From: C y b e r T e c h @ L i s t s . E x M a c h i n a . n e t
<http://www.cybercafe21.net> & <http://www.cybercafe21.tv>
"Hugues.d" wrote:
> From: C y b e r T e c h @ L i s t s . E x M a c h i n a . n e t
> <http://www.cybercafe21.net> & <http://www.cybercafe21.tv>
>
> Hello
> Qui en veux ?
> Son nom: sexynain.scr
> Je suppose que c'est un virus, sans en avoir aucune certitude.
> Il m'a été envoyé le 24/1/2001, à mon adresse personnelle (pas par
> l'intermédiaire d'une ML), par par <[EMAIL PROTECTED]> (Received: from
> nas4-93.wnt.club-internet.fr(213.44.163.93), claiming to be "lifebook" )
>
> Voici le texte l'accompagnant:
> >"C'etait un jour avant son dix huitieme anniversaire. Les 7 nains, qui
> >avaient
> >aidé 'blanche neige' toutes ces années après qu'elle se soit enfuit de chez
> >sa belle mère, lui avaient promis une *grosse* surprise. A 5 heures comme
> >toujours, ils sont rentrés du travail. Mais cette fois ils avaient un air
> >coquin... "
>
> Bref, ce n'est peut-être qu' un fond d'écran porno, mais je voudrais en
> être sur.
> En effet, je n'ai trouvé (sur mes HD) aucun programme capable de l'ouvrir
> en temps qu'image.
> Je n'ai pu trouver dans ce fichier que ceci de "significatif" (pour moi):
> Win NT/Current version/Winlogon et GetModuleHandle Kernel32.dll
>
> A qui puis-je envoyer le fichier zippé (18Kb) pour s'en assurer ?
>
> Hugues.D
> -----------------------------------------------
> Mailto:[EMAIL PROTECTED]
>
> Des Cadeaux, des avantages et des offres qui vous interessent ?
> http://www.justforyou.be... what you want is what you get !
> - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
> CCTK vous est offert par Ex Machina <http://www.exmachina.net>
> Pour vous desabonner <mailto:[EMAIL PROTECTED]>
On en a parlé il y a 1 mois, c'est bien un virus genre I love you (envoie aux
personens dans ton carnet personnel outlook et bidouille ton pc). Il s'agit de
Hybris
http://www.europe.f-secure.com/v-descs/hybris.shtml
F-Secure Virus Descriptions
NAME:
Hybris
ALIAS:
IWorm_Hybris, I-Worm.Hybris
Hybris is an Internet worm that spreads itself as an
attachment to email messages. The worm works under
Win32 systems only. The worm
contains components (plugins) in its code that are
executed depending on what worm
needs, and these components can be upgraded from an
Internet Web site. The major
worm versions are encrypted with semi-polymorphic
encryption loop.
The worm contains the following encrypted text
strings:
HYBRIS
(c) Vecna
The main worm's target on computes it tries to infect
is the WSOCK32.DLL library.
While infecting this DLL the worm:
- writes itself to the end of last file section -
hooks "connect", "recv", "send" functions -
modifies DLL entry routine address (a routine that is
activated
when DLL file is being loaded) and encrypts original
entry
routine
If the worm is not able to infect WSOCK32.DLL at its
startup (in case it is in use and is
locked for writing) the worm creates a copy of this
library (a copy of WSOCK32.DLL with
random name), infects it and writes "rename"
instruction to WININIT.INI file. As a result
WSOCK32.DLL will be replaced with an infected one on
next Windows startup.
The worm also creates its copy with random name in
Windows system directory and
registers it in RunOnce registry key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
{Default} = %WinSystem%\WormName
or
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
{Default} = %WinSystem%\WormName
where %WinSystem% is Windows system directory, and
"WormName" is random
name, for example:
CCMBOIFM.EXE
LPHBNGAE.EXE
LFPCMOIF.EXE
There is only one possible reason to register
additional worm copy in "RunOnce"
registry key: in case WSOCK32.DLL was not infected on
first worm run, and its infected
copy was not created because of some reason, the
"RunOnce" worm copy will
complete the task on next Windows restart.
