Site hosted by Angelfire.com: Build your free website today!
Anti Virus Alert!!!
*****Trend Micro's free online virus scanner*****
  • POCKY.A
  • SirCam
  • SULFNBK hoax
  • TROJ_HYBRIS.C
  • TROJ_MATCHER.A
  • TROJ_MYBABYPIC
  • TROJ_NAKEDWIFE
  • VBS.NewLove.A
  • VBS.VBSWG2.X@mm
  • VBS_STAPLE
  • W97M.Melissa.BG


  • VBS.NewLove.A   back to top

    LoveLetter Virus will once again activate and may cause damage to many computers. At this point MIS can only hope that our email users have update to an up-to-date Antivirus Dat file to 4078.

    In conjunction with other anti-virus vendors, it has renamed this worm from VBS.LoveLetter.FW.A to VBS.NewLove.A.

    The VBS.NewLove.A is a worm, and spreads by sending itself to all addressees in the Outlook address book when it is activated.

    The attachment name is randomly chosen, but will always have a .Vbs extension. The subject header will begin with "FW: " and will include the name of the randomly chosen attachment (excluding the .VBS extension) Upon each infection, the worm introduces up to 10 new lines of randomly generated comments in order to prevent detection.

    Also known as VBS/Loveletter.ed, VBS/Loveletter.Gen, VBS_SPAMMER, VBS.Loveletter.FW.A

    Please make sure your virus .dat files(4078) are current.

    And also please exercise extreme caution when handling any arrival email and

    DO NOT open any attachments with extension .vbs.

    VBS.LoveLetter.A

    Norton AntiVirus detects as: VBS.LoveLetter.A(1)
    ATTACHMENT: LOVE-LETTER-FOR-YOU.TXT.vbs
    SUBJECT LINE: ILOVEYOU
    MESSAGE BODY: kindly check the attached LOVELETTER coming from me.

    VBS.LoveLetter.B (also known as Lithuania)

    Norton AntiVirus detects as: VBS.LoveLetter.B(1)
    ATTACHMENT: same as A
    SUBJECT LINE: Susitikim shi vakara kavos puodukui...
    MESSAGE BODY: same as A

    VBS.LoveLetter.C (also known as Very Funny)

    Norton AntiVirus detects as: VBS.LoveLetter.C(1)
    ATTACHMENT: Very Funny.vbs
    SUBJECT LINE: fwd: Joke
    MESSAGE BODY: empty

    VBS.LoveLetter.D (also known as BugFix)

    Norton AntiVirus detects as: VBS.LoveLetter.A(1)
    ATTACHMENT: same as A
    SUBJECT LINE: same as A
    MESSAGE BODY: same as A
    MISC. NOTES: registry entry: WIN- -BUGSFIX.exe instead of WIN-BUGSFIX.exe

    VBS.LoveLetter.E (also known as Mother's Day)

    Norton AntiVirus detects as: VBS.LoveLetter.E
    ATTACHMENT: mothersday.vbs
    SUBJECT LINE: Mothers Day Order Confirmation
    MESSAGE BODY: We have proceeded to charge your credit card for the amount of $326.92 for the mothers day diamond special. We have attached a detailed invoice to this email. Please print out the attachment and keep it in a safe place.Thanks Again and Have a Happy Mothers Day! mothersday@subdimension.com
    MISC. NOTES: mothersday.HTM sent in IRC, & comment: rem hackers.com, & start up page to hackes.com, l0pht.com, or 2600.com

    VBS.LoveLetter.F (also known as Virus Warning)

    Norton AntiVirus detects as: VBS.LoveLetter.F
    ATTACHMENT: virus_warning.jpg.vbs
    SUBJECT LINE: Dangerous Virus Warning
    MESSAGE BODY: There is a dangerous virus circulating. Please click attached picture to view it and learn to avoid it.
    MISC. NOTES: Urgent_virus_warning.htm

    VBS.LoveLetter.G (also known as Virus ALERT!!!)

    Norton AntiVirus detects as: VBS.LoveLetter.Variant or VBS.LoveLetter.G
    ATTACHMENT: protect.vbs
    SUBJECT LINE: Virus ALERT!!!
    MESSAGE BODY: a long message regarding VBS.LoveLetter.A
    MISC. NOTES: FROM support@symantec.com. This variant also overwrites files with .bat and .com extensions.

