Another possible OGR trojan?

Russ

Lifer
Oct 9, 1999
21,093
3
0
Interesting handle. I wonder how many people will try to send him eMail at the loopback address?

Russ, NCNE
 

Sloth

Senior member
Oct 21, 1999
243
0
0
In Bovine's latest update to his .plan he mentions the trojan problem they have had lately. That is one of the address listed as being in a trojan.


S.
 

RC

Golden Member
Jun 23, 2000
1,358
4
91


<< [Oct 2000] An EXE worm was discovered that replicates using the same techniques as above, except it deploys a file named WININIT.EXE into the WINDOWS\SYSTEM directory, which is approximately 220kb in size. It is unknown whether this worm also includes backdoor remote-control logic, however its payload size and use of network socket APIs may allow this possiblity. The DNETC.EXE and DNETC.INI are also deployed into the WINDOWS\SYSTEM directory, and the client is configured to run with the email addresses ogr@gala.net or mereel@gmx.de or mama@papa.net or gentleps@muohio.edu or postmaster@127.0.0.1 >>



Paragraph taken from d.net's trojan page

Thanks go to Sloth for pointing this out.
 

MWalkden

Golden Member
Dec 7, 1999
1,082
0
0
This stuff really sucks people.:| Are these trojans being submitted to AV companies? Do they only affect PCs not already running the client? How is it being transmitted? Can someone point me to more information?

I do this for a living and my customers have a right to know what risk is associated here. It may cost me some herd but that is a whole lot less important than my livelyhood!
 

Ken g6

Programming Moderator, Elite Member
Moderator
Dec 11, 1999
16,836
4,815
75
I believe these are being transmitted through file sharing on Windows computers. The Shields Up! page has everything you need to know (I think) to stop these viruses from getting in the door.
 

Moose

Member
Apr 8, 2000
180
0
0
Yes We are submitting these to the AV companies. They check for the work apps (wininit.exe etc..) not for dnetc (if they do we correct them asap)

moose
 

mindless

Senior member
Oct 9, 1999
661
0
0
What happens if one of these trojans finds the key? Does it just get reissued at random, or does the contest end? If it ends who receives the prize money?
 

MWalkden

Golden Member
Dec 7, 1999
1,082
0
0
Thanks for the info Moose and Ken_g6. I'm quite familiar with grc.com. Is there a list kept by DNET on worms/Trojans specifically targeting the client or proxy tools?

I can research the culprits myself at various AV sites but I would need to know the list. I'm only concerned with the method of entry each one uses. This will tell me if any of my customers/friends are at risk from this client. It would also allow me to provide a safeguard if needed and available.

Guys, this is truly important to me here. I have to know the ins and outs concerning this risk or I have to remove my clients due to the lack of knowledge concerning the issue. I don't have a choice here. Please give me all the help you can, I don't want to quit RC5!:(

Be assured I will be investigating diligently myself!!!!