-Caveat Lector-
Read for yourself....
http://www.symantec.com/avcenter/venc/data/w95.hybris.gen.html
Technical description:
When the worm attachment is executed, the Wsock32.dll file is modified or
replaced. Once the worm has infected wsock32.dll, it has the abilty to
monitor the Internet connection as well as incoming and outgoing email
traffic. The worm then scans for email addresses. When an email address is
detected whether on an Internet site or in email being sent or received, the
worm waits for a period of time and then sends an infected message to the
detected address.
The worm attempts to connect to the alt.comp.virus newsgroup. If it connects
successfully, then the worm uploads its own plug-ins to this newsgroup in an
encrypted form. It goes thru the subject header of the messages, and tries
to match a specific format. The subject header will also specify the version
number of the attached plug-in if the plug-ins are present. If newer
versions of the plug-ins are found, the worm downloads them and updates its
behavior.
One of the plug-ins for W95.Hybris.gen generates a spiral image. Upon
execution, the plug-in initially loads OpenGL libraries which are used to
draw a large black and white spiral image. It also registers itself as a
service; this prevents it from being displayed in the Close Programs dialog
box. For additional information on this, see the document W95.Hybris.Plugin.
This worm also has a plug-in that infects executable programs. The DOS EXE
infection is fairly simple dropping technique. The virus code is appended to
the end of the file with a small 16-bit dropper routine. This routine
creates a temporary file with an .exe extension in the TEMP folder and
executes it. It then deletes the temporary executable. In this way,
Wsock32.dll is infected with the actual worm body. The PE executables have a
much more complicated file infection process. PE files become infected only
if they have a long enough code section. The virus infection plug-in packs
the original code area and overwrites it if it will fit in the same place.
This complicated antiheuristic infection technique is difficult but possible
to repair.
If Wsock32.dll is being used by the system, the worm cannot modify it. In
this situation, the worm will add a registry entry to one of the following
subkeys:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
It always alternates between these two keys as the worm spreads from one
computer to another. The worm hooks onto the following exports of
Wsock32.dll:
send()
recv()
connect()
Whenever you send email, the worm sends a second message to the same person,
attaching a copy of itself using a randomly generated file name.
Removal instructions:
To remove the W95.Hybris.gen worm, follow these steps:
1. Run LiveUpdate to ensure that you have the most recent virus definitions.
They must be dated September 25, 2000, or later.
2. Start NAV, and perform a full system scan. Make sure that NAV is set to
scan all files. When an infected file is detected, do the following:
When Wsock32.dll is detected as infected, choose Repair. In most cases, NAV
can repair this file. If NAV cannot repair the file, then you will need to
replace it from the Windows installation CD. If you need to replace this
file, see the instructions in the next section.
NOTE: If NAV cannot repair Wsock32.dll when Windows is in normal mode, then
try to repair it in Safe Mode. This is particularly true if you are
connected to a network; in this case you may see a "sharing violation"
message when NAV attempts the repair. To try this, restart the computer in
Safe Mode. If this is not successful, then you must extract a new copy as
explained in the next section.
Delete all other detected files; their contents have been overwritten by the
worm. You must restore them from backups or, in the case of application
software, reinstall the programs.
3. If you see a rotating spiral on the Windows desktop, you must follow addi
tional steps to remove it. See the section To remove the rotating spiral.
To extract a new copy of the Wsock32.dll file:
This is necessary only if Wsock32.dll cannot be repaired. You need to use
the Extract command at a DOS prompt. Follow these steps to do this, using
the instructions for your operating system.
NOTES:
Have the Windows installation CD available.
When typing the command, substitute the appropriate drive letter for your
CD-ROM drive for the letter x. For example, if you are using Windows 98, and
the CD-ROM drive is the drive D, then you would type
extract /a d:\win98\precopy1.cab wsock32.dll /L c:\windows\system
If Windows is installed in a folder other than C:\Windows, then substitute
the appropriate path or folder name in the last part of the command that
refers to the \Windows\System folder.
For detailed instructions on using the Extract command, see the Microsoft
document How to Extract Original Compressed Windows Files, Article ID:
Q129605.
As a somewhat easier alternative to the following procedure, if you are
using Windows 98, then you can use the System File Checker to restore the
file. For information on how to do this, see your Windows documentation.
1. Do one of the following:
Windows 95/98 users: Click Start, point to Programs, and click MS-DOS
Prompt. A DOS window appears.
Windows Me users: Click Start, point to Programs, point to Accessories, and
click MS-DOS Prompt. A DOS window appears.
2. Type the command that applies to your operating system:
If you are using Windows 98, then type the following and press Enter:
extract /a x:\win98\precopy1.cab wsock32.dll /L c:\windows\system
If you are using Windows 95, then type the following and press Enter:
extract /a x:\win95\win95_02.cab wsock32.dll /L c:\windows\system
3. If you see an error message of any kind, then repeat step 2, making sure
that you typed the correct command for your operating system and that you
typed it exactly as shown. Otherwise, type exit and then press Enter.
To remove the rotating spiral:
W95.Hybris.Gen uses several different plug-ins. The most common is a large,
rotating spiral. If you see this on the Windows desktop, follow the
instructions in the document W95.Hybris.Plugin.
> -----Original Message-----
> From: Conspiracy Theory Research List [mailto:[EMAIL PROTECTED]]On
> Behalf Of Kris Millegan
> Sent: Saturday, April 14, 2001 7:38 PM
> To: [EMAIL PROTECTED]
> Subject: [CTRL] Golly Wally Doodle . . .
>
>
> -Caveat Lector-
>
> Saba and whomever, please think before posting to the list.
>
> I do not believe that the virus was viable as shown, the actions are very
> provacative, though.
>
> Om
> K
>
> <A HREF="http://www.ctrl.org/">www.ctrl.org</A>
> DECLARATION & DISCLAIMER
> ==========
> CTRL is a discussion & informational exchange list. Proselytizing
> propagandic
> screeds are unwelcomed. Substance not soap-boxing please! These are
> sordid matters and 'conspiracy theory' with its many half-truths, mis-
> directions and outright frauds is used politically by different
> groups with
> major and minor effects spread throughout the spectrum of time
> and thought.
> That being said, CTRLgives no endorsement to the validity of posts, and
> always suggests to readers; be wary of what you read. CTRL gives no
> credence to Holocaust denial and nazi's need not apply.
>
> Let us please be civil and as always, Caveat Lector.
> ========================================================================
> Archives Available at:
> http://peach.ease.lsoft.com/archives/ctrl.html
> <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
> [EMAIL PROTECTED]</A>
>
> http:[EMAIL PROTECTED]/
> <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
> ========================================================================
> To subscribe to Conspiracy Theory Research List[CTRL] send email:
> SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]
>
> To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
> SIGNOFF CTRL [to:] [EMAIL PROTECTED]
>
> Om
>
<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance�not soap-boxing�please! These are
sordid matters and 'conspiracy theory'�with its many half-truths, mis-
directions and outright frauds�is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.
Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
<A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>
http:[EMAIL PROTECTED]/
<A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]
To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]
Om