    VBS.LoveLetter.H (also known as No Comments)

    Norton AntiVirus detects as: VBS.LoveLetter.A
    ATTACHMENT: same as A
    SUBJECT LINE: same as A
    MESSAGE BODY: same a A
    MISC. NOTES: the comment lines at the beginning of the worm code have been removed.

    VBS.LoveLetter.I (also known as Important! Read carefully!!)

    Norton AntiVirus detects as: VBS.LoveLetter.Variant
    ATTACHMENT: Important.TXT.vbs
    SUBJECT LINE: Important! Read carefully!!
    MESSAGE BODY: Check the attached IMPORTANT coming from me!
    MISC. NOTES: new comment line at the beginning: by: BrainStorm / @ElectronicSouls. It also copies the files ESKernel32.vbs & ES32DLL.vbs, and MIRC script comments referring to BrainStorm and ElectronicSouls and sends IMPORTANT.HTM to the chat room.

    VBS.LoveLetter.J

    Norton AntiVirus detects as: VBS.LoveLetter.Variant
    ATTACHMENT: protect.vbs
    SUBJECT LINE: Virus ALERT!!!
    MESSAGE BODY: Largely the same as the G variant.
    MISC. NOTES: This appears to be a slight modification of the G variant.

    VBS.LoveLetter.K

    Norton AntiVirus detects as: VBS.LoveLetter.Variant
    ATTACHMENT: Virus-Protection-Instructions.vbs
    SUBJECT LINE: How to protect yourself from the IL0VEY0U bug!
    MESSAGE BODY: Here's the easy way to fix the love virus.
    MISC. NOTES:

    VBS.LoveLetter.L (I Cant Believe This!!!)

    Norton AntiVirus detects as: VBS.LoveLetter.Variant
    ATTACHMENT: KillEmAll.TXT.VBS
    SUBJECT LINE: I Cant Believe This!!!
    MESSAGE BODY: I Cant Believe I have Just Recieved This Hate Email .. Take A Look!
    MISC. NOTES: comment has phrase/words: Killer, by MePhiston, replaces GIF & BMP instead of JPG & JPEG, hides WAV & MID instead of MP3 & MP2. NO IRC routine, there it will not infect chat room users. Copies KILER.HTM, KILLER2.VBS, KILLER1.VBS to the hard disk.

    VBS.LoveLetter.M (Arab Air)

    Norton AntiVirus detects as: VBS.LoveLetter.Variant
    ATTACHMENT: ArabAir.TXT.vbs
    SUBJECT LINE: Thank You For Flying With Arab Airlines
    MESSAGE BODY: Please check if the bill is correct, by opening the attached file
    MISC. NOTES: Replaces DLL & EXE files instead of JPG & JPEG. Hides SYS & DLL files instead of MP3 & MP2. Copies no-hate-FOR-YOU.HTM to the hard disk.

    VBS.LoveLetter.N (also known as Variant Test)

    Norton AntiVirus detects as: VBS.LoveLetter.Variant
    ATTACHMENT: IMPORTANT.TXT.vbs
    SUBJECT LINE: Variant Test
    MESSAGE BODY: This is a variant to the vbs virus.
    MISC. NOTES: Copies itself as sndvol32.vbs and IEAKDLL.vbs. Internet Explorer start page changed to http://altalavista.box.sk. It does not download the password stealing trojan. Overwrites *.mpg, *.mpeg, *.avi, *.qt, *.qtm. Sends the file important.htm into Internet chat rooms via mIRC.

    VBS.LoveLetter.O (same as A version)

    Norton AntiVirus detects as: VBS.LoveLetter.Variant
    ATTACHMENT: LOVE-LETTER-FOR-YOU.TXT.vbs
    SUBJECT LINE: ILOVEYOU
    MESSAGE BODY: kindly check the attached LOVELETTER coming from me.
    MISC. NOTES: The file script.ini, which it sends into Internet chat rooms, has a modified comment line.

    VBS.LoveLetter.P (also known as Yeah Yeah)

    Norton AntiVirus detects as: VBS.LoveLetter.Variant
    ATTACHMENT: Vir-Killer.vbs
    SUBJECT LINE: Yeah, Yeah another time to DEATH...
    MESSAGE BODY: This is the Killer for VBS.LOVE-LETTER.WORM.
    MISC. NOTES: Sets the Internet Explorer start page to http://www.yahoo.com/Vir-Killer.exe. It does not download the password stealing trojan. Overwrites *.ZIP and *.RAR files instead of *.JPG and *.JPEG file. Hides *.PAS and *.ASM files instead of *.MP3 and *.MP2

    VBS.LoveLetter.Q (also known as LOOK!)

