Pls adapt you content filters:

-----------------------------------------
W32/[EMAIL PROTECTED] (Medium Risk Alert)

SonicWALL wants to make you aware of the W32/[EMAIL PROTECTED] virus that is spreading 
across the Internet. A medium-level alert has been issued for this threat.

Overview

This mass-mailing worm spreads as a .ZIP file and contains a denial of service payload.

A summary of the virus characteristics are as follows: 
    * contains it own SMTP engine for constructing messages 
    * mails itself as a ZIP attachment 
    * harvests email addresses from the local machine 
    * sends large volume of data (garbage) to a remote server - suggestive of a DoS 
payload (see below) 
Mail Propagation

Target email addresses are harvested from many files on the victim machine. These are 
written to the file EML.TMP in %WinDir%. Testing shows the worm is overly lax in 
identifying valid email addresses - as a result messages are likely to be sent to 
invalid recipients.

Outgoing messages are constructed using the worm's own SMTP engine. They are formatted 
as follows:

Subject : Re[2]: our private photos (plus additional spaces then random characters)
Attachment : PHOTOS.ZIP (12,958 bytes) which contains PHOTOS.JPG.EXE (12,832 bytes)
Message Body :
Hello Dear!,
Finally, i've found possibility to right u, my lovely girl :)
All our photos which i've made at the beach (even when u're withou ur bh:))
photos are great! This evening i'll come and we'll make the best SEX :)

Right now enjoy the photos.
Kiss, James.
(random characters - the same as those terminating the subject)

Messages are constructed with the following X-headers:

X-Mailer: The Bat! (v1.62)
X-Priority: 1 (High) 

The 'From' address of outgoing messages may be spoofed with james@(target domain.com). 
For example:

[EMAIL PROTECTED] 

As for previous variants, the mailing routing queries the mail server for the domain 
related to the target (harvested) address. Messages are then sent through that SMTP 
server. As previously, the worm contains a hardcoded IP address (212.5.86.163). 

Denial of Service

The worm sends a large amount of data to remote servers (port 80 and ICMP). The worm 
verifies that a connection is active by contacting www.google.com. If successful an 
attack is initiated on the following domains: 
    * darkprofits.net 
    * darkprofits.com 
    * www.darkprofits.net 
    * www.darkprofits.com 
Symptoms 
    * Existence of the files and Registry key detailed in the Method of Infection 
section. 
    * Outgoing messages matching that described above 
    * Large volumes of data being sent to port 80 of a remote server 
Method of Infection

When run on the victim machine, the worm installs itself into %WinDir% as 
NETWATCH.EXE. For example:

C:\WINNT\NETWATCH.EXE (12,832 bytes) 

Three other files are also dropped into %WinDir%: 
    * %WinDir%\EML.TMP - contains a list of the email addresses harvested from the 
victim machine 
    * %WinDir%\EXE.TMP - copy of the worm 
    * %WinDir%\ZIP.TMP - a ZIP archive containing the worm  
System startup is hooked via the following Registry key:

HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \

-------------------------------------------------------
To unsubscribe please go to http://www.sambar.ch/list/



Reply via email to