Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


W32/Bagle.BJ - aka Beagle.AY

  • Please log in to reply
2 replies to this topic

#1 harrywaldron


    Security Reporter

  • Members
  • 509 posts
  • Gender:Male
  • Location:Roanoke, Virginia
  • Local time:07:18 AM

Posted 26 January 2005 - 09:43 PM

This new variant is beginning to spread in the wild

W32/Bagle.BJ - New variant in the wild

Virus Characteristics:
* contains its own SMTP engine to construct outgoing messages
* harvests email addresses from the victim machine
* the From: address of messages is spoofed
* contains a remote access component (notification is sent to hacker)
* copies itself to folders that have the phrase shar in the name (such as common peer-to-peer applications; KaZaa, Bearshare, Limewire, etc)


From : (address is spoofed)

Subject :
* Delivery service mail
* Delivery by mail
* Registration is accepted
* Is delivered mail
* You are made active

Body Text:
* Thanks for use of our software.
* Before use read the help

Attachment: may be one of the following, with an extension of .exe, .scr, .com, or .cpl
* wsd01
* viupd02
* siupd02
* guupd02
* zupd02
* upd02
* Jol03

Edited by harrywaldron, 27 January 2005 - 07:06 AM.

BC AdBot (Login to Remove)


#2 harrywaldron


    Security Reporter

  • Topic Starter

  • Members
  • 509 posts
  • Gender:Male
  • Location:Roanoke, Virginia
  • Local time:07:18 AM

Posted 27 January 2005 - 07:09 AM

Secunia and McAfee have escalated this to MEDIUM RISK

-- Update 27th January 2005 12:50 PST -- Due to increased prevalence the risk assessment of this threat has been raised to medium. The 4423 DATs have been released early to address this threat.

#3 Scarlett


    Bleeping Diva

  • Members
  • 7,479 posts
  • Gender:Female
  • Location:As always I'm beside myself ;)
  • Local time:06:18 AM

Posted 27 January 2005 - 03:42 PM

Thanks harry for the heads up. I have been to busy to keep up with things lately.

Edited by scarlett, 27 January 2005 - 04:49 PM.

Posted Image

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users