    Norton AntiVirus detects as: VBS.LoveLetter.Variant
    ATTACHMENT: LOOK.vbs
    SUBJECT LINE: LOOK!
    MESSAGE BODY: hehe...check this out.
    MISC. NOTES: Copies itself as MSUser32.vbs and User32DLL.vbs. Overwrites *.XLS and *.MDB files instead of *.JPG and *.JPEG. Hides *.EXE and *.LNK instead of *.MP3 and *.MP2. Creates LOOK.HTM

    VBS.LoveLetter.R (also known as Bewerbung)

    Norton AntiVirus detects as: VBS.LoveLetter.Variant
    ATTACHMENT: BEWERBUNG.TXT.vbs
    SUBJECT LINE: Bewerbung Kreolina
    MESSAGE BODY: Sehr geehrte Damen und Herren!
    MISC. NOTES: IRC sends BEWERBUNG.HTM into connected Internet chat room.

    VBS.LoveLetter.S (same as A version)

    Norton AntiVirus detects as: VBS.LoveLetter.Variant
    ATTACHMENT: LOVE-LETTER-FOR-YOU.TXT.vbs
    SUBJECT LINE: ILOVEYOU
    MESSAGE BODY: kindly check the attached LOVELETTER coming from me.
    MISC. NOTES: Several comment lines have been added



    POCKY.A   back to top

    This is an Internet worm, which uses MAPI to propagate. This worm arrives as an executable with icon like Pokemon character, Pikachu virus pocky.a

    Once executed it modifies Autoexec.bat such that files in certain directories are deleted when the computer is rebooted. It displays graphic with text as "Between millions of people around the world i found you. Don't forget to remember this day every time MY FRIEND!". And It also sends out unsolicited email messages to all addresses in the infected users MS Outlook Address Book.

    Subject: Pikachu Pokemon
    Body:
    Great Friend!
    Pikachu from Pokemon Theme have some friendly words to say.
    Visit Pikachu at http://www.pikachu.com
    See you.

    Attachment:
    Pikachu icon

    Delete or ignore messages matching this description.

    PS, Please open the attached file to see the sample file.



    W97M.Melissa.BG   back to top

    W97M.Melissa.BG is a Word 97 macro virus that has a payload of deleting necessary system files. It also sends itself out through e-mail using Microsoft outlook.

    The subject of the e-mail is "Resume - Janet Simons".

    Virus Characteristics
    This is a variant of the W97M/Melissa family with a very dangerous payload. This is a worm in that it does not infect the local host system. It spreads by email on opening of the document. It will arrive by Outlook email with the following format:

    ---------------begin copy of email--------
    Subject: Resume - Janet Simons

    To: Director of Sales/Marketing,
    Attached is my resume with a list of references contained within.
    Please feel free to call or email me if you have any further questions regarding my experience. I am looking forward to hearing from you.

    Sincerely,
    Janet Simons.
    «Explorer.doc»
    -----------------end copy of email--------

    If the file EXPLORER.DOC is opened, it will forward an email all entries in all available address books.

    As if this wasn't enough, this trojan will wait for the user to close the document before continuing with a more damaging payload.

    Please delete it!!!



    TROJ_HYBRIS.C   back to top

    W95.Hybris or TROJ_HYBRIS.C is a worm that spreads by email as an attachment to outgoing email messages.

    Once the infected worm executed. This worm monitors internet access from the infected computer and monitors any email sent and received. Once it detects Internet connection, it sends an additional email to all addresses that were sent to infected user.

    A sample of the email is as follows:

    Subject: Snowwhite and the Seven Dwarfs - The REAL story!" or
    Subject: = Enanito si, pero con que pedazo! or
    Subject: (field is blank)

    Sender = Hahaha or "Infected user"
    Message Body: Today, Snowhite was turning 18. The 7 Dwarfs always where very educated and polite with Snowhite. When they go out work at morning, they promised a *hugh* surprise. Snow was anxious. Suddlently, the door open, and the Seven Dwarfs enter...

    Attachment: May have one of several different names, including, but not limited to the following:

    Joke.exe
    dwarf4you.exe
    atchim.exe
    sexy virgin.scr
    enano porno(.scr
    dunga.scr
    branca de neve.scr
    midgets.scr

    Delete immediately once receive it.



    TROJ_MYBABYPIC   back to top

    TROJ_MYBABYPIC.A is currently spreading in the wild. This Trojan propagates via MS Outlook as an EXE attachment.

