This is some info on Kez. It Pays to check that your
ISP also scans incomeing mail as well as out going.My
ISP has done a great job in this.We have Had one and
one only. I run AVG and do a update ceck each day.
Virus Profile 
 
   
Virus Information 
Name:  W32/Klez.h@MM 
 
Risk Assessment    
 
  - Home Users:  Medium 
 
  - Corporate Users:  Medium 
 
Date Discovered:  4/17/2002 
 
Date Added:  4/17/2002 
 
Origin:  Unknown 
 
Length:  approx 90kB 
 
Type:  Internet Worm 
 
SubType:  Win32 
 
DAT Required:  4182 
 
 
     
Quick Links 
Virus Characteristics 
Indications of Infection 
Method of Infection 
Removal Instructions 
Aliases 
Send Virus Info via Email 
 
 
   
Buy or Update 
  New Users Get Protected Now:
Buy VirusScan Online 
 
 Update VirusScan Online 
 
 Download the latest DAT files 
  
 
 
 
   
Virus Characteristics  
 
W32/Klez.h@MM has a number of similarities to previous
W32/Klez variants, for example:

W32/Klez.h@MM makes use of Incorrect MIME Header Can
Cause IE to Execute E-mail Attachment vulnerability in
Microsoft Internet Explorer (ver 5.01 or 5.5 without
SP2). 
the worm has the ability to spoof the From: field
(often set to an address found on the victim's
machine). 
the worm attempts to unload several processes
(antivirus programs) from memory including those
containing the following strings: 
_AVP32 
_AVPCC 
NOD32 
NPSSVC 
NRESQ32 
NSCHED32 
NSCHEDNT 
NSPLUGIN 
NAV 
NAVAPSVC 
NAVAPW32 
NAVLU32 
NAVRUNR 
NAVW32 
_AVPM 
ALERTSVC 
AMON 
AVP32 
AVPCC 
AVPM 
N32SCANW 
NAVWNT 
ANTIVIR 
AVPUPD 
AVGCTRL 
AVWIN95 
SCAN32 
VSHWIN32 
F-STOPW 
F-PROT95 
ACKWIN32 
VETTRAY 
VET95 
SWEEP95 
PCCWIN98 
IOMON98 
AVPTC 
AVE32 
AVCONSOL 
FP-WIN 
DVP95 
F-AGNT95 
CLAW95 
NVC95 
SCAN 
VIRUS 
LOCKDOWN2000 
Norton 
Mcafee 
Antivir 
The worm is able to propagate over the network by
copying itself to network shares (assuming sufficient
permissions exist). Target filenames are chosen
randomly, and can have single or double file
extensions. For example: 
  350.bak.scr 
  bootlog.jpg 
  user.xls.exe 

The worm may also copy itself into RAR archives, for
example: 
  HREF.mpeg.rar 
  HREF.txt.rar 
  lmbtt.pas.rar 

The worm mails itself to email addresses in the
Windows Address Book, and to addresses extracted from
files on the victim's machine. It arrives in an email
message whose subject and body is composed from a pool
of strings carried within the virus (the virus can
also add other strings obtained from the local
machine). For example:

Subject: A very funny website 
or Subject: Undeliverable mail--
or Subject: Returned mail-- 
or Subject: A WinXP patch 
or Subject: A IE 6.0 patch 
or Subject: W32.Elkern removal tools 
or Subject: W32.Klez.E removal tools

The file attachment name is again generated randomly,
and ends with an .exe, .scr, .pif, or .bat extension,
for example: 
  ALIGN.pif 
  User.bat 
  line.bat 

Thanks to the use of the exploit described above,
simply opening or previewing the message in a
vulnerable mail client can result in an infection of
the victim's machine. 

W32/Klez.h@MM masquerades as a free immunity tool in
at least one of the messages used. Below is the
message sent by the virus itself.

Subject: Worm Klez.E Immunity 
Body: Klez.E is the most common world-wide spreading
worm. It's very dangerous by corrupting your files.
Because of its very smart stealth and anti-anti-virus
technic,most common AV software can't detect or clean
it.We developed this free immunity tool to defeat the
malicious virus. You only need to run this tool
once,and then Klez will never come into your PC.

NOTE: Because this tool acts as a fake Klez to fool
the real worm,some AV monitor maybe cry when you run
it. If so,Ignore the warning,and select 'continue'. If
you have any question,please mail to me. 
 
The worm may send a clean document in addition to an
infected file. A document found on the hard disk, that
contains one of the following extensions, is sent: 

.txt 
.htm 
.html 
.wab 
.asp 
.doc 
.rtf 
.xls 
.jpg 
.cpp 
.c 
.pas 
.mpg 
.mpeg 
.bak 
.mp3 
.pdf 
This payload can result in confidental information
being sent to others. 
 
 
   
Indications Of Infection  
 
Randomly/oddly named files on network shares, as
described above. 
Reference to a WINKxxx.EXE file ("xxx" looks random)
in a Registry key: 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
 
 
 
   
Method Of Infection  
 
This virus can be considered a blended threat. It
mass-mails itself to email addresses found on the
local system, exploits a Microsoft vulnerability,
spreads via network shares, infects executables on the
local system, and drops an additional file infecting
virus, W32/Elkern.cav.c. 
 

--- Helen Allen <[EMAIL PROTECTED]> wrote:
> I changed my ISP provider many months ago when I
> went on DSL.  This ISP
> scans all mail for viruses before they send them on
> to their customers. They
> don't guarantee that none will get through, but it
> appears they are catching
> all of them so far.  If one ISP can do that, it
> appears to me all of them
> could.  In addition I have Norton anti-virus, just
> in case.
> Helen Allen
> 
> 
> Legacy User Group Etiquette guidelines can be found
> at:
> http://www.LegacyFamilyTree.com/Etiquette.asp
> 
> To find past messages, please go to our searchable
> archives at:
>
http://www.mail-archive.com/legacyusergroup%40mail.millenniacorp.com/
> 
> To unsubscribe please visit:
> http://www.legacyfamilytree.com/LegacyLists.asp


=====
Donald R.Frost Sr.
Frost family history
Ma.Vt.N.H.Me.Ct.
101 Orson Drive.
DeFuniak Springs,Fl.
32433-4064

__________________________________________________
Do you Yahoo!?
Yahoo! Mail Plus - Powerful. Affordable. Sign up now.
http://mailplus.yahoo.com
Legacy User Group Etiquette guidelines can be found at:
http://www.LegacyFamilyTree.com/Etiquette.asp

To find past messages, please go to our searchable archives at:
http://www.mail-archive.com/legacyusergroup%40mail.millenniacorp.com/

To unsubscribe please visit:
http://www.legacyfamilytree.com/LegacyLists.asp

Reply via email to