Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

W32/Bagle.BJ - aka Beagle.AY


  • Please log in to reply
2 replies to this topic

#1 harrywaldron

harrywaldron

    Security Reporter


  • Members
  • 509 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Roanoke, Virginia
  • Local time:06:15 PM

Posted 26 January 2005 - 09:43 PM

This new variant is beginning to spread in the wild

W32/Bagle.BJ - New variant in the wild
http://vil.nai.com/vil/content/v_131351.htm
http://www.f-secure.com/weblog/#00000450
http://www.trendmicro.com/vinfo/virusencyc...RM%5FBAGLE%2EAY
http://securityresponse.symantec.com/avcen...agle.ay@mm.html

Virus Characteristics:
* contains its own SMTP engine to construct outgoing messages
* harvests email addresses from the victim machine
* the From: address of messages is spoofed
* contains a remote access component (notification is sent to hacker)
* copies itself to folders that have the phrase shar in the name (such as common peer-to-peer applications; KaZaa, Bearshare, Limewire, etc)

EMAIL MESSAGE FORMAT

From : (address is spoofed)

Subject :
* Delivery service mail
* Delivery by mail
* Registration is accepted
* Is delivered mail
* You are made active

Body Text:
* Thanks for use of our software.
* Before use read the help

Attachment: may be one of the following, with an extension of .exe, .scr, .com, or .cpl
* wsd01
* viupd02
* siupd02
* guupd02
* zupd02
* upd02
* Jol03

Edited by harrywaldron, 27 January 2005 - 07:06 AM.


BC AdBot (Login to Remove)

 


m

#2 harrywaldron

harrywaldron

    Security Reporter

  • Topic Starter

  • Members
  • 509 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Roanoke, Virginia
  • Local time:06:15 PM

Posted 27 January 2005 - 07:09 AM

Secunia and McAfee have escalated this to MEDIUM RISK

-- Update 27th January 2005 12:50 PST -- Due to increased prevalence the risk assessment of this threat has been raised to medium. The 4423 DATs have been released early to address this threat.

#3 Scarlett

Scarlett

    Bleeping Diva


  • Members
  • 7,479 posts
  • OFFLINE
  •  
  • Gender:Female
  • Location:As always I'm beside myself ;)
  • Local time:05:15 PM

Posted 27 January 2005 - 03:42 PM

Thanks harry for the heads up. I have been to busy to keep up with things lately.

Edited by scarlett, 27 January 2005 - 04:49 PM.

Posted Image




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users