://www.adhdtests.com

http://www.aegee.org

http://www.aimcenter.net

http://www.alupass.lu

http://www.amanit.ru

http://www.andara.com

http://www.angelartsanctuary.com

http://www.anthonyflanagan.com

http://www.approved1stmortgage.com

http://www.argontech.net

http://www.asianfestival.nl

http://www.atlantisteste.hpg.com.br

http://www.aviation-center.de

http://www.bbsh.org

http://www.bga-gsm.ru

http://www.boneheadmusic.com

http://www.bottombouncer.com

http://www.bradster.com

http://www.buddyboymusic.com

http://www.bueroservice-it.de

http://www.calderwoodinn.com

http://www.capri-frames.de

http://www.celula.com.mx

http://www.ceskyhosting.cz

http://www.chinasenfa.com

http://www.cntv.info

http://www.compsolutionstore.com

http://www.coolfreepages.com

http://www.corpsite.com

http://www.couponcapital.net

http://www.cpc.adv.br

http://www.crystalrose.ca

http://www.cscliberec.cz

http://www.curtmarsh.com

http://www.customloyal.com

http://www.DarrkSydebaby.com

http://www.deadrobot.com

http://www.dontbeaweekendparent.com

http://www.dragcar.com

http://www.ecofotos.com.br

http://www.elenalazar.com

http://www.ellarouge.com.au

http://www.esperanzaparalafamilia.com

http://www.eurostavba.sk

http://www.everett.wednet.edu

http://www.fcpages.com

http://www.featech.com

http://www.fepese.ufsc.br

http://www.firstnightoceancounty.org

http://www.flashcorp.com

http://www.fleigutaetscher.ch

http://www.fludir.is

http://www.freeservers.com

http://www.FritoPie.NET

http://www.gamp.pl

http://www.gci-bln.de

http://www.gcnet.ru

http://www.generationnow.net

http://www.gfn.org

http://www.giantrevenue.com

http://www.glass.la

http://www.handsforhealth.com

http://www.hartacorporation.com

http://www.himpsi.org

http://www.idb-group.net

http://www.immonaut.sk

http://www.ims-i.com

http://www.innnewport.com

http://www.irakli.org

http://www.irinaswelt.de

http://www.jansenboiler.com

http://www.jasnet.pl

http://www.jhaforpresident.7p.com

http://www.jimvann.com

http://www.jldr.ca

http://www.justrepublicans.com

http://www.kencorbett.com

http://www.knicks.nl

http://www.kps4parents.com

http://www.kradtraining.de

http://www.kranenberg.de

http://www.lasermach.com

http://www.leonhendrix.com

http://www.magicbottle.com.tw

http://www.mass-i.kiev.ua

http://www.mepbisu.de

http://www.mepmh.de

http://www.metal.pl

http://www.mexis.com

http://www.mongolische-renner.de

http://www.mtfdesign.com

http://www.oboe-online.com

http://www.ohiolimo.com

http://www.onepositiveplace.org

http://www.oohlala-kirkland.com

http://www.orari.net

http://www.pankration.com

http://www.pe-sh.com

http://www.pfadfinder-leobersdorf.com

http://www.pipni.cz

http://www.polizeimotorrad.de

http://www.programmierung2000.de

http://www.pyrlandia-boogie.pl

http://www.raecoinc.com

http://www.realgps.com

http://www.redlightpictures.com

http://www.reliance-yachts.com

http://www.relocationflorida.com

http://www.rentalstation.com

http://www.rieraquadros.com.br

http://www.scanex-medical.fi

http://www.sea.bz.it

http://www.selu.edu

http://www.sigi.lu

http://www.sljinc.com

http://www.smacgreetings.com

http://www.soloconsulting.com

http://www.spadochron.pl

http://www.srg-neuburg.de

http://www.ssmifc.ca

http://www.sugardas.lt

http://www.sunassetholdings.com

http://www.szantomierz.art.pl

http://www.the-fabulous-lions.de

http://www.tivogoddess.com

http://www.tkd2xcell.com

http://www.topko.sk

http://www.transportation.gov.bh

http://www.travelchronic.de

http://www.traverse.com

http://www.uhcc.com

http://www.ulpiano.org

http://www.uslungiarue.it

http://www.vandermost.de

http://www.vbw.info

http://www.velezcourtesymanagement.com

http://www.velocityprint.com

http://www.vikingpc.pl

http://www.vinirforge.com

http://www.wecompete.com

http://www.worest.com.ar

http://www.woundedshepherds.com

http://www.wwwebad.com

http://www.wwwebmaster.com

Registry Entry Removal



In both of the following startup locations



HKEY_CURRENT_USER\Software\Microsoft\Windows\

CurrentVersion\Run

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\

CurrentVersion\Run

The following keys for other worms and security products are deleted:



"My AV"

"Zone Labs Client Ex"

"9XHtProtect"

"Antivirus"

"Special Firewall Service"

"service"

"Tiny AV"

"ICQNet"

"HtProtect"

"NetDy"

"Jammer2nd"

"FirewallSvr"

"MsInfo"

"SysMonXP"

"EasyAV"

"PandaAVEngine"

"Norton Antivirus AV"

"KasperskyAVEng"

"SkynetsRevenge"

"ICQ Net"

Remote Access Component



The virus listens on port 81 TCP and a random UDP port for remote connections.



Top of Page



Removal Instructions

All Users :

Use the specified DAT files for detection and removal.



Alternatively, the following EXTRA.DAT packages are being made available prior to the regularly scheduled weekly DAT release (working with EXTRA.DAT files ).



EXTRA.DAT

SUPER EXTRA.DAT



Additional Windows ME/XP removal considerations



Stinger

Stinger has been updated to assist in detecting and repairing this threat.



Manual Removal Instructions

To remove this virus "by hand", follow these steps:



Reboot the system into Safe Mode (hit the F8 key as soon as the Starting Windows text is displayed, choose Safe Mode.

Delete the following files from your WINDOWS System directory (typically C:\Windows\System or C:\Winnt\System32)

bawindo.exe

bawindo.exeopen

bawindo.exeopenopen



Edit the registry

Delete the "bawindo.exe" value from

HKEY_CURRENT_USER\Software\Microsoft\

Windows\CurrentVersion\Run

Reboot the system into Default Mode

McAfee System Compliance Profiler

Create a rule that matches a file

- Choose SYSTEM_DIR from the drop-down

- Type in BAWINDO.EXE for the file name

- Choose "File does not exist" in the next drop-down



Create a rule that matches a file

- Choose SYSTEM_DIR from the drop-down

- Type in BAWINDO.EXEOPEN for the file name

- Choose "File does not exist" in the next drop-down



Create a rule that matches a file

- Choose SYSTEM_DIR from the drop-down

- Type in BAWINDO.EXEOPENOPEN for the file name

- Choose "File does not exist" in the next drop-down





_____________



Se recomienda comprobar que el antivirus es´té actualizado y controle esta nueva variante.



saludos



ms, 29-09-2004

Cerrado

Volver a “ALERTAS VIRICAS y utilidades de eliminacion”