It just says support@microsoft.com
Ive given up now, ive deleted the offending stuff.
Ive given up now, ive deleted the offending stuff.
Symantec usually puts out their Live Update on Wednedays, but they had an early one, today because of this. Note the link to a removal tool in the above quote from their page.W32.Sobig.B@mm is a mass-mailing worm that sends itself to all the email addresses that it finds in the files with the following extensions:Refer to the Technical Details section of this writeup for the characteristics of the email message.
- .wab
- .dbx
- .htm
- .html
- .eml
- .txt
The worm is also network aware. It enumerates the network resources and copies itself to the following folders on other computers to which it has access:NOTES:
- Windows\All Users\Start Menu\Programs\StartUp
- Documents and Settings\All Users\Start Menu\Programs\Startup
Symantec Security Response has created a tool to remove W32.Sobig.B@mm. Click here to obtain the tool.
- The worm deactivates on May 31, 2003, and therefore, the last day on which the worm will spread is May 30, 2003.
- Virus definitions dated prior May 19, 2003 may detect this threat as W32.HLLW.Mankx@mm.
Also Known As: W32.HLLW.Mankx@mm, W32/Palyh@MM [McAfee], W32/Palyh-A [Sophos], I-Worm.Palyh [KAV], WORM_PALYH.A [Trend], Win32.Palyh.A [CA]
Type: Worm
Infection Length: 52,898 bytes
Systems Affected: Windows 95, Windows 98, Windows NT, Windows 2000, Windows XP, Windows Me
When W32.Sobig.B@mm is executed, it performs the following actions:
1. Copies itself as %Windir%\msccn32.exe.
NOTE: %Windir% is a variable. The worm locates the Windows installation folder (by default, this is C:\Windows or C:\Winnt) and copies itself to that location.
2. Creates the following files:3. Adds the value:
- %Windir%\hnks.ini
- %Windir%\msdbrr.ini
"System Tray"="%Windir%\msccn32.exe"
to the registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
so that W32.Sobig.B@mm runs when you start Windows.
4. If the operating system is Windows NT/2000/XP, then the worm will also add the value:
"System Tray"="%Windir%\msccn32.exe"
to the registry key:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
5. Enumerates the Network Resources and copies itself to the following folders:6. Attempts to download data from four different GeoCities Web pages. The addresses of these Web pages are stored in the aforementioned .ini files.
- Windows\All Users\Start Menu\Programs\StartUp
- Documents and Settings\All Users\Start Menu\Programs\Startup
Email Routine Details
W32.Sobig.B@mm uses its own SMTP engine to email itself to all the contacts it finds in the files with the following file extensions:technical details
- .wab
- .dbx
- .htm
- .html
- .eml
- .txt
The email message has the following characteristics:
From: support@microsoft.com
Subject: The subject line will be one of the following:Message Body: All information is in the attached file.
- Your details
- Approved (Ref: 38446-263)
- Re: Approved (Ref: 3394-65467)
- Your password
- Re: My details
- Screensaver
- Cool screensaver
- Re: Movie
- Re: My application
Attachment: The attachment name will be one of the following:
- your_details.pif
- ref-394755.pif
- pproved.pif
- password.pif
- doc_details.pif
- screen_temp.pif
- screen_doc.pif
- movie28.pif
- application.pif
wierd.Norton AntiVirus removed the attachment: doc_details.pif.
The attachment was infected with the W32.HLLW.Mankx@mm virus.
Originally posted by: Lord Evermore
HAHAHAHAAHAHA.
Here, I have a syringe filled with glowing yellow stuff. Don't worry, it'll boost your immune system, just go ahead and inject it.
Originally posted by: BoomAM
Heres an update for you people. I ran AVG Anti-Virus Complete test, deleted all virus`s that were found, and deleted everything in the virus vault. Now, about 30mins ago, a message popped up saying that a file was infected, and to run AVG again, so ran AVG, and it found nothing. Whats going on here then? Am i still infected or not?
Originally posted by: Harvey
It's W32.Sobig.B@mm, a worm that is spreading very quickly. [L=Info from Symantec]BULLET][*] The worm deactivates on May 31, 2003, and therefore, the last day on which the worm will spread is May 30, 2003.
Originally posted by: BingBongWongFooey
DO NOT OPEN EXECUTABLE EMAIL ATTACHMENTS! (I thought this was common knowledge around here at least?)
Im in the UK as well, I read one one of the previous links, that the UK is the worst hit upto now.Originally posted by: Confused
I saw 2 emails coming in from support@microsoft.com, and deleted them straight away. I've never given that email address to MS, so how would they get it!
I'm in the UK, too, so i guess what was reported of it affecting UK email addresses is right.
Confused
Originally posted by: BoomAM
Guys, this has just popped up on the screen
Screenshot
But i cant open the System Volume Information Folder, it says access denied, and scanning it with AVG reveals nothing.
How can i access the System Volume Information Folder, so i can scan and remove the virus?
Originally posted by: drag
The file ran. It just went to quick for you to notice the msdos window. It would of given you a error or ask what you wanted what program you wanted to open up the attatchment in. So whatever it is you've probably already installed it on your computer. Why the hell would MS support mail you a attatchment without explaining what it was is a mistery to me. Open up a dos window and run it from there and see what information it poops out if your interested. I would e-mail microsoft support a copy of the e-mail and attatchment and ask them why they sent it to you. more then likely, you'd best be sure that your virus definitions are kept up to date on a daily basis and make sure that you keep a eye on background proccesses and such.