Letterville Bull Board Letterville | Bull Board
 


 

Front Page
A Letterhead History
About Us
Become A Resident
Edit Your Database Info
Find A Letterhead

Letterville Merchants
Resident Downloads
Letterville BookShop
Future Live Meets
Past Meets
Step-By-Steps
Past Panel Swaps
Past SOTM
Letterhead Profiles
Business Cards
Become A Merchant

Click on the button
below to chat with other
Letterville users.

http://www.letterville.com/ubb/chaticon.gif

Steve & Barb Shortreed
144 Hill St., E.
Fergus, ON, Canada
N1M 1G9

Phone: 519-787-2892
Fax: 519-787-2673
Email: barb@letterville.com

Copyright ©1995-2008
The Letterhead Website

 

 

The Letterville BullBoard   
my profile login | search | faq | calendar | im | forum home

  next oldest topic   next newest topic
» The Letterville BullBoard » Old Archives » WARNING! W32.Badtrans Virus

 - UBBFriend: Email this page to someone!    
Author Topic: WARNING! W32.Badtrans Virus
Jon Butterworth
Deceased


Member # 227

Icon 1 posted      Profile for Jon Butterworth   Email Jon Butterworth   Send New Private Message       Edit/Delete Post 
Further to Si Allen's post below warning this virus is reaching plaque proportions here in Australia. There are warnings on National TV and radio!

I receieved 8 copies this morning!!!

The latest Norton update picks them up immediately BUT do not attempt to delete from Outlook Express. Use Nortons Quarantine and delete from there. I don't know if one of the files this morning was a variation, but when I tried to delete it from O/E it copied its self several times into Temporary Internet Files.

I had to quarantine each copy and delete from there.

Geez, there's some sick people out there!

--------------------
Bushie^
aka Jon Butterworth

Executive Director
HARDLY NORMAL
SIGN COMPANY

http://www.icr.com.au/~jonsigns


Posts: 4014 | From: Toowoomba, Queensland, Australia | Registered: Nov 1998  |  IP: Logged | Report this post to a Moderator
Henry Barker
Resident


Member # 174

Icon 1 posted      Profile for Henry Barker   Author's Homepage   Email Henry Barker   Send New Private Message       Edit/Delete Post 
JUst been having some long talks with Ray ( Hill ). He got a mail a couple of days ago from Steve Barba with an attachment....and opened it as he thought he knew Steve from here! Bang in went the worm!!

So yesterday I think Ray was begining to pull his hair out as he was getting mails from all over saying that he was spreading virus and had no idea about it. I saw some references to Minna Hill down below by Adrienne....Ray doesnät have you in his address book but you got a mail from him with virus....its weird. Anyhow he has updated his virus program , and Norton says his system is clean except that occasionally the mail program is still trying to send out infected mail but Norton is now preventing it before it happens.

This must mean that there are still remains of something in the system files is it Kernell32.exe or something like that?. Ray tried to follow the instructions for removal using Windows ME but it doesnt work in the way suggested on Nortons site. He has done a full system scan with Norton while running in safe mode.

Any help from anyone running ME would be much appreciated.

What a way to make yourself known with having little to do with it yourself!

--------------------
Henry Barker #1924akaKaftan
SignCraft AB
Stockholm,
Sweden.
A little bit of England in a corner of Stockholm www.signcraft.se www.facebook.com/signcraftsweden


Posts: 1552 | From: Stockholm, Sweden | Registered: Nov 1998  |  IP: Logged | Report this post to a Moderator
Joey Madden
Resident


Member # 1192

Icon 1 posted      Profile for Joey Madden   Author's Homepage   Email Joey Madden   Send New Private Message       Edit/Delete Post 
yesterday I got an email from Mackbrush with a attachment which I deleted from the get-go. Today I got something saying there is a virus attached to it.

--------------------
HotLines Joey Madden - pinstriping since 1952
'Perfection, its what I look for and what I live for'




http://members.tripod.com/Inflite
http://www.pinheadlounge.com/hotlinesjoeymadden

Posts: 5962 | From: USA | Registered: Nov 1999  |  IP: Logged | Report this post to a Moderator
David Fisher
Visitor
Member # 107

Icon 1 posted      Profile for David Fisher   Email David Fisher   Send New Private Message       Edit/Delete Post 
Henry,
There is a good description of the virus here.
http://datafellows.com/v-descs/badtrs_b.shtml
I found the Norton information to be a little ambiguous too.
HTH,
David

--------------------
David Fisher
D.A. & P.M. Fisher Services
Brisbane Australia
da_pmf@yahoo.com
Trying out a new tag:
"Parents are the bones on which children cut their teeth
Peter Ustinov

