On Mon, Apr 23, 2001 at 07:31:53PM +0300, Stanislav Lechev wrote:
> 
> ami mnogo prosto ako si izpusnal prednoto msg nqma da znesh za kwo stawa duma
> 
> a na tebe kwo ti prechat reply-ite ???

������ � ����, �� �� 2 ���� ������� (��������� 1 ���� � 1 �����������) ��
�������� �� 10-15� ���������. ���� ����� �� �� �� ������ ���� �� ����� (�� ��
���� �� ����):


---> cut <---

> ����� ����� ������� �����!
>
> ME:
>         Hybris
>   ALIAS:
>         IWorm_Hybris, I-Worm.Hybris
> 
> 
>   Hybris is an Internet worm that spreads itself as an attachment to email messages. 
>The worm works under
>   Win32 systems only. The worm contains components (plugins) in its code that are 
>executed depending on
>   what worm needs, and these components can be upgraded from an Internet Web site. 
>The major worm
>   versions are encrypted with semi-polymorphic encryption loop. 
> 
>   The worm contains the following encrypted text strings: 
> 
>    HYBRIS
>    (c) Vecna
> 
>   The main worm's target on computes it tries to infect is the WSOCK32.DLL library. 
>While infecting this DLL
>   the worm: 
> 
>   - writes itself to the end of last file section - hooks "connect", "recv", "send" 
>functions - modifies DLL entry
>   routine address (a routine that is activated 
> 
>     when DLL file is being loaded) and encrypts original entry
>     routine
> 
>   If the worm is not able to infect WSOCK32.DLL at its startup (in case it is in use 
>and is locked for writing) the
>   worm creates a copy of this library (a copy of WSOCK32.DLL with random name), 
>infects it and writes
>   "rename" instruction to WININIT.INI file. As a result WSOCK32.DLL will be replaced 
>with an infected one on
>   next Windows startup. 
> 
>   The worm also creates its copy with random name in Windows system directory and 
>registers it in RunOnce
>   registry key: 
> 
>    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
>     {Default} = %WinSystem%\WormName
> 
>   or 
> 
>    HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
>     {Default} = %WinSystem%\WormName
> 
>   where %WinSystem% is Windows system directory, and "WormName" is random name, for 
>example: 
> 
>    CCMBOIFM.EXE
>    LPHBNGAE.EXE
>    LFPCMOIF.EXE
> 
>   There is only one possible reason to register additional worm copy in "RunOnce" 
>registry key: in case
>   WSOCK32.DLL was not infected on first worm run, and its infected copy was not 
>created because of some
>   reason, the "RunOnce" worm copy will complete the task on next Windows restart. 
> 
>   Being active the worm intercepts Windows function that establish a network 
>connection, including Internet.
>   The worm intercepts data that is sent and received, and scans it for email 
>addresses. When address(es) is
>   detected, the worm waits for some time and then sends an infected message to that 
>address(es). 
> 
>   The worm functionality depends on the plugins that are stored in a worm body 
>encrypted with RSA-like
>   strong crypto algorithm with 128 bits key. There are up to 32 plugins can be found 
>in different worm versions.
>   These plugins perform different actions, they can be updates from a Web page 
>located at VietMedia.com
>   website. 
> 
>   The complete worm functionality depends only on its host that is able to upgrade 
>plugins from the Web page.
>   The plugins are encrypted with a RSA-like crypto too. 
> 
>   The worm also updates its plugins by using alt.comp.virus newsgroup. The worm 
>being active on a machine
>   connects to a news server (by using one of randomly selected servers - there are 
>more than 70 addresses in
>   the list), converts its plugins to newsgroup messages and post them there. Worm's 
>messages have random
>   Subject, for example: 
> 
>    encr HVGT GTeLKzurGbGvqnuDqbivKfCHWbizyXiPOvKD
>    encr CMBK bKfOjafCjyfWnqLqzSTWTuDmfefyvurSLeXGHqR
>    text LNLM LmnajmnKDyfebuLuPaPmzaLyXGXKPSLSXWjKvWnyDWbGH
>    text RFRE rebibmTCDOzGbCjSZ
> 
>   where first four characters represent plugin "name" and following four characters 
>represent the encoded
>   plugin "version". As well as sending, the worm reads such messages from 
>alt.comp.virus, gets plugin "name"
>   and "version" and compares with plugins that are currently used by the worm. In 
>case a newsgroup has a
>   message with higher plugin version, the worm extracts it and replaces existing 
>one. 
> 
>   The worm drops its plugins to disk as files in Windows sytem directory. They also 
>have random name, but the
>   worm is able to access them. The names may look as follows: 
> 
>    BIBGAHNH.IBG
>    DACMAPKO.ACM
>    GAFIBPFM.AFI
>    IMALADOL.MAL
>    MALADOLI.ALA
> 
>   There are several different plugins known: 
> 
>   1. Infect all ZIP and RAR archives on all available drives from C: till Z:. While 
>infecting the worm renames EXE
>   files in archive with .EX$ extension and add its copy with .EXE extension to the 
>archive (companion method
>   of infection). 
> 
>   2. Send messages with encoded plugins to "alt.comp.virus" neewsgroup, and gets new 
>plugins from there. 
> 
>   3. Spread virus to remote machines that have SubSeven backdoor trojan installed. 
>The plugin detects such
>   machines on the net, and by using SubSeven commands uploads worm copy to the 
>machine and spawns it in
>   there. 
> 
>   4. Encrypt worm copies with polymorphic encryption loop before sending the copy 
>attached to email. 
> 
>   5. Affects DOS EXE and Windows PE EXE files. The worm affects them so that they 
>become worm droppers.
>   When run, they drop worm's EXE file to TEMP directory and execute it. 
> 
>   While affecting DOS EXE file the plugin adds dropper code and worm body to the end 
>of a file. These files are
>   can be cured. 
> 
>   While affecting Windows PE EXE file the plugin overwrites file code section (if is 
>has enough size). The plugin
>   doesn't touch file header (including entry point address), and does not increase 
>file size. Moreover, it has a
>   anti-CRC (chechsum) routine that fill special data in plugin code so that file CRC 
>becomes the same for few
>   common used CRC algorithms. That means, that some integrity checkers will not 
>detect changes in affected
>   files: the file length and file body CRC stay the same as on clean file 
> 
>   6. Randomly select Subject, Message text and Attach name while sending worm copies 
>with email messages: 
> 
>   From: 
> 
>     Hahaha <[EMAIL PROTECTED]>
> 
>   Subjects: 
> 
>     Snowhite and the Seven Dwarfs - The REAL story!
>     Branca de Neve porn�!
>     Enanito si, pero con que pedazo!
>     Les 7 coquir nains
> 
>   Message texts: 
> 
>    C'etait un jour avant son dix huitieme anniversaire. Les 7
>    nains, qui avaient aid� 'blanche neige' toutes ces ann�es apr�s
>    qu'elle se soit enfuit de chez sa belle m�re, lui avaient promis
>    une *grosse* surprise. A 5 heures comme toujours, ils sont
>    rentr�s du travail. Mais cette fois ils avaient un air coquin...
> 
>    Today, Snowhite was turning 18. The 7 Dwarfs always where very
>    educated and polite with Snowhite. When they go out work at
>    mornign, they promissed a *huge* surprise. Snowhite was anxious.
>    Suddlently, the door open, and the Seven Dwarfs enter...
> 
>    Faltaba apenas un dia para su aniversario de de 18 a�os. Blanca
>    de Nieve fuera siempre muy bien cuidada por los enanitos. Ellos
>    le prometieron una *grande* sorpresa para su fiesta de
>    complea�os. Al entardecer, llegaron. Tenian un brillo incomun en
>    los ojos...
> 
>    Faltava apenas um dia para o seu aniversario de 18 anos. Branca
>    de Neve estava muito feliz e ansiosa, porque os 7 an�es
>    prometeram uma *grande* surpresa. As cinco horas, os an�ezinhos
>    voltaram do trabalho. Mas algo nao estava bem... Os sete
>    an�ezinhos tinham um estranho brilho no olhar...
> 
>   Attachment names: 
> 
>    enano.exe
>    enano porno.exe
>    blanca de nieve.scr
>    enanito fisgon.exe
>    sexy virgin.scr
>    joke.exe
>    midgets.scr
>    dwarf4you.exe
>    blancheneige.exe
>    sexynain.scr
>    blanche.scr
>    nains.exe
>    branca de neve.scr
>    atchim.exe
>    dunga.scr
>    an�o porn�.scr
> 
>   As well as (depending on its plugin version) the message Subject is a random 
>combination of: 
> 
>    Anna             +  sex
>    Raquel Darian       sexy
>    Xena                hot
>    Xuxa                hottest
>    Suzete              cum
>    famous              cumshot
>    celebrity rape      horny
>    leather             ... e.t.c.
> 
>   Attachment names: 
> 
>    Anna.exe
>    Raquel Darian.exe
>    Xena.exe
>    Xuxa.exe
>    Suzete.exe
>    famous.exe
>    celebrity rape.exe
>    leather.exe
>    sex.exe
>    sexy.exe
>    hot.exe
>    hottest.exe
>    cum.exe
>    cumshot.exe
>    horny.exe
>    anal.exe
>    gay.exe
>    oral.exe
>    pleasure.exe
>    asian.exe
>    lesbians.exe
>    teens.exe
>    virgins.exe
>    boys.exe
>    girls.exe
>    SM.exe
>    sado.exe
>    cheerleader.exe
>    orgy.exe
>    black.exe
>    blonde.exe
>    sodomized.exe
>    hardcore.exe
>    slut.exe
>    doggy.exe
>    suck.exe
>    messy.exe
>    kinky.exe
>    fist-f*cking.exe
>    amateurs.exe
>
>   It is advised to excercise extreme caution when executable attachments arrive in 
>your inbox, no matter where
>   they come from and how 'trustworthy' a message looks. 


�� ��� �� ����! ;P

---> cut <---

� ���� ���� �� ���� ���� �� ����� �������? ��� ���� ���� �������� netiquette.
������ �� �� �������� ��� ����� ��������. ���� �� ����� �� ����� �� ��������
200� ���� � 5� ������� ���������� ��� ��� ����� �� �� �� ���� �� ����� Subject
� ����������� �� 3-4 ����... ���� �� �� ���� ������� ������� ��� ��� �� �����
"������������� ����� �� ���������� �������" ��� ���� �������, �� ������ ��� �
_�����������_ �� ���� LUG.


������� �� ���. �� ������ ���� ����� ;-)

-- 
        =- --rw------- =--=--=--=--=--=--=--=--=--=--=--=--=--=
          Theodor Milkov           Administrator IP Networks
          Davidov Electric Ltd.    Phone: +359 (2) 730158
          PGP: http://www.zimage.delbg.com/zimage.asc
        =--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=--=

PGP signature

Reply via email to