Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Bagle.qs - New Variant Emerges After Long Absence

  • Please log in to reply
No replies to this topic

#1 harrywaldron


    Security Reporter

  • Members
  • 509 posts
  • Gender:Male
  • Location:Roanoke, Virginia
  • Local time:01:41 AM

Posted 30 November 2006 - 08:41 PM

The Bagle virus is an advanced email virus that can update itself from a website and spam extensively to others found in email address books.

Bagle.QS - New variant emerges after long absence

We haven't seen new Bagle attacks in a while. Last one - and even that was an isolated one - was exactly a month ago. But now something's up. Some of the old Bagle update URLs activated tonight, offering a new 188kB executable. This is downloaded and run by machines infected by previous Bagle variants...and it starts to spam out infected attachments with filenames talking about price lists. The spammed emails include a GIF which shows a password needed to decode the ZIPs files.


Subject line chosen from:
* new <date>
* price<date>
* price_ <date>
* price_new <date>

Message text chosen from:
* It Is Protected Passwrd:
* thank you !!! Passwrd:
* New year's discounts Passwrd:

The attached file is named:
* new_price<date>.zip
* price_list<date>.zip
* latest_price<date>.zip

<date> == when email was sent (30-Nov-2006)

BC AdBot (Login to Remove)



0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users