Home Francais E-mail Animanga - Anime and Manga Services





Search :



Subject:
From:
URL:
E-mail:
Re: OT: Receiving viruses with anime names??? (Thu Oct 3 06:43:17 2002 )
Ms. Poe [View profile ]
http://www.tokyoanime2.com
mspoe@kc.rr.com

Yip...I get one about everyday -_-!  It's the 
Klez worm alright.  Thankfully Norton catches it 
& takes care of the sucker before it has a chance 
to embed itself into my computer.  Here's what it 
does:

*****************

Damage 

Payload: This worm infects executables by 
creating a hidden copy of the original host file 
and then overwriting the original file with 
itself. The hidden copy is encrypted, but 
contains no viral data. The name of the hidden 
file is the same as the original file, but with a 
random extension. 
Large scale e-mailing: This worm searches the 
Windows address book, the ICQ database, and local 
files for email addresses. The worm sends an 
email message to these addresses with itself as 
an attachment. 

Releases confidential info: Worm randomly chooses 
a file from the machine to send along with the 
worm to recipients. So files with the 
extensions: ".mp8" or ".txt" or ".htm" or ".html" 
or ".wab" or ".asp" or ".doc" or ".rtf" or ".xls" 
or ".jpg" or ".cpp" or ".pas" or ".mpg" 
or ".mpeg" or ".bak" or ".mp3" or ".pdf" would be 
attached to e-mail messages along with the viral 
attachment. 
Distribution 

Subject of email: Random 
Name of attachment: Random 


When this worm is executed, it does the following:

It copies itself to \%System%\Wink.exe.

NOTE: %System% is a variable. The worm locates 
the Windows System folder (by default this is 
C:\Windows\System or C:\Winnt\System32) and 
copies itself to that location.

It adds the value

Wink %System%\Wink.exe

to the registry key

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curr
entVersion\Run

or it creates the registry key

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Servic
es\Wink[random characters]

and inserts a value in that subkey so that the 
worm is executed when you start Windows.

The worm attempts to disable on-access virus 
scanners and some previously distributed worms 
(such as W32.Nimda and CodeRed) by stopping any 
active processes. The worm removes the startup 
registry keys used by antivirus products and 
deletes checksum database files including:

Anti-Vir.dat
Chklist.dat
Chklist.ms
Chklist.cps
Chklist.tav
Ivb.ntz
Smartchk.ms
Smartchk.cps
Avgqt.dat
Aguard.dat

Local and Network Drive copying:
The worm copies itself to local, mapped, and 
network drives as: 
A random file name that has a double extension. 
For example, Filename.txt.exe. 
A .rar archive that has a double extension. For 
example, Filename.txt.rar.

Email:
This worm searches the Windows address book, the 
ICQ database, and local files for email 
addresses. The worm sends an email message to 
these addresses with itself as an attachment. The 
worm contains its own SMTP engine and attempts to 
guess at available SMTP servers. For example, if 
the worm encounters the address user@abc123.com 
it will attempt to send email via the server 
smtp.abc123.com.

The subject line, message bodies, and attachment 
file names are random. The From address is 
randomly-chosen from email addresses that the 
worm finds on the infected computer.

The worm will search files that have the 
following extensions for email addresses:
mp8
.exe
.scr
.pif
.bat
.txt
.htm
.html
.wab
.asp
.doc
.rtf
.xls
.jpg
.cpp
.pas
.mpg
.mpeg
.bak
.mp3
.pdf

In addition to the worm attachment, the worm also 
may attach a random file from the computer. The 
file will have one of the following extensions:
mp8
.txt
.htm
.html
.wab
.asp
.doc
.rtf
.xls
.jpg
.cpp
.pas
.mpg
.mpeg
.bak
.mp3
.pdf

As a result, the email message would have 2 
attachments, the first being the worm and the 
second being the randomly-selected file.

The email message that this worms sends is 
composed of "random" strings. The subject can be 
one of the following:

Worm Klez.E immunity
Undeliverable mail--"[Random word]"
Returned mail--"[Random word]"
a [Random word] [Random word] game
a [Random word] [Random word] tool
a [Random word] [Random word] website
a [Random word] [Random word] patch
[Random word] removal tools
how are you
let's be friends
darling
so cool a flash,enjoy it
your password
honey
some questions
please try again
welcome to my hometown
the Garden of Eden
introduction on ADSL
meeting notice
questionnaire
congratulations
sos!
japanese girl VS playboy
look,my beautiful girl friend
eager to see you
spice girls' vocal concert
japanese lass' sexy pictures

The random word will be one of the following:
new
funny
nice
humour
excite
good
powful
WinXP
IE 6.0
W32.Elkern
W32.Klez.E
Symantec
Mcafee
F-Secure
Sophos
Trendmicro
Kaspersky

The body of the email message is random.

Email spoofing
This worm often uses a technique known 
as "spoofing." When it performs its email 
routine. it can use a randomly chosen address 
that it finds on an infected computer as 
the "From:" address, numerous cases have been 
reported in which users of uninfected computers 
received complaints that they sent an infected 
message to someone else.

For example, Linda Anderson is using a computer 
that is infected with W32.Klez.H@mm. Linda is not 
using a antivirus program or does not have 
current virus definitions. When W32.Klez.H@mm 
performs its emailing routine, it finds the email 
address of Harold Logan. It inserts Harold's 
email address into the "From:" portion of an 
infected message that it then sends to Janet 
Bishop. Janet then contacts Harold and complains 
that he sent her an infected message, but when 
Harold scans his computer, Norton AntiVirus does 
not find anything--as would be expected--because 
his computer is not infected.

If you are using a current version of Norton 
AntiVirus and have the most recent virus 
definitions, and a full system scan with Norton 
AntiVirus set to scan all files does not find 
anything, you can be confident that your computer 
is not infected with this worm.

There have been several reports that, in some 
cases, if you receive a message that the virus 
has sent using its own SMTP engine, the message 
appears to be a "postmaster bounce message" from 
your own domain. For example, if your email 
address is jsmith@anyplace.com, you could receive 
a message that appears to be from 
postmaster@anyplace.com, indicating that you 
attempted to send email and the attempt failed. 
If this is the false message that is sent by the 
virus, the attachment includes the virus itself. 
Of course, such attachments should not be opened.

The message may be disguised as an immunity tool. 
One version of this false message is as follows:

Klez.E is the most common world-wide spreading 
worm. It's very dangerous by corrupting your 
files. Because of its very smart stealth and anti-
anti-virus technic,most common AV software can't 
detect or clean it.We developed this free 
immunity tool to defeat the malicious virus. You 
only need to run this tool once,and then Klez 
will never come into your PC.

NOTE: Because this tool acts as a fake Klez to 
fool the real worm,some AV monitor maybe cry when 
you run it. If so,Ignore the warning,and 
select 'continue'. If you have any 
question,please mail to me. 

*********************

Hope this helps all of you out.  To find more 
info on it go here:

http://securityresponse.symantec.com/avcenter/venc
/data/w32.klez.h@mm.html
 



[ Back to Cels Forum ]


Message thread :


Copyright ©2000 Yann Stettler and CohProg Sarl. All rights reserved. Privacy statement