Virus Alert: Beagle.J becomes moderate

Discussion in 'malware problems & news' started by NeonWizard, Mar 4, 2004.

Thread Status:
Not open for further replies.
  1. NeonWizard

    NeonWizard Registered Member

    Joined:
    Jan 17, 2004
    Posts:
    64
    Location:
    Vancouver,Canada
    What is W32.Beagle.J@mm and how does it affect me?

    W32.Beagle.J@mm is a mass-mailing worm that opens a backdoor on TCP port 2745 and uses its own SMTP engine to spread through email. In doing so, it sends the attacker the port on which the backdoor listens, as well as the IP address. It also attempts to spread through file-sharing networks, such as Kazaa and iMesh, by dropping itself into the folders that contain "shar" in their names.

    An email potentially containing the worm has the following characteristics:
    From: Spoofed to appear as though it is coming from the one of the following addresses at the recipient's domain:

    management
    administration
    staff
    noreply
    support

    Attachment: A randomly named .exe file, inside a .zip file, or an .pif file.
    The zip file will be password-protected.

    Beagle.J
     
  2. cyrafter

    cyrafter Guest

    :doubt: Just dectected this Beagle.J on my computer and have cleaned it out except for what is identified as C:WINDOWS\TEMP\NoAdwareBaclFile I just cna't seem to get it off the computer with Spybot Search & Destroy or (free version) or NoAdware v2.0 (29.00 model) Have any sugestions?
     
  3. Wiskonst

    Wiskonst Registered Member

    Joined:
    Feb 14, 2004
    Posts:
    8
    Location:
    Hengelo, the Netherlands
    Hello Cyrafter

    Programs like Spybot S&D are not specific for viruses and worms,
    so try with an updated virusscanner.

    http://www.bitdefender.com/index.php
    http://www.esafe.com
    http://www.cai.com

    _______
    Wiskonst
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.