Note: This is an archived topic. It is read-only.
  ProwlerOnline, Plymouth/Chrysler Prowler Discussion Forum
  Off Topic
  Virus-WareProwler.com (Page 2)

UBBFriend: Email This Page to Someone!

profile | register | preferences | faq | search


This topic is 2 pages long:   1  2 
This topic was originally posted in this forum: Tires, Rims Discusssion
Author Topic:   Virus-WareProwler.com
CTProwler
Prowler Junkie

Posts: 3915
From: Sherman CT USA
Registered: NOV 2002

posted 12-13-2002 10:50 AM     Click Here to See the Profile for CTProwler     
I got a Merry Xmas Email from WareProwler.com. Don't open It its a Virus!!!!CTProwler

------------------


CTProwler
Prowler Junkie

Posts: 3915
From: Sherman CT USA
Registered: NOV 2002

posted 12-13-2002 10:53 AM     Click Here to See the Profile for CTProwler     
WarePROWLER@ Happy Christmas is its exact spelling!!!

------------------


Dave Mills
Prowler Junkie

Posts: 5419
From: Johnstown, PA, USA
Registered: JUL 2000

posted 12-13-2002 11:23 AM     Click Here to See the Profile for Dave Mills     
I just got one also. Mine listed Ed Monahan as the sender, but I know it wasn't my pal Ed.


MeanGene
Prowler Junkie

Posts: 2407
From: Burtonsville, MD
Registered: JAN 2001

posted 12-13-2002 11:29 AM     Click Here to See the Profile for MeanGene     
Dave,

You have to choose your friends wisely

Your pal

Dave Mills
Prowler Junkie

Posts: 5419
From: Johnstown, PA, USA
Registered: JUL 2000

posted 12-13-2002 11:46 AM     Click Here to See the Profile for Dave Mills     
Gene, I do try, but some slip through.....


Marty Usher
Prowler Junkie

Posts: 13833
From: San Antonio, Texas
Registered: JUN 2001

posted 12-13-2002 11:58 AM     Click Here to See the Profile for Marty Usher     
As I stated on another thread, the number of infectd emails has really increased recently. It not stopped almost completely and now, in the past week and half I have received infected messages listing Bob Goetz, BeWare, Ed M., MeanGene, Topcat, prowleronline administrator, Todd, cnote, and others. All of them have variations of their screen names as senders and all have attachments of between 121 KB and 143 KB in .exe, .bat, and other formats. I just delete them without opening.

Somebody's computer with POA email addresses in an address book is infected. These emails are coming to both my work and home email addresses. If anyone sends me a message and I don't respond, it may be because I have deleted it by mistake.

Marty

Bob Goetz
Prowler Junkie

Posts: 2895
From: Belle Plaine MN USA
Registered: MAY 2001

posted 12-13-2002 12:02 PM     Click Here to See the Profile for Bob Goetz     
I just ran virus scan and came up with nothing? I will run again tonight and tommorow, if its me I'm sorry I try to run it once a week.


Marty Usher
Prowler Junkie

Posts: 13833
From: San Antonio, Texas
Registered: JUN 2001

posted 12-13-2002 12:35 PM     Click Here to See the Profile for Marty Usher     
quote:
Originally posted by Bob Goetz:
I just ran virus scan and came up with nothing? I will run again tonight and tommorow, if its me I'm sorry I try to run it once a week.

Bob - the emails aren't coming from the senders that are listed on the emails. I am certainly not smart enough to figure out where they originate, but I did not mean to imply anybody was sending them on purpose. In the past when I got these and asked the senders if they had esent an email, they all said no so I believe someone has a lot of POA listed in their address book and the virus picks a sender, picks a recipient, makes up a subject and attaches an executable document that contains the virus.

Marty

Black Tie 161
Prowler Junkie

Posts: 3563
From: MD, USA
Registered: JUL 2002

posted 12-13-2002 12:56 PM     Click Here to See the Profile for Black Tie 161     
Virus Profile

Virus Name: Risk Assessment:
W32/Klez.h@MM Medium



Virus Information:
Date Discovered: 4/17/2002
Date Added: 4/17/2002
Origin: Unknown
Length: approx 90kB
Type: Internet Worm
SubType: Win32
DAT Required: 4182

Quick Links:
Virus Characteristics
Indications of Infection
Method of Infection
Removal Instructions
Aliases
Send Virus Info via Email





Update VirusScan
Online


Download the latest
DAT files




Virus Characteristics:

--- Update 4/30/2002 ---
This virus remains at a Medium Risk overall, however AVERT is still seeing many infections reported from Home Users and is informing Home Users that they are STILL at a HIGHER likelyhood of infection than corporate users.
HOME USERS SHOULD UPDATE THEIR DATS AS SOON AS POSSIBLE TO PREVENT INFECTION

--- Update 4/18/2002 ---
AVERT has raised the risk assessment of this threat to Medium after seeing an increase in prevalence over the past 24 hours. Home users are at a greater risk of infection, as they tend to update their DATs less frequently then corporations. As such, the risk of becoming infected in a corporate environment is lower.

This latest W32/Klez variant is already detected as W32/Klez.gen@MM by McAfee products using the 4182 DATs (23 January 2002) or greater.

W32/Klez.h@MM has a number of similarities to previous W32/Klez variants, for example:

W32/Klez.h@MM makes use of Incorrect MIME Header Can Cause IE to Execute E-mail Attachment vulnerability in Microsoft Internet Explorer (ver 5.01 or 5.5 without SP2).
the worm has the ability to spoof the From: field (often set to an address found on the victim machine).
the worm attempts to unload several processes (antivirus programs) from memory. Including those containing the following strings:
_AVP32
_AVPCC
NOD32
NPSSVC
NRESQ32
NSCHED32
NSCHEDNT
NSPLUGIN
NAV
NAVAPSVC
NAVAPW32
NAVLU32
NAVRUNR
NAVW32
_AVPM
ALERTSVC
AMON
AVP32
AVPCC
AVPM
N32SCANW
NAVWNT
ANTIVIR
AVPUPD
AVGCTRL
AVWIN95
SCAN32
VSHWIN32
F-STOPW
F-PROT95
ACKWIN32
VETTRAY
VET95
SWEEP95
PCCWIN98
IOMON98
AVPTC
AVE32
AVCONSOL
FP-WIN
DVP95
F-AGNT95
CLAW95
NVC95
SCAN
VIRUS
LOCKDOWN2000
Norton
Mcafee
Antivir
The worm is able to propagate over the network by copying itself to network shares (assuming sufficient permissions exist). Target filenames are chosen randomly, and can have single or double file extensions. For example:
350.bak.scr
bootlog.jpg
user.xls.exe

The worm may also copy itself into RAR archives, for example:
HREF.mpeg.rar
HREF.txt.rar
lmbtt.pas.rar

The worm mails itself to email addresses in the Windows Address Book, plus addresses extracted from files on the victim machine. It arrives in an email message whose subject and body is composed from a pool of strings carried within the virus (the virus can also add other strings obtained from the local machine). For example:

Subject: A very funny website
or Subject: Undeliverable mail--
or Subject: Returned mail--
or Subject: A WinXP patch
or Subject: A IE 6.0 patch
or Subject: W32.Elkern removal tools
or Subject: W32.Klez.E removal tools

The file attachment name is again generated randomly, and ends with a .exe, .scr, .pif, or .bat extension, for example:
ALIGN.pif
User.bat
line.bat

Thanks to the use of the exploit described above, simply opening or previewing the message in a vulnerable mail client can result in infection of the victim machine.

W32/Klez.h@MM masquerades as a free immunity tool in at least one of the messages used. Below is the message sent by the virus itself.

