Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Panda Software Weekly virus report

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU
 
Prisoner_Number_Six Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Oct-10-03 11:11 PM
Original message
Panda Software Weekly virus report
Posted in GD as a public service. If deemed inappropriate for this forum, Mods please move or lock.

The poster is not an employee of, or associated in any way with Panda Software.
---

Weekly virus report

Virus Alerts, by Panda Software (http://www.pandasoftware.com)

Madrid, October 10, 2003 - In this week's virus report we are going to focus on three Trojans -IRCBot.D, Ruledor.A and Pup.A-, the worm Gaobot.S and two new versions of Gibe.C.

IRCBot.D sends itself out via e-mail in a message with the subject 'Last Update' and an attachment called 'NAV32.EXE', which tries to trick the user into thinking that it has been sent by an antivirus company. When the attached file is run, IRCBot.D goes memory resident and connects to an IRC channel. From this channel, this malicious code receives commands to carry out the following actions, among others: redirect ports, download and run files, scan ports, launch Denial of Service (DoS) attacks and send itself to other IRC channels.

The second Trojan in today's report is Ruledor.A, which installs different variants of the Trojan Istbar, adds a toolbar to the Internet Explorer browser, displays advertising pop-up windows and, due to programming errors, sometimes ends the process belonging to Internet Explorer. When the user types a web address in Internet Explorer, Ruledor.A checks if there is a similar address among its advertisements and if there is, it redirects the user to this web address.

Today's third Trojan, Pup.A goes memory resident and opens different advertising web pages in Internet Explorer whenever it is run. When the user tries to close them, the Internet Explorer window is minimized, pointing to a web page that contains a PHP routine. This routine accesses certain web addresses, without the user realizing, and sends out information on the creator of the Trojan, who receives money in exchange for the number of visits received.

The first worm we are going to describe is Gaobot.S, which has backdoor characteristics and infects Windows XP/2000/NT computers. In order to spread to as many computers as possible, this worm exploits the RPC DCOM and WebDAV vulnerabilities. It also spreads by trying to copy itself to shared network resources, which it tries to access using typical passwords. When it is run, Gaobot.S connects to a specified IRC server through port 6667 and waits for control commands.

Gaobot.S ends processes belonging to antivirus programs, firewalls and system monitoring tools, leaving the affected computer vulnerable to the attack from other viruses or worms. It also ends the processes of Nachi.A, Autorooter.A, Sobig.F and several variants of Blaster. Due to its backdoor characteristics, Gaobot.S can also obtain information on the affected computer, run files on it, launch Distributed Denial of Service (DDoS) attacks, upload files via FTP, etc.

We are going to finish this report with two new versions of the Gibe.C worm. This malicious code spreads via e-mail, the P2P file sharing program, KaZaA, shared network drives and IRC. The differences between the original worm and these new versions are that they are compressed with UPX and the texts displayed when the worm is run and sent.

For further information about these and other malicious code, visit Panda Software's Virus Encyclopedia at: http://www.pandasoftware.com/virus_info/encyclopedia/

Additional information

- Scanning -ports, IP addresses-: The action of identifying the communications ports and/or IP addresses of a computer and getting information about their status. This action can sometimes be considered an attack or security risk.

- Redirect: Access one address via another.

- Routine: Invariable sequence of instructions, that make up part of a program and can be used repeatedly.

More definitions of virus and antivirus terminology at: http://www.pandasoftware.com/virus_info/glossary/default.aspx

NOTE: The addresses above may not show up on your screen as single lines. This would prevent you from using the links to access the web pages. If this happens, just use the 'cut' and 'paste' options to join the pieces of the URL.
Printer Friendly | Permalink |  | Top
Prisoner_Number_Six Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-11-03 09:19 AM
Response to Original message
1. kick
for the morning folk
Printer Friendly | Permalink |  | Top
 
Prisoner_Number_Six Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-11-03 02:39 PM
Response to Reply #1
2. kick
One more for the Saturday late sleepers
Printer Friendly | Permalink |  | Top
 
newyawker99 Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Oct-11-03 04:20 PM
Response to Reply #2
3. kick
:kick:
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Wed May 01st 2024, 03:06 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (Through 2005) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC