Confused
Elite Member
For those that don't venture out of here, there are some emails floating around, mainly appearing to come from support@micorsoft.com that is actually a virus. There are also some reports of them coming from support@rr.com and other ISP's. They are also coming through as MANY other names/addresses, but they are all charactised by using a .PIF extension. DO NOT RUN ANY .PIF FILES
AT OS thread
The Register article (link taken from above thread)
Info from Symantec.
AT OS thread
The Register article (link taken from above thread)
Info from Symantec.
Symantec usually puts out their Live Update on Wednedays, but they had an early one, today because of this. Note the link to a removal tool in the above quote from their page.W32.Sobig.B@mm is a mass-mailing worm that sends itself to all the email addresses that it finds in the files with the following extensions:Refer to the Technical Details section of this writeup for the characteristics of the email message.
- .wab
- .dbx
- .htm
- .html
- .eml
- .txt
The worm is also network aware. It enumerates the network resources and copies itself to the following folders on other computers to which it has access:NOTES:
- Windows\All Users\Start Menu\Programs\StartUp
- Documents and Settings\All Users\Start Menu\Programs\Startup
Symantec Security Response has created a tool to remove W32.Sobig.B@mm. Click here to obtain the tool.
- The worm deactivates on May 31, 2003, and therefore, the last day on which the worm will spread is May 30, 2003.
- Virus definitions dated prior May 19, 2003 may detect this threat as W32.HLLW.Mankx@mm.
Also Known As: W32.HLLW.Mankx@mm, W32/Palyh@MM [McAfee], W32/Palyh-A [Sophos], I-Worm.Palyh [KAV], WORM_PALYH.A [Trend], Win32.Palyh.A [CA]
Type: Worm
Infection Length: 52,898 bytes
Systems Affected: Windows 95, Windows 98, Windows NT, Windows 2000, Windows XP, Windows Me
When W32.Sobig.B@mm is executed, it performs the following actions:
1. Copies itself as %Windir%\msccn32.exe.
NOTE: %Windir% is a variable. The worm locates the Windows installation folder (by default, this is C:\Windows or C:\Winnt) and copies itself to that location.
2. Creates the following files:3. Adds the value:
- %Windir%\hnks.ini
- %Windir%\msdbrr.ini
"System Tray"="%Windir%\msccn32.exe"
to the registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
so that W32.Sobig.B@mm runs when you start Windows.
4. If the operating system is Windows NT/2000/XP, then the worm will also add the value:
"System Tray"="%Windir%\msccn32.exe"
to the registry key:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
5. Enumerates the Network Resources and copies itself to the following folders:6. Attempts to download data from four different GeoCities Web pages. The addresses of these Web pages are stored in the aforementioned .ini files.
- Windows\All Users\Start Menu\Programs\StartUp
- Documents and Settings\All Users\Start Menu\Programs\Startup
Email Routine Details
W32.Sobig.B@mm uses its own SMTP engine to email itself to all the contacts it finds in the files with the following file extensions:technical details
- .wab
- .dbx
- .htm
- .html
- .eml
- .txt
The email message has the following characteristics:
From: support@microsoft.com
Subject: The subject line will be one of the following:Message Body: All information is in the attached file.
- Your details
- Approved (Ref: 38446-263)
- Re: Approved (Ref: 3394-65467)
- Your password
- Re: My details
- Screensaver
- Cool screensaver
- Re: Movie
- Re: My application
Attachment: The attachment name will be one of the following:
- your_details.pif
- ref-394755.pif
- pproved.pif
- password.pif
- doc_details.pif
- screen_temp.pif
- screen_doc.pif
- movie28.pif
- application.pif