Posts: 1450 | From: Brisbane Queensland Australia | Registered: Nov 1998  |  IP: Logged | Report this post to a Moderator
Adrienne Pereira
Visitor
Member # 1046

Icon 4 posted      Profile for Adrienne Pereira   Email Adrienne Pereira   Send New Private Message       Edit/Delete Post 
Here's more info on this,,,note the bold highlighting I added at the end, I was going to post a warning regarding how this adds a - to the address so you can't hit reply, but it's explained below...
~~~~~~~~~~
W32.Badtrans.B@mm is a MAPI worm that emails itself out using different file names. It also creates the file \Windows\System\Kdll.dll. It uses functions from this file to log keystrokes. This worm arrives as an email with one of several attachment names and a combination of two appended extensions. It contains a set of bits that control its behavior:

001 Log every window text
002 Encrypt keylog
004 Send log file to one of its addresses
008 Send cached passwords
010 Shut down at specified time
020 Use copyname as registry name (else kernel32)
040 Use kernel32.exe as copyname
080 Use current filename as copypath (skips 100 check)
100 Copy to %system% (else copy to %windows%)

When it is first executed, it copies itself to %System% or %Windows% as Kernel32.exe, based on the control bits. Then it registers itself as a service process (Windows 9x/Me only). It creates the key log file %System%\Cp_25389.nls and drops %System%\Kdll.dll which contains the key logging code.

NOTE: %Windows% and %System% are variables. The worm locates the \Windows folder (by default this is C:\Windows or C:\Winnt) or the \System folder (by default this is C:\Windows\System or C:\Winnt\System32) and copies itself to that location.

A timer is used to examine the currently open window once per second, and to check for a window title that contains any of the following as the first three characters:

LOG
PAS
REM
CON
TER
NET

These texts form the start of the words LOGon, PASsword, REMote, CONnection, TERminal, NETwork. There are also Russian versions of these same words in the list. If any of these words are found, then the key logging is enabled for 60 seconds. Every 30 seconds, the log file and the cached passwords are sent to one of these addresses or some others which are currently not operational:

ZVDOHYIK@yahoo.com
udtzqccc@yahoo.com
DTCELACB@yahoo.com
I1MCH2TH@yahoo.com
WPADJQ12@yahoo.com
smr@eurosport.com
bgnd2@canada.com
muwripa@fairesuivre.com
eccles@ballsy.net
S_Mentis@mail-x-change.com
YJPFJTGZ@excite.com
JGQZCD@excite.com
XHZJ3@excite.com
OZUNYLRL@excite.com
tsnlqd@excite.com
cxkawog@krovatka.net
ssdn@myrealbox.com

After 20 seconds, the worm will shut down if the appropriate control bit is set.

If RAS support is present on the computer, then the worm will wait for an active RAS connection. When one is made, with a 33% chance, the worm will search for email addresses in *.ht* and *.asp in %Personal% and Internet Explorer %Cache%. If it finds addresses in these files, then it will send mail to those addresses using the victim's SMTP server. If this server is unavailable the worm will choose from a list of its own. The attachment name will be one of the following:

Pics
images
README
New_Napster_Site
news_doc
HAMSTER
YOU_are_FAT!
stuff
SETUP
Card
Me_nude
Sorry_about_yesterday
info
docs
Humor
fun

In all cases, MAPI will also be used to find unread mail to which the worm will reply. The subject will be "Re:". In that case, the attachment name will be one of the following:

PICS
IMAGES
README
New_Napster_Site
NEWS_DOC
HAMSTER
YOU_ARE_FAT!
SEARCHURL
SETUP
CARD
ME_NUDE
Sorry_about_yesterday
S3MSONG
DOCS
HUMOR
FUN

In all cases, the worm will append two extensions. The first will be one of the following:

..doc
..mp3
..zip

The second extension that is appended to the file name is one of the following:
..pif
..scr

The resulting file name would look similar to CARD.Doc.pif or NEWS_DOC.mp3.scr.

If SMTP information can be found on the computer, then it will be used for the From: field. Otherwise, the From: field will be one of these:

"Mary L. Adams" <mary@c-com.net>
"Monika Prado" <monika@telia.com>
"Support" <support@cyberramp.net>
" Admin" <admin@gte.net>
" Administrator" <administrator@border.net>
"JESSICA BENAVIDES" <jessica@aol.com>
"Joanna" <joanna@mail.utexas.edu>
"Mon S" <spiderroll@hotmail.com>
"Linda" <lgonzal@hotmail.com>
" Andy" <andy@hweb-media.com>
"Kelly Andersen" <Gravity49@aol.com>
"Tina" <tina0828@yahoo.com>
"Rita Tulliani"
"JUDY" <JUJUB271@AOL.COM>
" Anna" <aizzo@home.com>

Email messages use the malformed MIME exploit to allow the attachment to execute in Microsoft Outlook without prompting. For information on this, go to:

<http://www.microsoft.com/technet/security/bulletin/MS01-020.asp>