Subject: Worm Klez.E Immunity
Body: Klez.E is the most common world-wide spreading worm. It's very dangerous by corrupting your files. Because of its very smart stealth and anti-anti-virus technic,most common AV software can't detect or clean it.We developed this free immunity tool to defeat the malicious virus. You only need to run this tool once,and then Klez will never come into your PC.

NOTE: Because this tool acts as a fake Klez to fool the real worm,some AV monitor maybe cry when you run it. If so,Ignore the warning,and select 'continue'. If you have any question,please mail to me.

The worm may send a clean document in addition to an infected file. A document found on the hard disk, that contains one of the following extensions, is sent:

.txt
.htm
.html
.wab
.asp
.doc
.rtf
.xls
.jpg
.cpp
.c
.pas
.mpg
.mpeg
.bak
.mp3
.pdf
This payload can result in confidental information being sent to others.




Indications Of Infection:

Randomly/oddly named files on network shares, as described above.
Reference to a WINKxxx.EXE file ("xxx" looks random) in a Registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run





Method Of Infection:

This virus can be considered a blended threat. It mass-mails itself to email addresses found on the local system, exploits a Microsoft vulnerability, spreads via network shares, infects executables on the local system, and drops an additional file infecting virus, W32/Elkern.cav.c.




Removal Instructions:

Use current engine and DAT files for detection.
Once infected, VirusScan may not be able to run as the virus can terminate the process before any scanning/removal is accomplished. The following steps will circumvent this action and allow for proper VirusScan scanning/removal, by using the command-line scanner.

Ensure that you are using the minimum DAT specified or higher.
Close all running applications
Disconnect the system from the network
Go to a command prompt, then change to the VirusScan engine directory:
Win9x/ME - Click START | RUN, type command and hit ENTER.
Type cd \progra~1\common~1\networ~1\viruss~1\40~1.xx and hit ENTER
WinNT/2K/XP - Click START | RUN, type cmd and hit ENTER.
Type cd \progra~1\common~1\networ~1\viruss~1\4.0.xx and hit ENTER
Rename SCAN.EXE to CLEAN.EXE to prevent the virus from terminating the process and deleting files. Type, ren scan.exe clean.exe and hit ENTER
First, scan the system directory
Win9x/ME - Type clean.exe %windir%\system\win*.exe and hit ENTER
WinNT/2K/XP - Type clean.exe %windir%\system32\win*.exe and hit ENTER
Once the scan has completed, Type clean.exe /adl /clean and hit ENTER
Rename scan.exe. Type, ren clean.exe scan.exe and hit ENTER
After scanning and removal is complete, reboot the system
Apply Internet Explorer patch if necessary.

Klez can delete anti-virus software files. It may be necessary to reinstall VirusScan after cleaning a system.

Additional Windows ME/XP removal considerations




Aliases:

W32/Klez.G@mm (Norman), W32/Klez.gen@MM, W32/Klez.I (Panda), W32/Klez.K-mm, WORM_KLEZ.G (Trend)





Gary C
Prowler Junkie

Posts: 12017
From: San Diego Area
Registered: JUL 2000

posted 12-13-2002 01:57 PM     Click Here to See the Profile for Gary C     
If I got get three or more a day, I think no one loves me


CTProwler
Prowler Junkie

Posts: 3915
From: Sherman CT USA
Registered: NOV 2002

posted 12-13-2002 02:36 PM     Click Here to See the Profile for CTProwler     
Just got another!!!Judy@Prowleronline.com

------------------


This topic is 2 pages long:   1  2 

All times are CT (US)

This is an ARCHIVED topic. You may not reply to it!
Hop to:

Contact Us | Prowler Online Homepage

All material contained herein, Copyright 2000 - 2012 ProwlerOnline.com
E-Innovations, LP

POA Terms of Service

Powered by Infopop www.infopop.com © 2000
Ultimate Bulletin Board 5.45c