Berikut ini saya kirimkan informasi yang saya dapatkan dari 
milis lain.... Virus ExploreZip ini akan menghapus file-file
Microsoft Office, seperti .doc, .xls, dan .ppt, dan file-file 
source code, seperti .c, .cpp, .h, and .asm. Dan selama belum
dihilangkan dari pc yang tertular, maka virus ini akan terus
menyebarkan dirinya melalui email secara otomatis tanpa 
sepengetahuan pemilik pc tersebut. Jadi betul sekali apa yang 
dikatakan pak Denny Firmansyah... jangan salah sangka bahwa
orang tersebut dengan *SENGAJA* mengirim virus ke kita...
karena dia sendiripun tidak tahu kalau namanya 'disalahgunakan'
oleh virus....

Dari pemantauan (kayak pemilu aja.... ) saya sudah ada 5 anggota
milis balita-anda yang terkena virus ini :
1. Herman ?
2. Endang Wartiningsih <[EMAIL PROTECTED]>
3. Rina Budiastuti 
4. [EMAIL PROTECTED]
5. Alvi Maghfiratul  Laila <[EMAIL PROTECTED]>

Ini dulu aja informasinya... kalau ada info lagi mengenai virus
ini, terutama cara penanggulangannya... akan saya kirimkan lagi.

-yuana-

-----------------------------------------------------------------
CERT� Advisory CA-99-06 ExploreZip
Trojan Horse Program
Original issue date: Thursday June 10, 1999
Source: CERT/CC

Systems Affected
Machines running Windows 95, Windows 98, or Windows NT. 
Any mail handling system could experience performance problems 
or a denial of service as a result
of the propagation of this Trojan horse program. 

Overview

The CERT Coordination Center continues to receive reports 
and inquiries regarding various forms of malicious executable 
files that are propagated as file attachments in electronic mail. 

Most recently, the CERT/CC has received reports of 
sites affected by ExploreZip, a Windows Trojan horse program. 

I. Description

The CERT/CC has received reports of a Trojan horse program
that is propagating in email attachments. This program is
called ExploreZip. The number and variety of reports we 
have received indicate that this has the potential to be a
widespread attack affecting a variety of sites. 

Our analysis indicates that this Trojan horse program
requires the victim to run the attached zipped_files.exe
program in order install a copy of itself and enable 
propagation. 

Based on reports we have received, systems
running Windows 95, Windows 98, and Windows NT
are the target platforms
for this Trojan horse program. It is possible
that under some mailer configurations, a user
might automatically open a
malicious file received in the form of an email attachment.
This program is not known to exploit any new vulnerabilities.
While the primary transport mechanism of this program is 
via email, any way of transferring files can also propagate
the program. 

The ExploreZip Trojan horse has been propagated in
the form of email messages containing the file 
zipped_files.exe as an attachment. The body of the 
email message usually appears to come from a known 
email correspondent, and may contain
the following text: 

I received your email and I shall send you a reply ASAP.
Till then, take a look at the attached zipped docs. 

The subject line of the message may not be predictable
and may appear to be sent in reply to previous email. 

Opening the zipped_files.exe file causes the program 
to execute. At this time, there is conflicting information
about the exact
actions taken by zipped_files.exe when executed. 
One possible reason for conflicting information may
be that there are
multiple variations of the program being propagated,
although we have not confirmed this one way or the other.
Currently,
we have the following general information on actions 
taken by the program. 

The program searches local and networked drives
(drive letters C through Z) for specific file
types and attempts to erase the contents of the files,
leaving a zero byte file. The targets may include 
Microsoft Office files, such as .doc,
.xls, and .ppt, and various source code files,
such as .c, .cpp, .h, and .asm.

The program propagates by replying to any new email
that is received by an infected computer. A copy of
zipped_files.exe is attached to the reply message.

The program creates an entry in the Windows 95/98 WIN.INI file:

run=C:\WINDOWS\SYSTEM\Explore.exe

On Windows NT systems, an entry is made in the system registry:

[HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows]
run = "c:\winnt\system32\explore.exe"

The program creates a file called explore.exe 
in the following locations:

Windows 95/98 - c:\windows\system\explore.exe
Windows NT - c:\winnt\system32\explore.exe

This file is a copy of the zipped_files.exe 
Trojan horse, and the file size is 210432 bytes.

MD5 (Explore.exe) = 0e10993050e5ed199e90f7372259e44b

We will update this advisory with more specific
information as we are able to confirm details. 
Please check the CERT/CC
web site for the current version containing
a complete revision history. 

II. Impact

Users who execute the zipped_files.exe 
Trojan horse will infect the host system,
potentially causing targeted files to
be destroyed.

Indirectly, this Trojan horse could cause a
 denial of service on mail servers. 
Several large sites have reported
performance problems with their mail servers
 as a result of the propagation of this Trojan horse.

III. Solution

Use virus scanners

In order to detect and clean current viruses
you must keep your scanning tools up to date
with the latest definition files. 

Please see the following anti-virus vendor 
resources for more information about the 
characteristics and removal techniques
for the malicious file known as ExploreZip. 