The worm writes email addresses to the %System%\Protocol.dll file to prevent multiple emails to the same person. Additionally, the sender's email address will have the "_" character prepended to it, to prevent replying to infected mails to warn the sender (eg user@website.com becomes _user@website.com).

After sending mail, the worm adds the value

Kernel32 kernel32.exe

to the registry key

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce

--------------------------------------------------------------------------------

[ November 28, 2001: Message edited by: AdrienneMorgan ]



--------------------
Adrienne Pereira
Splash Signs

Port Angeles, WA
----------------
"Sure, it's colder in the Northwest, but...it's a damp cold!"

360-477-5656
splashsigns@msn.com

Posts: 4873 | From: Port Angeles, Washington, USA | Registered: Sep 1999  |  IP: Logged | Report this post to a Moderator
Glenn Taylor
Visitor
Member # 162

Icon 1 posted      Profile for Glenn Taylor   Author's Homepage   Email Glenn Taylor   Send New Private Message       Edit/Delete Post 
I got an e-mail from Norton today. Below is a portion that I thought might be of interest......

*********
November 27, 2001
_____________________________

In this issue:

1. W32.Badtrans.B@mm
2. W32.Aliz.Worm
3. Feedback
4. Subscribing and unsubscribing
5. Disclaimer
_____________________________

NOTE: This is an outgoing email address. Please do not reply to this
email message. If you require assistance installing, configuring, or
troubleshooting a Symantec product, or you have a question for
Customer Service, please visit the Symantec Service & Support Web
site at the following address:

http://www.symantec.com/techsupp/

Select your product and version and click Go.

To see an HTML version of this newsletter, please visit the following
Web site:

http://www.symantec.com/techsupp/vURL.cgi/navarc

_____________________________

1. W32.Badtrans.B@mm

W32.Badtrans.B@mm is a MAPI worm that emails itself out as a file
with one of several different names. This worm also creates a .dll in
the \Windows\System directory as Kdll.dll. It uses functions from
this .dll to log keystrokes. Virus definitions dated November 24,
2001 will detect this worm. For additional information, point your
Web browser to:

http://www.symantec.com/techsupp/vURL.cgi/nav108
_____________________________

2. W32.Aliz.Worm

W32.Aliz.Worm is a very simple SMTP mass-mailer worm. The worm
currently only replicates on Windows 9x computers. It does not seem
to spread on Windows NT platforms. The worm spreads by obtaining
email addresses from the Windows address book and sending itself to
those addresses. Virus definitions dated May 22, 2001 will detect
this worm.

When the worm arrives by email, the worm uses a MIME exploit that
allows the virus to be run just by reading or previewing the email.
Information on and a patch for this exploit can be found at

http://www.symantec.com/techsupp/vURL.cgi/nav110

For additional information, point your Web browser to:

http://www.symantec.com/techsupp/vURL.cgi/nav109

--------------------
BlueDog Graphics
Wilson, NC

www.BlueDogUSA.com

Warning: A well designed sign may cause fatigue due to increased business.


Posts: 10691 | From: Wilson, NC, USA | Registered: Nov 1998  |  IP: Logged | Report this post to a Moderator
Benji Mcentire
Visitor
Member # 2442

Icon 1 posted      Profile for Benji Mcentire   Author's Homepage   Email Benji Mcentire       Edit/Delete Post 
Ok here is some information, we had it on one of the machines here , thankfully its not a machine with any of our business address's on it, we checked this machine which is 98 and no virus but it did get our ME machine and we even had Virus software, so all day we have been trying to get rid of this virus, and I found a link at

http://securityresponse.symantec.com/avcenter/venc/data/w32.badtrans.b@mm.html

it tells how to remove it, plus what it does, as above it adds stuff to the regristry so once you resart it comes back, so in this they say to do it all in Safe mode and remove the line it added in your Reg files, read this I hope it helps we are going to do it ourselves here shortly

Benji

--------------------
Benji McEntire
Harrison Graphics/Signs of America
Harrison, Arkansas 72601
signmaker@cox.com


Posts: 70 | From: Harrison, Arkansas | Registered: Nov 2001  |  IP: Logged | Report this post to a Moderator
   

   Close Topic   Feature Topic   Move Topic   Delete Topic next oldest topic   next newest topic
 - Printer-friendly view of this topic
Hop To:


Contact Us | Letterville. A Community Of Letterheads & Pinheads!

Powered by Infopop Corporation
UBB.classic™ 6.7.2

Search For Sign Supplies
Category:
 

                  

Letterhead Suppliers Around the World