Go Back  PPRuNe Forums > Dunnunda, Godzone and the Pacific
Reload this Page >

THIS VIRUS IS REAL AND BAD............

Wikiposts
Search
Dunnunda, Godzone and the Pacific An independent family of forums covering all aspects of the Australian/NZ aviation scene.

THIS VIRUS IS REAL AND BAD............

 
Thread Tools
 
Search this Thread
 
Old 19th Sep 2001, 10:54
  #1 (permalink)  
lame
Guest
 
Posts: n/a
Exclamation THIS VIRUS IS REAL AND BAD............

------------------------------------------------------------
** VIRUS ALERT - W32/Nimda@MM **
------------------------------------------------------------

McAfee.com has seen a large and growing number of systems
infected with the W32/Nimda@MM. This is a HIGH RISK virus
that is spread via email. W32/Nimda@MM also spreads via open
shares, the Microsoft Web Folder Transversal vulnerability
(also used by W32/CodeBlue), and a Microsoft content-type
spoofing vulnerability.

The email attachment name VARIES and may use the icon for an
Internet Explorer HTML document.

It will also attempt to spread itself as follows:

- The email messages created by the worm include content
that allows the worm to execute the attachment even if
the user does not open it.
- It modifies HTML documents, so that when this infected
window is accessed (locally or remotely), the machine
viewing the page is then infected.

Once infected, your system is used to seek out others to
infect over the Web.

AVERT is currently analyzing this threat and will post more
details online shortly.
 
Old 19th Sep 2001, 11:20
  #2 (permalink)  
 
Join Date: Oct 1998
Location: Kalgoorlie, W.A. , Australia
Age: 86
Posts: 458
Likes: 0
Received 0 Likes on 0 Posts
Exclamation

Was about to email you to make this post mate.

The above was posted from McAfee on Tue, 18 Sep 2001 17:24:51 -0700

As Lame's post's title says this one is for real & more invasive than previous worms.

Moderators please don't move this thread to computers untill everybodies had a chance to see it Thanks.
Pom Pax is offline  
Old 19th Sep 2001, 11:45
  #3 (permalink)  
lame
Guest
 
Posts: n/a
Thumbs up

Pom Pax,

Thank you.

Woomera has agreed previously that these things affect ALL PPRuNers, and posts warning of them ARE okay.

Best regards,

"lame"


 
Old 19th Sep 2001, 12:06
  #4 (permalink)  
Seasonally Adjusted
 
Join Date: Nov 2000
Location: ...deep fine leg
Posts: 1,125
Received 0 Likes on 0 Posts
Post

Pompax...when would you find the time to sit down in front of a computer?

TQ, formerly Kookus.
Towering Q is offline  
Old 19th Sep 2001, 16:18
  #5 (permalink)  
 
Join Date: Jan 1999
Location: Australia
Posts: 56
Likes: 0
Received 0 Likes on 0 Posts
Post

So what exactly does this worm do?
Does it destroy/alter files in some way?

Turbofan
Turbofan is offline  
Old 20th Sep 2001, 02:42
  #6 (permalink)  
 
Join Date: Feb 2001
Location: Melbourne, Australia
Age: 84
Posts: 492
Likes: 0
Received 0 Likes on 0 Posts
Post

LAME:- Thanks for the virus info but, on a more important note, have you heard anything about your friends in the U.S?

Kind regards,

TheNightOwl.
TheNightOwl is offline  
Old 20th Sep 2001, 05:19
  #7 (permalink)  
lame
Guest
 
Posts: n/a
Unhappy

TheNightOwl,

No, nothing yet?

From those latest aerial pictures, it appears our apartment block is still standing, so hopefully those people are okay.

Of course many people that we met on a daily basis in the WTC are gone, from the people in the bank, to the people on both the NY and PATH Subways, Chemist and Doctors etc etc, VERY SAD time..........

That is why I was getting a little emotional and upset on those threads the other night, which I now avoid, I just cannot begin to understand how anyone can defend the Monsters that did that to Manhattan.

Best regards,

"lame"
 
Old 20th Sep 2001, 05:32
  #8 (permalink)  
lame
Guest
 
Posts: n/a
Talking

Turbofan,

You just had to ask?

Now "please explain" it.......

Best regards,

"lame"

This threat can infect all unprotected users of Win9x/NT/2000/ME.

This is a HIGH RISK virus that is spread via email. The infected email can come from addresses that you recognize.W32/Nimda@MM also spreads via open shares, the Microsoft Web Folder Transversal vulnerability (also used by W32/CodeBlue), and a Microsoft content-type spoofing vulnerability. The email attachment name varies and may use the icon for an Internet Explorer HTML document.

Microsoft Outlook users - we recommend that you disable the Preview Pane. Viewing email messages with the Preview Pane can cause the virus to activate.

Customizing the program file extension list using VirusScan 4.5 (and higher) may result in a lack of protection against this Trojan. As always, AVERT recommends that users configure VirusScan to scan all files. If this is not an option in your environment, the default extension list should be used.




Payload - What can this virus do?

Its main goal is simply to spread over the Internet and Intranet, infecting as many users as possible and creating so much traffic that networks are virtually unusable.

