Panda Weekly - viruses and intruders - 10/22/04

Discussion in 'other security issues & news' started by Randy_Bell, Oct 22, 2004.

Thread Status:
Not open for further replies.
  1. Randy_Bell

    Randy_Bell Registered Member

    May 24, 2002
    Santa Clara, CA
    - Weekly report on viruses and intruders -
    Virus Alerts, by Panda Software ( ​

    Madrid, October 22 2004 - Today's report looks at Constructor/EMFTrojan.C, Netsky.AH, Netsky.AI, Bagz.E, Mydoom.AD and Scranor.A.

    Constructor/EMFTrojan.C is a program designed to create malformed image files to exploit a remote code execution vulnerability in the rendering of Enhanced Metafile (EMF) image formats, described in Microsoft's MS04-032 bulletin.

    Constructor/EMFTrojan offers several options to configure the generated code, giving the option to take the following action when the file is opened:

    - Open a port through which commands can be sent to the compromised computer.

    - Download and run a file from a specified URL.

    To protect computers from this and other similar threats, Panda Software has developed Exploit/MS04-032.gen, a generic detection for EMF images crafted specifically to exploit this security flaw.

    The first worms that we'll look at today are the AH and AI variants of Nestky, which are sent via email, using their own SMTP engine, to addresses that they get from files that are less than 10,000,000 bytes and have one of the following extensions: DBX, WAB, MBX, EML, MDB, TBB or DAT. They are sent ten minutes after they are executed and are only sent between October 20 and October 25 2004. To prevent simultaneous execution Netsky.AH and Netsky.AI create the mutex "0x452A561C".

    The next worm in today's report is Bagz.E, which spreads in an email with variable characteristics. It terminates processes of applications such as antivirus programs, leaving the computer vulnerable to attack from other malware.

    Bagz.E creates several files in the Windows directory of the computer it affects. This worm also modifies the HOSTS file, preventing access to the websites of several antiviruses an IT security company.

    Mydoom.AD, also spreads via email in a variable message. It spoofs the sender's address using a set list of names and domains.

    Using its own SMTP engine, Mydoom.AD sends a copy of itself to all addresses in the files it finds with the following extensions (provided they don't have certain text strings): ADB, ASP, CFG, CGI, DBX, EML, HTM, HTML, JSP, MBX, MDX, MSG, PHP, PL, SHT, TBB, TXT, UIN, VBS, WAB, WSH, XLS and XML.

    To ensure that only one copy of itself ids run at a time, Mydoom.AD creates a mutex called My-Game. Just the like the worm mentioned above, Mydoom.AD also edits the HOSTS file to prevent access to the websites of several antivirus companies.

    The AD variant of Mydoom tries to download a file from a web page corresponding to Scranor.A, another worm. It saves the file in the root directory, renames it and then executes it.

    Finally we will look at Scranor.A, a worm that propagates by making copies of itself without infecting other files. Its aim is to saturate and crash computers and networks.

    For further information about these and other computer threats, visit Panda Software's Encyclopedia:

    Additional information

    - SMTP (Simple Mail Transfer Protocol): This is a protocol used on the Internet exclusively for sending e-mail messages.

    More technical definitions at:
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.