Date: 26 November 2001
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
===========================================================================
A U S C E R T A L E R T
AL-2001.17 -- AUSCERT ALERT
UNIRAS ALERT - W32/Badtrans-B Virus
26 November 2001
===========================================================================
AusCERT Alert Summary
---------------------
The message included below is an alert published by UNIRAS regarding a new
email virus/worm "W32/Badtrans-B". Although AusCERT has not received any
reports of local infections, the rapid propagation of this virus makes it
imperative that members disseminate and take action on this information to
prevent any undesirable activity by this virus within their sites.
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
- - - - -----------------------------------------------------------------------------
UNIRAS (UK Govt CERT) Alert Notice - 20/01 dated 25.11.01 Time 07:41
UNIRAS Alerts are also available from our website at www.uniras.gov.uk
- - - - -----------------------------------------------------------------------------
Title
=====
Malicious Software Report (See Briefing 228/01)
W32/Badtrans-B
Troj/PWS-AV
UNIRAS Comment
==============
There are now clear indications that Badtrans-B is having an impact. A report
from a member of the UNIRAS community indicates that their mail gateway is stopping
an increasing number of infected EMails. Messagelabs also report that this virus
is now No 1 on their hit list. Symantec assess it as medium threat.
Although a substantial number of infections probably originate from home user
systems, the business community will become involved as they return to work after
the weekend. The status of the original UNIRAS briefing has consequently been
changed to that of an ALERT.
http://www.messagelabs.co.uk/viruseye/
http://www.messagelabs.com/viruseye/report.asp?id=86
Detail
======
Name: W32/Badtrans-B
Type: Win32 worm
Date: 24 November 2001
A virus identity file (IDE) which provides protection is
available now from our website and will be incorporated
into the January 2002 (3.53) release of Sophos Anti-Virus.
At the time of writing Sophos has received just one report of
this worm from the wild.
Description:
W32/Badtrans-B is a worm which uses MAPI to spread. The worm
arrives in an email message with no message text. The attachment
filename is randomly generated from three parts. The first part
is taken from the list:
FUN
HUMOR
DOCS
S3MSONG
Sorry_about_yesterday
ME_NUDE
CARD
SETUP
SEARCHURL
YOU_ARE_FAT!
HAMSTER NEWS_DOC
New_Napster_Site
README
IMAGES
PICS
The second from the list:
.DOC.
.MP3.
.ZIP.
and the last from:
pif
scr
If the attached file is run, it copies itself into the Windows
system directory with the filename KERNEL32.EXE and changes the
registry key
HKLMSOFTWAREMicrosoftWindowsCurrentVersionRunOnce so that
the worm runs the next time Windows is started. The worm also
drops a file named kdll.dll, which is the password stealing
Trojan Troj/PWS-AV.
Download the IDE file from
http://www.sophos.com/downloads/ide/badtranb.ide
Read the analysis at
http://www.sophos.com/virusinfo/analyses/w32badtransb.html
Download a ZIP file containing all the IDE files available for
the current version of Sophos Anti-Virus from
http://www.sophos.com/downloads/ide/ides.zip
Read about how to use IDE files at
http://www.sophos.com/downloads/ide/using.html
To unsubscribe from this service please visit
http://www.sophos.com/virusinfo/notifications
*******************************************************************************
Name: Troj/PWS-AV
Type: Trojan
Date: 24 November 2001
A virus identity file (IDE) which provides protection is
available now from our website and will be incorporated
into the January 2002 (3.53) release of Sophos Anti-Virus.
At the time of writing Sophos has received just one report of
this Trojan from the wild.
Description:
Troj/PWS-AV is dropped by W32/Badtrans-B worm.
The Trojan logs the user's keystrokes in order to gain
privileged information such as passwords.
Download the IDE file from
http://www.sophos.com/downloads/ide/pws-av.ide
Read the analysis at
http://www.sophos.com/virusinfo/analyses/trojpwsav.html
Download a ZIP file containing all the IDE files available for
the current version of Sophos Anti-Virus from
http://www.sophos.com/downloads/ide/ides.zip
Read about how to use IDE files at
http://www.sophos.com/downloads/ide/using.html
To unsubscribe from this service please visit
http://www.sophos.com/virusinfo/notifications
- - - - -----------------------------------------------------------------------------
For additional information or assistance, please contact the UNIRAS HELP
Desk by telephone or Not Protectively Marked information may be sent via
EMail to:
uniras@niscc.gov.uk
Tel: 020 7821 1330 Ext 4511
Fax: 020 7821 1686
UNIRAS material is also available from our website at www.uniras.gov.uk
- - - - -----------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of SOPHOS and Messagelabs
for the information contained in this briefing.
- - - - -----------------------------------------------------------------------------
This Alert contains the information released by the original author. Some of the
information may have changed since it was released. If the vulnerability
affects you, it may be prudent to retrieve the advisory from the canonical site
to ensure that you receive the most current information concerning that problem.
Reference to any specific commercial product, process, or service by trade
name, trademark manufacturer, or otherwise, does not constitute or imply
its endorsement, recommendation, or favouring by UNIRAS. The views and
opinions of authors expressed within this notice shall not be used for
advertising or product endorsement purposes.
UNIRAS shall also accept no responsibility for any errors or omissions
contained within this alert notice. In particular, UNIRAS shall not be
liable for any loss or damage whatsoever, arising from or in connection with
the usage of information contained within this notice.
UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST)
and has contacts with other international Incident Response Teams (IRTs) in
order to foster cooperation and coordination in incident prevention, to prompt
rapid reaction to incidents, and to promote information sharing amongst its
members and the community at large.
- - - - -----------------------------------------------------------------------------
<End of UNIRAS Alert>
- -----BEGIN PGP SIGNATURE-----
Version: PGPfreeware 6.0.2i
iQCVAwUBPACiuopao72zK539AQGYMQP9Gn1EAgvlkMw7Uutd2Ksu1uoTk05pOSr1
JdBimVBPV3Gbu1VOI919P060UuCUbKnUywVOBU3WDUkj/ZM6UpeIjP3Z+85IFFrQ
sn1SmXWi/26DBcp7LPL3HOIuCxSzq2/rKxmBeaMv0nI0JbSoVm22wN+TgirDDrZs
K7z5aPOZB8k=
=rdM5
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
This alert is provided as a service to AusCERT's members. As AusCERT did
not write the document quoted above, AusCERT has had no control over its
content. The decision to use any or all of this information is the
responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.
NOTE: This is only the original release of the alert. It may not be
updated when updates to the original are made. If downloading at a later
date, it is recommended that the alert is retrieved directly from the
original authors to ensure that the information is still current.
Contact information for the authors of the original document is included
in the alert above. If you have any questions or need further information,
please contact them directly.
Previous advisories, alerts and external security bulletins can be
retrieved from:
http://www.auscert.org.au/Information/advisories.html
If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for emergencies.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key
iQCVAwUBPAIDryh9+71yA2DNAQFBtwP+JNgORxuGb0y+ruPIDfyAhd8Z+nwsqe/n
V4lCGDP97XcEZUoqNFdfETK5E14yghhm9HOKnTR8v/PCUdFDZKzVcNfuE4auw7y4
/yS2MHwaKaInda2NwuJTSgY3PXHrXBhPc9Jh55TfdexOx1MtqxHreVglZfQGTQsj
8e34pf0FiTc=
=oofK
-----END PGP SIGNATURE-----
|