Being active the worm intercepts Windows function that
establish a network connection,
including Internet. The worm intercepts data that is
sent and received, and scans it for
email addresses. When address(es) is detected, the
worm waits for some time and then
sends an infected message to that address(es).
The worm functionality depends on the plugins that are
stored in a worm body encrypted
with RSA-like strong crypto algorithm with 128 bits
key. There are up to 32 plugins can
be found in different worm versions. These plugins
perform different actions, they can be
updates from a Web page located at VietMedia.com
website.
The complete worm functionality depends only on its
host that is able to upgrade
plugins from the Web page. The plugins are encrypted
with a RSA-like crypto too.
The worm also updates its plugins by using
alt.comp.virus newsgroup. The worm being
active on a machine connects to a news server (by
using one of randomly selected
servers - there are more than 70 addresses in the
list), converts its plugins to newsgroup
messages and post them there. Worm's messages have
random Subject, for example:
encr HVGT GTeLKzurGbGvqnuDqbivKfCHWbizyXiPOvKD
encr CMBK bKfOjafCjyfWnqLqzSTWTuDmfefyvurSLeXGHqR
text LNLM
LmnajmnKDyfebuLuPaPmzaLyXGXKPSLSXWjKvWnyDWbGH
text RFRE rebibmTCDOzGbCjSZ
where first four characters represent plugin "name"
and following four characters
represent the encoded plugin "version". As well as
sending, the worm reads such
messages from alt.comp.virus, gets plugin "name" and
"version" and compares with
plugins that are currently used by the worm. In case a
newsgroup has a message with
higher plugin version, the worm extracts it and
replaces existing one.
The worm drops its plugins to disk as files in Windows
sytem directory. They also have
random name, but the worm is able to access them. The
names may look as follows:
BIBGAHNH.IBG
DACMAPKO.ACM
GAFIBPFM.AFI
IMALADOL.MAL
MALADOLI.ALA
There are several different plugins known:
1. Infect all ZIP and RAR archives on all available
drives from C: till Z:. While infecting
the worm renames EXE files in archive with .EX$
extension and add its copy with .EXE
extension to the archive (companion method of
infection).
2. Send messages with encoded plugins to
"alt.comp.virus" neewsgroup, and gets new
plugins from there.
3. Spread virus to remote machines that have SubSeven
backdoor trojan installed. The
plugin detects such machines on the net, and by using
SubSeven commands uploads
worm copy to the machine and spawns it in there.
4. Encrypt worm copies with polymorphic encryption
loop before sending the copy
attached to email.
5. Affects DOS EXE and Windows PE EXE files. The worm
affects them so that they
become worm droppers. When run, they drop worm's EXE
file to TEMP directory and
execute it.
While affecting DOS EXE file the plugin adds dropper
code and worm body to the end of
a file. These files are can be cured.
While affecting Windows PE EXE file the plugin
overwrites file code section (if is has
enough size). The plugin doesn't touch file header
(including entry point address), and
does not increase file size. Moreover, it has a
anti-CRC (chechsum) routine that fill
special data in plugin code so that file CRC becomes
the same for few common used
CRC algorithms. That means, that some integrity
checkers will not detect changes in
affected files: the file length and file body CRC stay
the same as on clean file.
6. Depending on system date and time (on September 16
and 24, and on 59 minute of
each hour starting from 2001 - in known plugins) the
"spirale" effect is run. It looks like
that:
7. Randomly select Subject, Message text and Attach
name while sending worm copies
with email messages:
From:
Hahaha <[EMAIL PROTECTED]>
Subjects:
Snowhite and the Seven Dwarfs - The REAL story!
Branca de Neve pornô!
Enanito si, pero con que pedazo!
Les 7 coquir nains
Message texts:
C'etait un jour avant son dix huitieme anniversaire.
Les 7
nains, qui avaient aidé 'blanche neige' toutes ces
années après
qu'elle se soit enfuit de chez sa belle mère, lui
avaient promis
une *grosse* surprise. A 5 heures comme toujours, ils
sont
rentrés du travail. Mais cette fois ils avaient un
air coquin...
