Log in

View Full Version : THIS VIRUS IS REAL AND BAD.........


lame
19th Sep 2001, 10:57
------------------------------------------------------------
** VIRUS ALERT - W32/Nimda@MM **
------------------------------------------------------------

McAfee.com has seen a large and growing number of systems
infected with the W32/Nimda@MM. This is a HIGH RISK virus
that is spread via email. W32/Nimda@MM also spreads via open
shares, the Microsoft Web Folder Transversal vulnerability
(also used by W32/CodeBlue), and a Microsoft content-type
spoofing vulnerability.

The email attachment name VARIES and may use the icon for an
Internet Explorer HTML document.

It will also attempt to spread itself as follows:

- The email messages created by the worm include content
that allows the worm to execute the attachment even if
the user does not open it.
- It modifies HTML documents, so that when this infected
window is accessed (locally or remotely), the machine
viewing the page is then infected.

Once infected, your system is used to seek out others to
infect over the Web.

AVERT is currently analyzing this threat and will post more
details online shortly.

PPRuNe Dispatcher
19th Sep 2001, 16:19
After hearing about this virus yesterday I made a point of not reading any emails until my virus checker was updated.

It was a good decision - there were two of the damned things waiting for me.

---Mik

millhampost
19th Sep 2001, 16:59
After checking with Norton (Symantec) and F-secure it seems this worm attacks through MS Internet Explorer, Outlook Express etc. So I've downloaded and am now using Netscape Navigator 6.1 as a browser, which should be immune (hope springs eternal)
This is as well as downloading the virus profiles!
Eman

lame
20th Sep 2001, 05:37
This threat can infect all unprotected users of Win9x/NT/2000/ME.

This is a HIGH RISK virus that is spread via email. The infected email can come from addresses that you recognize.W32/Nimda@MM also spreads via open shares, the Microsoft Web Folder Transversal vulnerability (also used by W32/CodeBlue), and a Microsoft content-type spoofing vulnerability. The email attachment name varies and may use the icon for an Internet Explorer HTML document.

Microsoft Outlook users - we recommend that you disable the Preview Pane. Viewing email messages with the Preview Pane can cause the virus to activate.

Customizing the program file extension list using VirusScan 4.5 (and higher) may result in a lack of protection against this Trojan. As always, AVERT recommends that users configure VirusScan to scan all files. If this is not an option in your environment, the default extension list should be used.




Payload - What can this virus do?

Its main goal is simply to spread over the Internet and Intranet, infecting as many users as possible and creating so much traffic that networks are virtually unusable.

It will attempt to spread itself as follows:
The email messages created by the worm specify a content-type of audio/x-wav with an executable attachment type. Thus when a message is accessed, the attachment can be executed even if the user does not open it and without the user's knowledge.


It adds JavaScript code to HTML documents, which opens a new browser window containing the infectious email message itself (taken from the dropped file README.EML). When this infected window is accessed (locally or remotely), the machine viewing the page is then infected.


It creates network shares for each local drive as %$ (where % = the drive letter that is being shared). On Win9x/ME system this is configured as a full share with no password. On WinNT/2K system the user GUEST is given permission to the share and added to the group ADMINISTRATORS as well as GUESTS. A reboot is required in order for these shares to get created. When the virus finds an open share, it copies itself to each folder on the drive in .EML format as described later on in this description. This can include the START UP folder.


The worm scans IP addresses looking for IIS servers to infect via the Web Folder Transversal vulnerability by sending a malformed GET request. This causes vulnerable machines to initiate a TFTP session to download ADMIN.DLL from the machine that sent the request. Once downloaded the remote system is instructed to execute the DLL that infects that machine. In the event that the TFTP session fails to connect, multiple files (TFTP*) are created in the WINDOWS TEMP directory. These files are simply copies of the worm.


It tries to use the backdoor created by W32/CodeRed.c to infect.


.EXE files are prepended with the worm code.


Email addresses are gathered by extracting the email addresses from MAPI messages in Microsoft Outlook and Microsoft Outlook Express, as well as from HTM and HMTL documents. The worm then sends itself to these addresses with either no subject line or a subject line containing a partial registry key path.

Once infected, your system is used to seek out others to infect over the web. As this creates a lot of port scanning, this can cause a network traffic jam.

It may copy itself to the WINDOWS SYSTEM directory as LOAD.EXE and create a SYSTEM.INI entry to load itself at startup:
Shell=explorer.exe load.exe -dontrunold

Additional information:

- A MIME encoded version of the worm is created in each folder on the system (often as README.EML or DESKTOP.EML, can also be .NWS files). This can create a lot of files and in some cases even fill up a hard disk.


- The WININIT.INI file may be used to delete specific worm files upon reboot:
NUL=C:\WINDOWS\TEMP\MEP52b0.TMP.exe


- Registry key values are created/changed to hide files:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Explorer\Advanced\HideFileExt
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Explorer\Advanced\Hidden
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Explorer\Advanced\ShowSuperHidden


- A registry key branch is deleted to remove share security under WinNT/2K

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\
lanmanserver\Share\Security


- The worm saves a copy of itself to C:\, D:\, and E:\ as ADMIN.DLL

Note: a valid ADMIN.DLL does exist and is part of the Microsoft FrontPage Server Extentsions functionality


- Filenames for the worm include: ADMIN.DLL, LOAD.EXE, MMC.EXE, README.EXE, RICHED20.DLL, MEP*.TMP.EXE

Note: applications which utilize the rich text format, such as Microsoft Word and Wordpad, call this RICHED20.DLL file. As such, the worm is executed when a dependant program is run. There is typically a valid RICHED20.DLL file in the WINDOWS SYSTEM directory, but this is overwriten by the virus.

Note: MMC.EXE is the name for the Microsoft Management Console application. It has been reported that the worm can in fact overwrite this file.

The virus contains the string : Concept Virus (CV) V.5, Copyright (C) 2001 R.P.China