Please excuse duplication.-L. -----Original Message----- From: eleanor lisney [mailto:[EMAIL PROTECTED]] Sent: Tuesday, September 25, 2001 5:18 PM To: [EMAIL PROTECTED] Subject: Fwd: Alert: very nasty new virus Do not open attachments called WTC.exe. Delete, without opening: An email message that appears to be a call for peace between America and Islam is actually a malicious and destructive Internet mass mailing worm. It was inevitable that a hacker would try to take advantage of the emotional climate following the horror of September 11. The worm carries the Subject line "Peace between America and Islam!" and the message body "Hi. Is it a war against America or Islam!? Let's vote to live in peace!" Users who open the attachment entitled "WTC.exe" will receive a rude surprise. The worm first mails copies of itself to everyone in the Outlook address book. It then replaces all .HTML and .HTM files with the message "America...few days will show you what we can do!!! It's our turn Zaker is so sorry for you." It attempts to delete files in the Windows directory and even attempts to format the C: drive. If opened, WTC.exe will render the computer inoperable. While W32/Vote@MM is destructive, it is, at present, not widely distributed. IMPORTANT: Do not open any attachment that you are not expecting, even from an email correspondent you know. -- Platform -- Windows -- Detection -- ** Email message with the subject "Peace between America and Islam!" ** Attachment entitled "WTC.exe" ** Overwritten .HTM and .HTML files -- Damage -- ** Files missing from Windows directory and subdirectories ** Erased C: drive ** Overwritten .HTM and .HTML files ** Deletes specific anti-virus application directories Deleted and overwritten files must be reinstalled or restored from backup. -- Information -- When the email attachment is run, it drops two Visual Basic 5 Script files. MixDaLaL.vbs is saved to the Windows directory and run immediately. It overwrites all .HTM and .HTML files on local drives and mapped network drives. ZaCker.vbs is saved to the Windows System directory and a registry key is created to run it at startup. This second VBScript file attempts to delete all files in the Windows directory, creates or replaces the Autoexec.bat file with 'echo Y | format C', and displays a message box with the text "I promiss We WiLL Rule The World Again...By The Way,You Are Captured By ZaCker !!!" ZaCker.vbs then tries to exit Windows. This last is not likely to be successful because of the Windows files deleted earlier. WTC.exe (55,808 bytes) attempts to delete certain anti-virus software directories and to download a backdoor trojan from a web site that is now blocked. The trojan, if it is installed, gives hackers an entry into the computer which they can use to control the computer. If the backdoor trojan was successfully installed on the computer, it is possible for unauthorized users to access the computer over the network. The backdoor makes it possible for an intruder to perform a number of severely compromising actions: ** steal passwords ** delete or modify files including log files ** modify access privileges on files or user accounts ** install keystroke-logging programs ** modify security and anti-virus settings ** steal sensitive and confidential information such as banking and credit card information ** install other backdoor or rootkit programs ** set up hidden file stores or other online services ** use the computer to launch distributed denial of service or other illegal activities The only way to restore security to your computer once it has been compromised by a backdoor or rootkit is to reformat the hard drive, reinstall applications from original media, and restore documents from backup. -- Removal -- 1. Run Regedit.exe and delete the registry subkey "Norton.Thar" from the path HKLM\Software\Microsoft\Windows\CurrentVersion\Run 2. Remove the instruction 'echo Y | format C' from the Autoexec.bat file using Notepad.exe, Sysedit.exe or any text editor. 3. Find all *.htm and *.html files of 100 bytes and replace with backup copies. 4. Delete WTC.exe, MixDaLaL.vbs and ZaCker.vbs, which may have the system or hidden attributes set. -- For More Information -- Network Associates (McAfee): < http://vil.nai.com/vil/virusSummary.asp?virus_k=99212 <http://vil.nai.com/vil/virusSummary.asp?virus_k=99212> > Symantec Antivirus Research Center: < http:[EMAIL PROTECTED] <http:[EMAIL PROTECTED]> > Trend Micro: < http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=TROJ_VOTE.A <http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=TROJ_VOTE.A> > ZDNet: < http://www.zdnet.com/zdnn/stories/news/0,4586,5097375,00.html?chkpt=zdhpnew <http://www.zdnet.com/zdnn/stories/news/0,4586,5097375,00.html?chkpt=zdhpnew s01> s01> CNet: < http://news.cnet.com/news/0-1003-200-7285953.html?tag=lh <http://news.cnet.com/news/0-1003-200-7285953.html?tag=lh> > -jrl -- Information Technology Services mailto:[EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]> Phone: (512) 475-9400 Fax: (512) 475-9302 Request On-Site Technical Support: < http://sos.cc.utexas.edu/ <http://sos.cc.utexas.edu/> > ~~~ --------------------------------------------- To unsubscribe, send to [EMAIL PROTECTED] Include in body: unsubscribe ctls-l For information on CTLS-L please visit: http://www.ctls.net/document/ctls-l.htm