Central Command
http://www.avp.com/upgrade/upgrade.html

Command Software Systems, Inc
http://www.commandcom.com/html/virus/explorezip.html

Computer Associates
http://support.cai.com/Download/virussig.html

Data Fellows
http://www.datafellows.com/news/pr/eng/19990610.htm

McAfee, Inc. (a Network Associates company)
http://www.mcafee.com/viruses/explorezip/protecting_yourself.asp

Network Associates Incorporated
http://www.avertlabs.com/public/datafiles/valerts/vinfo/va10185.asp

Sophos, Incorporated
http://www.sophos.com/downloads/ide/index.html#explorez

Symantec
http://www.sarc.com/avcenter/download.html

Trend Micro Incorporated
http://www.antivirus.com/download/pattern.htm

General protection from email Trojan horses and viruses

Some previous examples of malicious files known to have propagated
through electronic mail include 

False upgrade to Internet Explorer - discussed in CA-99-02 
http://www.cert.org/advisories/CA-99-02-Trojan-Horses.html

Melissa macro virus - discussed in CA-99-04
http://www.cert.org/advisories/CA-99-04-Melissa-Macro-Virus.html

Happy99.exe Trojan Horse - discussed in IN-99-02
http://www.cert.org/incident_notes/IN-99-02.html

CIH/Chernobyl virus - discussed in IN-99-03
http://www.cert.org/incident_notes/IN-99-03.html

In each of the above cases, the effects of the malicious
file are activated only when the file in question is executed.
Social engineering is typically employed to trick
a recipient into executing the malicious file. 
Some of the social engineering
techniques we have seen used include 

Making false claims that a file attachment 
contains a software patch or update

Implying or using entertaining content to 
entice a user into executing a malicious file

Using email delivery techniques which cause
 the message to appear to have come from a 
familiar or trusted source

Packaging malicious files in deceptively
familiar ways (e.g., use of familiar but 
deceptive program icons or file names)

The best advice with regard to malicious 
files is to avoid executing them in the first place. 
CERT advisory CA-99-02 discusses Trojan horses 
and offers suggestions to avoid them (please see Section V).

http://www.cert.org/advisories/CA-99-02-Trojan-Horses.html

Additional information

Additional sources of virus information are listed at

http://www.cert.org/other_sources/viruses.html 


This document is available from:
http://www.cert.org/advisories/CA-99-06-explorezip.html. 


CERT/CC Contact Information

Email: [EMAIL PROTECTED]
Phone: +1 412-268-7090 (24-hour hotline)
Fax: +1 412-268-6989
Postal address:
CERT Coordination Center
Software Engineering Institute
Carnegie Mellon University
Pittsburgh PA 15213-3890
U.S.A.

CERT personnel answer the hotline 08:00-20:00
EST(GMT-5) / EDT(GMT-4) Monday through Friday;
they are on call for
emergencies during other hours, on U.S. holidays,
and on weekends. 

Using encryption

We strongly urge you to encrypt sensitive information
sent by email. Our public PGP key is available from
http://www.cert.org/CERT_PGP.key. If you prefer
to use DES, please call the CERT hotline for more 
information. 

Getting security information

CERT publications and other security information 
are available from our web site http://www.cert.org/. 

To be added to our mailing list for advisories
and bulletins, send email to
[EMAIL PROTECTED] and include
SUBSCRIBE your-email-address 
in the subject of your message. 

Copyright 1999 Carnegie Mellon University.
Conditions for use, disclaimers, and sponsorship information can be
found in http://www.cert.org/legal_stuff.html. 

* "CERT" and "CERT Coordination Center" are registered in the U.S.
Patent and Trademark Office 

NO WARRANTY

Any material furnished by Carnegie Mellon University
and the Software Engineering Institute is furnished on an
"as is" basis. Carnegie Mellon University makes no
warranties of any kind, either expressed or implied as to any
matter including, but not limited to, warranty of fitness
for a particular purpose or merchantability, exclusivity or
results obtained from use of the material.
Carnegie Mellon University does not make any warranty 
of any kind with
respect to freedom from patent, trademark, 
or copyright infringement. 

Revision History


*********** REPLY SEPARATOR  ***********

On 6/21/99 at 2:56 PM Denny Firmansyah wrote:

>Jangan salah sangka sama orang dulu Bu, saya rasa yang 'ngirim' sama Ibu pun
>tidak tahu... 
>Setahu saya Virus Worm tsb memang mempunyai kemampuan untuk menyebar secara
>otomatis melalui e-mail ke address kolega lainnya yang tercantum pada
>komputer yang terjangkiti.
>Pemecahannya sementara ini :
>Apabila mendapat e-mail (dari siapapun) yang mempunyai attachment file
>zip_file.exe, JANGAN DIBUKA/DIEXECUTE FILE TSB, LANGSUNG HAPUS SAJA
>MAIL-NYA.
>Virus ini dapat didetect dan didelete dengan Mc Afee version 4.02 update
>data 4030 (sayang saya tidak punya installer-nya), mungkin ada rekan lain
>yang tahu/punya ?
>Terima kasih,
>
>Denny F.
>_____________
>Padmorini, Niken write:
>



Kunjungi:
http://www.balita-anda.indoglobal.com

--------------------------------------------------------------------------
"Untuk mereka yang mendambakan anak balitanya tumbuh sehat & cerdas"
Berlangganan, e-mail ke: [EMAIL PROTECTED]
Berhenti berlangganan, e-mail ke:  [EMAIL PROTECTED]
http://pencarian-informasi.or.id/ - Solusi Pencarian Informasi di Internet




Kirim email ke