See: http://www.symantec.com/avcenter/venc/data/w32.nimda.a@mm.html
Get your Anti-virus program updated!
I'm not sure what to do about virus protection now..Norton has always been a problem.
Any suggestions for something better?
A
[ September 18, 2001: Message edited by: AdrienneMorgan ]
Geuss what I've been doin'
The sarcastic (transparent?) side of the Moon
In all seriousness... here's Mcafee's link: http://vil.mcafee.com/hoax.asp?
What virus is this?
This threat can infect all unprotected users of Win9x/NT/2000/ME.
This is a HIGH RISK virus that is spread via email. The infected email can come from addresses that you recognize.W32/Nimda@MM also spreads via open shares, the Microsoft Web Folder Transversal vulnerability (also used by W32/CodeBlue), and a Microsoft content-type spoofing vulnerability. The email attachment name varies and may use the icon for an Internet Explorer HTML document.
Customizing the program file extension list using VirusScan 4.5 (and higher) may result in a lack of protection against this Trojan. As always, AVERT recommends that users configure VirusScan to scan all files. If this is not an option in your environment, the default extension list should be used.
What can this virus do?
It attempts to create a share (c , and checks for the presence of the Trojan dropped by the W32/CodeRed.c worm. It will attempt to spread itself as follows:
The email messages created by the worm specify a content-type of audio/x-wav with an executable attachment type. Thus when a message is accessed, the attachment can be executed even if the user does not open it and without the user's knowledge.
It adds JavaScript code to HTML documents, which opens a new browser window containing the infectious email message itself (taken from the dropped file README.EML). When this infected window is accessed (locally or remotely), the machine viewing the page is then infected.
Once infected, your system is used to seek out others to infect over the web. As this creates a lot of port scanning, this can cause a network traffic jam.
It creates a SYSTEM.INI entry to load the worm at startup:
Shell=explorer.exe load.exe -dontrunold
A MIME encoded version of the work is created in each folder on the drive (often as README.EML, can also be .NWS files)
Certain execuatble files are selected by the worm and altered.
The virus contains the string : Concept Virus (CV) V.5, Copyright (C) 2001 R.P.China
The copy paste and uploaded side of the Moon
BTW: the latest update will NOT catch the virus!
mark
[ September 18, 2001: Message edited by: Mark Barnhill ]
.....
Maybe THEY have a virus!!!!
[ September 19, 2001: Message edited by: AdrienneMorgan ]