    A sample of the email is as follows:

    Subject: My Babypic
    Body: Its my animated baby picture!!!
    Attachment: MYBABYPIC.EXE

    When the EXE file is executed, a message box with the picture of a child is displayed. When this message box is closed, the Trojan drops several copies of itself in the Windows/System directory and adds several registry entries to enable it to execute at each Windows start up. This Trojan needs Windows Scripting Host to function and upon execution tries to connect to a certain web site. In addition to this, the Trojan code also has some destructive payloads, that range from overwriting files with certain extensions to deleting certain files.

    This Trojan also sends copies of itself via MS Outlook to all lists in the infected user's address book, including the infected user.

    At certain times, the worm may attempt to connect to http://www.youvebeenhack.com. 

    The Trojan also abruptly enables/disables the Numlock, ScrollLock and CapsLock key.



    TROJ_NAKEDWIFE   back to top

    Alert: Medium

    TROJ_NAKEDWIFE, a new Trojan is currently in the wild and is spreading rapidly. Upon execution, this Trojan deletes all DLL, INI, EXE, BMP and COM files in the Windows and system directories. It propagates via MS Outlook, by sending out an email to every email address listed in the infected user's address book. A sample of this email is as follows:

    Subject: FW: Naked Wife
    Message Body: > My wife never look like that :)
    Best Regards,
    <Sender>
    Attachment: NakedWife.exe

    Once the attachment is executed, This worm masquerades as a Flash movie. When run, it sends itself to all recipients in the Outlook Address Book. and deletes all .BMP, .COM, .DLL, .EXE, .INI, and .LOG files in the WINDOWS and WINDOWS\SYSTEM directories. After all files have been deleted - You system will be inability to launch any applications.

    virus TROJ_NAKEDWIFE



    VBS_STAPLE   back to top

    VBS_STAPLE.A is a new Visual Basic Script virus that is currently in the wild. Upon execution, this virus displays a message box and then sends itself out via email to the first 50 recipients listed in the address book of the infected user. A sample of the email is as follows:

    Subject: RE:Injustice
    Message Body:
    Dear <Outlook Username>;
    Did you send the attached message, I was not expecting this from you !
    Attachment: INJUSTICE.TXT.VBS

    This virus also sends the above email to certain email addresses and then tries to access some web sites using Internet Explorer.

    Upon execution, this Visual Basic Script virus drops a copy of itself in the Windows System directory and displays a message box titled "HELP US TO STOP THE BLOOD SHED!!" with the following text:

    PLEASE ACCEPT MY APOLOGIES FOR DISTURBING YOU.
    Remember that one day YOU may be in this situation. We need every possible help. Israeli soldiers killed in cold blood 12 year old Palestinian child Mohammad Al-Durra, as his father tried to protect him in vain with his own body. As a result of the indiscriminate and excessive use of machine gun fire by Israeli soldiers, journalists and bystanders watched helplessly as the child was savagely murdered. Palestinian Red Crescent Society medic Bassam Balbeisi attempted to intervene and spare the child's life but live ammunition to his chest by Israeli fire took his life in the process. The child and the medic were grotesquely murdered in cold blood. Mohammad's father, Jamal, was critically injured and permanently paralyzed. Similarly, approximately 40 children were slain, without the media taking notice or covering these tragedies.
    THESE CRIMINAL ACTS CANNOT BE FORGIVEN OR FORGOTTEN!!!! HELP US TO STOP THE BLOOD SHED!!

     

    Then it sends itself out as an email attachment via Microsoft Outlook to the first 50 recipients in the address book of the infected user. A sample of the email is as follows:

    virus VBS_STAPLE



    TROJ_MATCHER.A   back to top

    Risk Type: High

    This Trojan is currently in the wild and comes disguised as a Love Matching program. It was created in Visual Basic 6.0 and uses the Visual Basic component Microsoft Script Control to propagate using the default installed mail client. It finds recipients to receive the tainted email from the Windows Address book of the infected system. A sample of the email is as follows:

    Subject: Matcher

    Message Body: Want to find your love mates!! Try this its cool… Looks and Attitude Matching to opposite sex.

    Attachment: Matcher.exe

    virus TROJ_MATCHER.A

    The worm then sends itself to everyone in the Outlook Address book with the above email. The worm will continue to send emails in an infinite loop.

    Delete all detected files.


