Yes, You are correct, one can't be too careful.
On Thu, 2004-03-04 at 16:16, Lasse Karlsson wrote:
> From: "Frits Wüthrich" <[EMAIL PROTECTED]>
> > On Thu, 2004-03-04 at 06:20, Lawrence Kwan wrote:
> > > > When I opened the zip file using the password, McAfee was able to find
> > > > it and identify it as W32/[EMAIL PROTECTED]
> > >
> > > Wow, I am quite shocked that some of you would continue to open attached
> > > file from unknown source. DON'T RELY ON YOUR ANTI-VIRAL PROGRAM!
> > > Unless you fully expected to receive such a file, JUST DELETE IT if you
> > > don't know what it is all about.
> > I didn't open the .exe file, I opened the ZIP file, that is quite
> > something different. I wouldn't dream of opening the exe file, or pif or
> > scr or whatever, I don't rely on my anti virus software to stop it, I
> > just wanted to find out what the virus was.
> > I don't receive nor read in a Windows environment to begin with.
> > So: no need to be shocked in my case.
>
> At
> http://www.pchell.com/virus/mimail.shtml
> (where there are more removal instruction links)
>
> I found the following information, which would indicate that simply unzipping the
> file could trigger the exe-file to automatically run and infect you:
>
> What is the MiMail.A Worm?
> MiMail.A is a mass mailing worm that arrives as a zipped attachment in an email. The
> zip file has an html file attached. The html file "message.htm" takes advantage of
> two known security vulnerabilities, MHTML exploit and the codebase exploit. The
> virus arrives as an email similar to:
>
>
> --------------------------------------------------------------------------------
>
> From: admin@<current domain> (The from address may be spoofed to appear that it is
> coming from the current domain)
>
> Subject: your account [random string]
>
> Message:
> Hello there,
> I would like to inform you about important information regarding your email address.
> This email address will be expiring. Please read attachment for details.
>
> Best regards,
> Administrator
>
> Attachment: Message.zip
>
>
> --------------------------------------------------------------------------------
>
> How Does MiMail.A Worm Infect My System?
>
> Once unzipped, the worm creates an exe file named foo.exe in the Temporary Internet
> Files directory and runs it.
>
> The following files are then created in the Windows directory
>
> videodrv.exe
> exe.tmp (temporary copy of message.html_
> zip.tmp (temporary copy of message.zip)
> It also adds the following registry key to the system.
>
> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ Run
>
> "VideoDriver" = C:\Windows\videodrv.exe
>
> as well as
>
> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Code Store Database\Distribution
> Units\{11111111-1111-1111-1111-111111111111}
>
> What Does the MiMail.A Worm Do?
>
> Once a computer is infected, the virus checks to see if the system is connected to
> the Internet by trying to contact google.com. If it can contact google, then the
> worm attempts to gather email addresses from the infected computer. It grabs
> addresses from all files on the system, EXCEPT files that have the following
> extensions:
>
> COM
> WAV
> CAB
> PDF
> RAR
> ZIP
> TIF
> PSD
> OCX
> VXD
> MP3
> MPG
> AVI
> DLL
> EXE
> GIF
> JPG
> BMP
> These addresses are then stored in a file named eml.tmp in the Windows directory.
> The worm has its own SMTP engine. For each email address the worms sends, it will
>
> Look up the MX record for the domain name using the DNS server of the current host.
> If a DNS server is not found, it will default to 212.5.86.163.
> Acquire the mail server associated with that particular domain.
> Directly contact the destination server.
> How Can I Remove the MiMail.A worm?
>
> Follow these steps in removing the MiMail worm.
>
> 1) Terminate the running program
>
> Open the Windows Task Manager by either pressing CTRL+ALT+DEL on Win9x machines or
> CTL+Shift+Tab and clicking on the Processes tab on WinNT/2000/XP machines.
> Locate the following program, click on it and End Task or End Process
> VIDEODRV.EXE
>
> Close Task Manager
> 2) Remove the Registry entries
>
> Click on Start, Run, Regedit
> In the left panel go to
> HKEY_LOCAL_MACHINE>Software>Microsoft>Windows>Current Version>Run
>
> In the right panel, right-click and delete the following entry
> "VideoDriver"="%Windows%\videodrv.exe"
>
> Repeat this procedure for
>
> HKEY_LOCAL_MACHINE>Software>Microsoft>Code Store Database>Distribution Units
>
> In the right panel, locate and delete the entry:
> {11111111-1111-1111-1111-111111111111}
> Close the Registry Editor
> 3) Delete the infected files (for Windows ME and XP remember to turn off System
> Restore before searching for and deleting these files to remove infected backed up
> files as well)
>
> Click Start, point to Find or Search, and then click Files or Folders.
>
> Make sure that "Look in" is set to (C:\WINDOWS).
>
> In the "Named" or "Search for..." box, type, or copy and paste, the file names:
> eml.tmp
> zip.tmp
> exe.tmp
>
> Click Find Now or Search Now.
>
> Delete the displayed files.
> 4) Reboot the computer and run a thorough virus scan using your favorite antivirus
> program.
>
> 5) Apply the patches, MHTML exploit and codebase exploit, to avoid viruses like
> this in the future.
>
> For Automatic Removal of MiMail.A, download the Symantec removal tool
>
>
> Lasse
>
>
--
Frits Wüthrich <[EMAIL PROTECTED]>