aaus-list @ ukrainianstudies.org -- [aaus-list] Fwd: Virus problems/alert (from the list-owner)
[Date Prev][Date Next][Thread Prev][Thread Next][Date/Main Index][Thread Index]
Dear All,
In the past few days the aaus-list seems to have been the target of a
significant virus attack. It is difficult for me to tell if things
are getting through the list or not, since I receive material both as
the list-owner and as a member. My guess is that none of the messages
that have come through to my personal account as list-owner have been
broadcast to the entire list, since I would get multiple copies (and
have not). However, one list member did tell me that she had received
questionable aaus-list e-mails, so I am putting out a general
questionnaire to find out what's what. If you can confirm that
aaus-list messages have come to you with the virus (see description
below), please send a very short message to me at
radelo@earthlink.net.
I think what is going on is that the individual e-mail address books
of several people in the North American Ukrainian studies community
(and many, many other Ukraine- and Russia-based individuals) have
been infected with the Klezmer virus. I myself have received two
dozen infected messages/files over the past three days. Several of
them came from aaus-list members' accounts. The bulk have come from
Ukraine- and Russia-based individuals or organizations. About half
have been attempts to propagate through aaus-list that bounced to me
as list-owner. The other half came directly to me. I strongly advise
that those of you with PCs do not open .exe, .rar, .bat, or .scr
files that you do not expect to get. Likewise, do not open an e-mail
message that is 1K or 0K in length, but with an attachment, unless
you expect it. One of the files came to me camouflaged as a "Klezmer
removal executable." Those who are using Macintosh computers should
be okay, but should immediately trash the suspected files.
Information on this virus follows. I strongly recommend that
everyone--especially those in the PC/Windows crowd--follow the
instructions that follow. As always, keeping your virus protection up
to date is critical. Note also that you may have personal information
or confidential files forwarded to others by this worm, so quick
action to neutralize it is recommended.
Robert De Lossa
------------------------------------------------------------
** VIRUS NOTICE - W32/Klez.h@MM **
------------------------------------------------------------
Dear Robert,
McAfee.com has seen a growing number of computers infected
with W32/Klez.h@MM. The risk assessment has been updated to
MEDIUM. As always, we recommend that you keep your
anti-virus software up-to-date for the best protection.
McAfee.com will continue to update you on the latest details
of the W32/Klez.h@MM virus, click here for more information:
===> http://clinic.mcafee.com/clinic/ibuy/campaign.asp?cid=3149
Sincerely,
McAfee.com
[the link above leads to: ]
____________________________________________________________
W32/Klez.h@MM Medium
Virus Information:
Date Discovered: 4/17/2002
Date Added: 4/17/2002
Origin: Unknown
Length: approx 90kB
Type: Internet Worm
SubType: Win32
DAT Required: 4182
Quick Links:
Virus Characteristics
Indications of Infection
Method of Infection
Removal Instructions
Aliases
Send Virus Info via Email
Update VirusScan
Online
Download the latest
DAT files
Virus Characteristics:
--- Update 4/18/2002 ---
AVERT has raised the risk assessment of this threat to Medium after
seeing an increase in prevalence over the past 24 hours. Home users
are at a greater risk of infection, as they tend to update their DATs
less frequently then corporations. As such, the risk of becoming
infected in a corporate environment is lower.
This latest W32/Klez variant is already detected as W32/Klez.gen@MM
by McAfee products using the 4182 DATs (23 January 2002) or greater.
W32/Klez.h@MM has a number of similarities to previous W32/Klez
variants, for example:
* W32/Klez.h@MM makes use of Incorrect MIME Header Can Cause IE
to Execute E-mail Attachment vulnerability in Microsoft Internet
Explorer (ver 5.01 or 5.5 without SP2).
* the worm has the ability to spoof the From: field (often set
to an address found on the victim machine).