    VBS.VBSWG2.X@mm   back to top

    VBS.VBSWG2.X@mm is an encrypted VBScript worm that uses a known exploit to send itself to all recipients in an infected user's Microsoft Outlook address book. It also has the payload that opens a Web site that contains pornographic contents.

     

    Also known as : VBS.VBSWG2.D@mm, VBS.HomePage

    Trigger condition: Upon execution

    The email message has the following characteristics:
    Subject: "Homepage"
    Body:
    Hi!

    You've got to see this page! It's really cool ;O)

    Attachment:
    Homepage.HTML.vbs

    Prior to mailing itself out, the worm searches for email messages with the Subject of "Homepage"; it deleted these messages.

    The worm pretends to open a Web page upon execution. It randomly selects one of four pornographic Web pages.

     


    Hoax Name : SULFNBK   back to top

    This particular email message is a hoax. You might receive it in the near future. It has been reported that the SULFNBK hoax email has been propagated wildly. HQ MIS requests that all ASI email users not to propagate this email.

    This hoax warns against a virus contained in a file called SULFNBK.EXE, that arrives hidden in an email message.

     

    SULFNBK.EXE is a normal file that is installed with the Windows Operation System. Sulfnbk.exe, is a Microsoft Windows utility that is used to restore long file names

    .This file in not destructive.

     

    A sample of the email is as follows:

    Original Portuguese version:

    Vocês acreditam que uma amiga da lista enviou um alerta e os procedimentos que deveriam ser tomados para a possível detecção do maledeto SULFNBK.EXE. e eu fui conferir só por desencargo de consciência. Pois é...O bichinho tava lá, escondidinho até da McAfee e do Norton, talvez esperando algum gatilho prá começar a trabalhar, né?
    Aí vão, moçada, as orientações que eu segui à risca e que me levaram ao tal coisinha ruím:

    1 - Iniciar/Localizar Pastas. Digite o nome do "mardito": SULFNBK.EXE
    2 - Se for encontrado, abra o Windows Explorer, vá até a pasta onde ele se encontra alojado e delete-o de lá ou do próprio ambiente do Localizar; - Não click com o botão esquerdo sobre ele e não abra o arquivo nem em caso de incêndio, ok?
    3 - Apenas delete o bichinho.
    4 - O meu estava em Windows/Command.
    5 - O vírus da pessoa que passou o aviso estava em Windows/Config.

    Sim, o Norton e nem o McAfee não detectou.
    Não sabemos se ele faz algum estrago na máquina, mas acho que ninguém aqui vai querer testar para saber, né?
    Gente, sem brincadeiras, já tirei o meu daqui....
    E nem imaginava que tivesse hóspedes no PC.
    Minha vacina está super-atualizada!!!
    Façam o mesmo, ok?


    Translated English version:

    Do you believe that a friend of mine sent me an alert and the procedure that we have to follow for the possible infection of SULFNBK.EXE. And I had checked, just to make sure. An then... the file was there, hidden even of McAfee and Norton, maybe waiting something to start work.
    Well, see bellow the procedure that I followed step by step, and I found the file:

    1. Start/Find Folders. Type the file name: SULFNBK.EXE
    2. If it find, open Windows Explorer, browse into the folder where the file is and delete it. Do not click with left button on the file and do not open it.
    3. Just delete it
    4. Mine was on Windows/Command
    5. The virus from the person who gave the alert was on Windows/Config

    Yes, Norton and McAfee do not detect it.
    We do not know if it makes some damage on the machine, but I think that anybody will not want to test it to know, will it?
    Folks, this is not a fun, I delete it from my computer.
    And my definitions are updated.
    Do it the same, ok?



    SirCam   back to top

    SirCam virus has ranked the top number one virus among all other viruses. Please be really careful on what you receive in the near future.

    HQ MIS be able to collect more information about this wild spread virus in the Northern America.

    First of all, this worm arrives as an email attachment having two extension names. Such as Filename.EX1.EX2 Filename.EX1 is random file chosen from an infected user's personal folder such as "My Document". EX2, can be a EXE, PIF or LNK extension.

    Secondary, The body of the email will always begin with "Hi! How are you?" and end with "See you later. Thanks." In between these opening and closing lines will be one of the following:

  • I send you this file in order to have your advice
  • I hope you can help me with this file that I send
  • I hope you like the file that I send you
  • This is the file with the information that you ask for

    HQ MIS has a place the SirCam remover tool at //Intra/IT Download Center/Virus Removal Tool/Sircam remover.

    Thanks to Brian Paterson and Monson Chan provided sample of the virus email.