Today, Snowhite was turning 18. The 7 Dwarfs always
where very
educated and polite with Snowhite. When they go out
work at
mornign, they promissed a *huge* surprise. Snowhite
was anxious.
Suddlently, the door open, and the Seven Dwarfs
enter...
Faltaba apenas un dia para su aniversario de de 18
años. Blanca
de Nieve fuera siempre muy bien cuidada por los
enanitos. Ellos
le prometieron una *grande* sorpresa para su fiesta
de
compleaños. Al entardecer, llegaron. Tenian un brillo
incomun en
los ojos...
Faltava apenas um dia para o seu aniversario de 18
anos. Branca
de Neve estava muito feliz e ansiosa, porque os 7
anões
prometeram uma *grande* surpresa. As cinco horas, os
anõezinhos
voltaram do trabalho. Mas algo nao estava bem... Os
sete
anõezinhos tinham um estranho brilho no olhar...
Attachment names:
enano.exe
enano porno.exe
blanca de nieve.scr
enanito fisgon.exe
sexy virgin.scr
joke.exe
midgets.scr
dwarf4you.exe
blancheneige.exe
sexynain.scr
blanche.scr
nains.exe
branca de neve.scr
atchim.exe
dunga.scr
anão pornô.scr
As well as (depending on its plugin version) the
message Subject is a random
combination of:
Anna + sex
Raquel Darian sexy
Xena hot
Xuxa hottest
Suzete cum
famous cumshot
celebrity rape horny
leather ... e.t.c.
Attachment names:
Anna.exe
Raquel Darian.exe
Xena.exe
Xuxa.exe
Suzete.exe
famous.exe
celebrity rape.exe
leather.exe
sex.exe
sexy.exe
hot.exe
hottest.exe
cum.exe
cumshot.exe
horny.exe
anal.exe
gay.exe
oral.exe
pleasure.exe
asian.exe
lesbians.exe
teens.exe
virgins.exe
boys.exe
girls.exe
SM.exe
sado.exe
cheerleader.exe
orgy.exe
black.exe
blonde.exe
sodomized.exe
hardcore.exe
slut.exe
doggy.exe
suck.exe
messy.exe
kinky.exe
fist-f*cking.exe
amateurs.exe
The worm can also send itself with a random, 8-letter
name, for example
UKSJHHKW.EXE.
In some cases a worm can send itself attached to an
empty message. We also have
reports that it can use the recepient's mail server
directly.
It is advised to excercise extreme caution when
executable attachments arrive in your
inbox, no matter where they come from and how
'trustworthy' a message looks.
Hybris can be successfully disinfected with a fresh
version of FSAV and the latest
updates for it.
http://www.europe.f-secure.com/download-purchase/
http://www.europe.f-secure.com/download-purchase/updates.shtml
Note that Hybris file(s) might be locked while Windows
is active and older versions of
FSAV for Windows might not be able to remove it. In
this case you can exit to DOS and
remove Hybris file(s) manually.
You can also use a free version of F-Prot for DOS to
remove Hybris from an infected
system. It is a requirement to perform disinfection
from pure DOS.
ftp://ftp.europe.F-Secure.com/anti-virus/free/
ftp://ftp.europe.F-Secure.com/anti-virus/updates/f-prot/dos/
Note: As Hybris has a plugin that infects EXE files,
it is advised to disinfect all infected
files first and then to remove all locked Hybris
components manually.
[Eugene Kaspersky, KL; Alexey Podrezov, F-Secure
Corp.; Nov 2000 - Jan 2001]
--
Jean-Michel Reghem
Voice Technology Development Engineer
E-Mail : mailto:[EMAIL PROTECTED]
Babel Technologies S.A.
Boulevard Dolez 33 B-7000 Mons (Belgium)
Tel: (+32) 65.37.42.75 Fax: (+32) 65.37.42.76
http://www.babeltech.com
Des Cadeaux, des avantages et des offres qui vous interessent ?
http://www.justforyou.be... what you want is what you get !
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
CCTK vous est offert par Ex Machina <http://www.exmachina.net>
Pour vous desabonner <mailto:[EMAIL PROTECTED]>