- Sep 25, 2000
- 22,135
- 5
- 61
SARC
SOPHOS
McAfee
Name: W32/Bugbear-A
Aliases: Tanat, Tanatos
Type: Win32 worm
Date: 30 September 2002
This worm emails itself to addresses found on the local system. Possible message subject lines include the following (however, other random subject lines are also possible):
Found
150 FREE Bonus!
25 merchants and rising
Announcement
bad news
CALL FOR INFORMATION!
click on this!
Correction of errors
Cows
Daily Email Reminder
empty account
fantastic
free shipping!
Get 8 FREE issues - no risk!
Get a FREE gift!
Greets!
Hello!
history screen
hotmail.
I need help about script
Interesting
Introduction
its easy
Just a reminder
Lost
Market Update Report
Membership Confirmation
My eBay ads
New bonus in your cash account
New Contests
new reading
News
Payment notices
Please Help
Report
SCAM alert
Sponsors needed
Stats
Today Only
Tools For Your Online Business
update
various
Warning!
Your Gift
Your News Alert
The message body and attachment name vary. It is common for the attachment name to contain a double-extension (ie. .doc.pif). Outgoing messages look to make use of the Incorrect MIME Header Can Cause IE to Execute E-mail Attachment vulnerability in Microsoft Internet Explorer (ver 5.01 or 5.5 without SP2).
Indications Of Infection:
Port 36974 open (verify thru netstat -an)
Existence of the following files (* represents any character):
%WinDir%\System\%random filename%.EXE (50,688 bytes)
%WinDir%\System\%random filename%.DLL
%WinDir%\System\%random filename%.DLL
%WinDir%\System\%random filename%.DLL
SOPHOS
McAfee
Name: W32/Bugbear-A
Aliases: Tanat, Tanatos
Type: Win32 worm
Date: 30 September 2002
This worm emails itself to addresses found on the local system. Possible message subject lines include the following (however, other random subject lines are also possible):
Found
150 FREE Bonus!
25 merchants and rising
Announcement
bad news
CALL FOR INFORMATION!
click on this!
Correction of errors
Cows
Daily Email Reminder
empty account
fantastic
free shipping!
Get 8 FREE issues - no risk!
Get a FREE gift!
Greets!
Hello!
history screen
hotmail.
I need help about script
Interesting
Introduction
its easy
Just a reminder
Lost
Market Update Report
Membership Confirmation
My eBay ads
New bonus in your cash account
New Contests
new reading
News
Payment notices
Please Help
Report
SCAM alert
Sponsors needed
Stats
Today Only
Tools For Your Online Business
update
various
Warning!
Your Gift
Your News Alert
The message body and attachment name vary. It is common for the attachment name to contain a double-extension (ie. .doc.pif). Outgoing messages look to make use of the Incorrect MIME Header Can Cause IE to Execute E-mail Attachment vulnerability in Microsoft Internet Explorer (ver 5.01 or 5.5 without SP2).
Indications Of Infection:
Port 36974 open (verify thru netstat -an)
Existence of the following files (* represents any character):
%WinDir%\System\%random filename%.EXE (50,688 bytes)
%WinDir%\System\%random filename%.DLL
%WinDir%\System\%random filename%.DLL
%WinDir%\System\%random filename%.DLL