It will attempt to spread itself as follows:
The email messages created by the worm specify a content-type of audio/x-wav with an executable attachment type. Thus when a message is accessed, the attachment can be executed even if the user does not open it and without the user's knowledge.


It adds JavaScript code to HTML documents, which opens a new browser window containing the infectious email message itself (taken from the dropped file README.EML). When this infected window is accessed (locally or remotely), the machine viewing the page is then infected.


It creates network shares for each local drive as %$ (where % = the drive letter that is being shared). On Win9x/ME system this is configured as a full share with no password. On WinNT/2K system the user GUEST is given permission to the share and added to the group ADMINISTRATORS as well as GUESTS. A reboot is required in order for these shares to get created. When the virus finds an open share, it copies itself to each folder on the drive in .EML format as described later on in this description. This can include the START UP folder.


The worm scans IP addresses looking for IIS servers to infect via the Web Folder Transversal vulnerability by sending a malformed GET request. This causes vulnerable machines to initiate a TFTP session to download ADMIN.DLL from the machine that sent the request. Once downloaded the remote system is instructed to execute the DLL that infects that machine. In the event that the TFTP session fails to connect, multiple files (TFTP*) are created in the WINDOWS TEMP directory. These files are simply copies of the worm.


It tries to use the backdoor created by W32/CodeRed.c to infect.


.EXE files are prepended with the worm code.


Email addresses are gathered by extracting the email addresses from MAPI messages in Microsoft Outlook and Microsoft Outlook Express, as well as from HTM and HMTL documents. The worm then sends itself to these addresses with either no subject line or a subject line containing a partial registry key path.

Once infected, your system is used to seek out others to infect over the web. As this creates a lot of port scanning, this can cause a network traffic jam.

It may copy itself to the WINDOWS SYSTEM directory as LOAD.EXE and create a SYSTEM.INI entry to load itself at startup:
Shell=explorer.exe load.exe -dontrunold

Additional information:

- A MIME encoded version of the worm is created in each folder on the system (often as README.EML or DESKTOP.EML, can also be .NWS files). This can create a lot of files and in some cases even fill up a hard disk.


- The WININIT.INI file may be used to delete specific worm files upon reboot:
NUL=CWINDOWS\TEMP\MEP52b0.TMP.exe


- Registry key values are created/changed to hide files:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Explorer\Advanced\HideFileExt
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Explorer\Advanced\Hidden
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Explorer\Advanced\ShowSuperHidden


- A registry key branch is deleted to remove share security under WinNT/2K

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\
lanmanserver\Share\Security


- The worm saves a copy of itself to C, D, and E as ADMIN.DLL

Note: a valid ADMIN.DLL does exist and is part of the Microsoft FrontPage Server Extentsions functionality


- Filenames for the worm include: ADMIN.DLL, LOAD.EXE, MMC.EXE, README.EXE, RICHED20.DLL, MEP*.TMP.EXE

Note: applications which utilize the rich text format, such as Microsoft Word and Wordpad, call this RICHED20.DLL file. As such, the worm is executed when a dependant program is run. There is typically a valid RICHED20.DLL file in the WINDOWS SYSTEM directory, but this is overwriten by the virus.

Note: MMC.EXE is the name for the Microsoft Management Console application. It has been reported that the worm can in fact overwrite this file.

The virus contains the string : Concept Virus (CV) V.5, Copyright (C) 2001 R.P.China
 
Old 20th Sep 2001, 07:35
  #9 (permalink)  
 
Join Date: Mar 2001
Posts: 190
Likes: 0
Received 0 Likes on 0 Posts
Post

For those of you using McAfee, Sdat 4160 dated 18 Sept 01 detects and removes this one.

Available at McAfee Virusscan Update page

Note this is only for McAfee users.

Snooze
Capt Snooze is offline  
Old 20th Sep 2001, 17:37
  #10 (permalink)  
 
Join Date: Apr 2000
Location: Devonport Tasmania Australia
Posts: 1,837
Likes: 0
Received 0 Likes on 0 Posts
Post

Also FYI fellow PPRubers - Norton also seems to predict and shut this one down.

Do a live update- NOW

It hit 3 times at work today and thank God- no damage.

Best as always


EWL
Eastwest Loco is offline  
Old 21st Sep 2001, 10:54
  #11 (permalink)  
lame
Guest
 
Posts: n/a
Exclamation

Heard a news item on the radio this morning, to the effect that it has caused the shutdown of most of the Australian Government computers, among others........
 
Old 24th Sep 2001, 08:16
  #12 (permalink)  
cam
 
Join Date: Apr 2001
Location: Adelaide South Australia
Posts: 18
Likes: 0
Received 0 Likes on 0 Posts
Unhappy

It has had our network down since last thursday and are back online just this morning. My computer needed a new hard drive
cam is offline  
 

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are Off



Contact Us - Archive - Advertising - Cookie Policy - Privacy Statement - Terms of Service

Copyright © 2024 MH Sub I, LLC dba Internet Brands. All rights reserved. Use of this site indicates your consent to the Terms of Use.