I use McAfee and it's been catching them just fine for me, probly about 20 or so since 
Sunday. 

-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Todd Ryan
Sent: Tuesday, November 27, 2001 3:17 AM
To: [EMAIL PROTECTED]
Subject: Re: [IMail Forum] Declude Catch BadTrans Virus?


Declude and McAfee NetShield has caught about 20 of them in the last couple
days here.  I'm happy.

--Todd.


----- Original Message -----
From: "Dale Chavez" <[EMAIL PROTECTED]>
To: "Imail Forum" <[EMAIL PROTECTED]>
Sent: Monday, November 26, 2001 10:08 AM
Subject: [IMail Forum] Declude Catch BadTrans Virus?


> Just received this new virus warning this morning and was wondering if
> Declude will indeed catch and quarantine this new one?
>
> Thanks,
> Dale
>
> +----------------------------------------------------
>
> From: [EMAIL PROTECTED]
> To: MS Outlook::VirusEye Subscriber
>
> Subject: BadTrans Virus Alert
> Date: 11/26/01 4:55 AM
>
> Dear VirusEye Alert Subscriber,
>
> There is a new and dangerous virus in circulation with the key details
> as follows:
>
> - Virus name:  BadTrans
>
> - Official name: W32/BadTrans.B-mm
>
> - Number of copies seen so far: 11,384
>
> - Time & Date first Captured: 23 Nov 2001 18:40:36 GMT
>
> - Origin of first intercepted copy: UK
>
> - Number of countries seen active: 34
>
> - Top three most active countries: UK, US, Germany
>
> Distribution Potential:
>
> MessageLabs are intercepting the BadTrans.B virus at a rate of 100 per
> minute and it is one of the fastest spreading viruses we have ever seen.
>
> The virus is now widespread - we have stopped copies coming from over 30
> countries and it has replaced SirCam at No. 1 in MessageLabs' daily top
> 10 which had occupied the No. 1 spot for over 4 months.
>
> Technical Information:
>
> Propagation:
>
> The virus makes use of the ms01-020 exploit, which means that the virus
> can execute on reading or previewing the email from within Microsoft
> Outlook - it is not necessary to double click on any attachment.
>
> Subject:
>
> Subject line is selected from an email in the infected users PC and
> prefixed with 'Re: '
>
> Attachment:
>
> Variable - built up from several elements.  Examples include:
>
>      S3MSONG.DOC.scr
>      Pics.DOC.scr
>      HUMOR.MP3.scr
>      Sorry_about_yesterday.MP3.pif
>      README.MP3.scr
>      ME_NUDE.MP3.scr
>      fun.MP3.pif
>      NEWS_DOC.DOC.scr
>      docs.DOC.pif
>      images.DOC.pif
>      HAMSTER.DOC.pif
>      SEARCHURL.MP3.pif
>
> Payload:
>
> The virus also drops a password stealing Trojan KDLL.DLL previously
> identified as Trojan.PSW.Hooker.  The trojan component uses key logging
> to send confidential information (passwords, credit card details etc.)
> from infected computers to the email address:
>
>       [EMAIL PROTECTED]
>
> The trojan component moves itself to the Windows system directory with
> the filename KERN32.EXE, drops an additional library (key logger) with
> filename HKSDLL.DLL.
>
> The trojan registers itself in the Registry in RunOnce key:
>
>                 HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce
>                   kernel32 = kern32.exe
>
> Windows loads the trojan file on each restart.
>
>
> Please visit http://www.ipswitch.com/support/mailing-lists.html
> to be removed from this list.
>
> An Archive of this list is available at:
> http://www.mail-archive.com/imail_forum%40list.ipswitch.com/
>
>


Please visit http://www.ipswitch.com/support/mailing-lists.html 
to be removed from this list.

An Archive of this list is available at:
http://www.mail-archive.com/imail_forum%40list.ipswitch.com/


Please visit http://www.ipswitch.com/support/mailing-lists.html 
to be removed from this list.

An Archive of this list is available at:
http://www.mail-archive.com/imail_forum%40list.ipswitch.com/

Reply via email to