* the worm attempts to unload several processes (antivirus
programs) from memory. Including those containing the following
strings:
* _AVP32
* _AVPCC
* NOD32
* NPSSVC
* NRESQ32
* NSCHED32
* NSCHEDNT
* NSPLUGIN
* NAV
* NAVAPSVC
* NAVAPW32
* NAVLU32
* NAVRUNR
* NAVW32
* _AVPM
* ALERTSVC
* AMON
* AVP32
* AVPCC
* AVPM
* N32SCANW
* NAVWNT
* ANTIVIR
* AVPUPD
* AVGCTRL
* AVWIN95
* SCAN32
* VSHWIN32
* F-STOPW
* F-PROT95
* ACKWIN32
* VETTRAY
* VET95
* SWEEP95
* PCCWIN98
* IOMON98
* AVPTC
* AVE32
* AVCONSOL
* FP-WIN
* DVP95
* F-AGNT95
* CLAW95
* NVC95
* SCAN
* VIRUS
* LOCKDOWN2000
* Norton
* Mcafee
* Antivir
The worm is able to propagate over the network by copying itself to
network shares (assuming sufficient permissions exist). Target
filenames are chosen randomly, and can have single or double file
extensions. For example:
350.bak.scr
bootlog.jpg
user.xls.exe
The worm may also copy itself into RAR archives, for example:
HREF.mpeg.rar
HREF.txt.rar
lmbtt.pas.rar
The worm mails itself to email addresses in the Windows Address Book,
plus addresses extracted from files on the victim machine. It arrives
in an email message whose subject and body is composed from a pool of
strings carried within the virus. For example:
Subject: A very funny website
or Subject: 1996 Microsoft Corporation
or Subject: Hello,honey
or Subject: Initing esdi
or Subject: Editor of PC Magazine.
or Subject: Some questions
or Subject: Telephone number
The file attachment name is again generated randomly, and ends with a
.exe, .scr, .pif, or .bat extension, for example:
ALIGN.pif
User.bat
line.bat
Thanks to the use of the exploit described above, simply opening or
previewing the message in a vulnerable mail client can result in
infection of the victim machine.
W32/Klez.h@MM masquerades as a free immunity tool in at least one of
the messages used:
Subject: Worm Klez.E Immunity
Body: Klez.E is the most common world-wide spreading worm. It's very
dangerous by corrupting your files. Because of its very smart stealth
and anti-anti-virus technic,most common AV software can't detect or
clean it.We developed this free immunity tool to defeat the malicious
virus. You only need to run this tool once,and then Klez will never
come into your PC.
NOTE: Because this tool acts as a fake Klez to fool the real
worm,some AV monitor maybe cry when you run it. If so,Ignore the
warning,and select 'continue'. If you have any question,please mail
to me.
The worm may send a clean document in addition to an infected file. A
document found on the hard disk, that contains one of the following
extensions, is sent:
* .txt
* .htm
* .html
* .wab
* .asp
* .doc
* .rtf
* .xls
* .jpg
* .cpp
* .c
* .pas
* .mpg
* .mpeg
* .bak
* .mp3
* .pdf
This payload can result in confidental information being sent to others.
Indications of Infection:
Indications Of Infection:
* Randomly/oddly named files on network shares, as described above.
* Reference to a WINKxxx.EXE file ("xxx" looks random) in a Registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Method of Infection:
Indications Of Infection:Method Of Infection:
This virus can be considered a blended threat. It mass-mails itself
to email addresses found on the local system, exploits a Microsoft
vulnerability, spreads via network shares, infects executables on the
local system, and drops an additional file infecting virus,
W95/Elkern.cav.c.
Removal Instructions:
Removal Instructions:
Use current engine and DAT files for detection.
Once infected, VirusScan may not be able to run as the virus can
terminate the process before any scanning/removal is accomplished.
The following steps will circumvent this action and allow for proper
VirusScan scanning/removal, by using the command-line scanner.
1. Download and install the DAILY DAT files
(http://www.mcafeeb2b.com/naicommon/avert/avert-research-center/virus-4d.asp)
2. Close all running applications
3. Disconnect the system from the network
4. Click START | RUN, type command and hit ENTER
5. Change to the VirusScan engine directory:
* Win9x/ME - Type cd
\progra~1\common~1\networ~1\viruss~1\40~1.xx and hit ENTER
*
WinNT/2K/XP - Type cd
\progra~1\common~1\networ~1\viruss~1\40F809~1.xx and hit ENTER
6. First, scan the system directory
* Win9x/ME - Type scan.exe %windir%\system\win*.exe and hit ENTER
*
WinNT/2K/XP - Type scan.exe %windir%\system32\win*.exe and hit ENTER
7. Once the scan has completed, Type scan.exe /adl /clean and hit ENTER
8. After scanning and removal is complete, reboot the system
Additional Windows ME/XP removal considerations
Aliases:
W32/Klez.G@mm (Norman), W32/Klez.gen@MM, W32/Klez.I (Panda),
W32/Klez.K-mm, WORM_KLEZ.G (Trend)
[Date Prev][Date Next][Thread Prev][Thread Next][Date/Main Index][Thread Index]
lists@brama.com converted by
MHonArc
2.3.3
and maintained by
BRAMA, Inc.