Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Websense Security Labs(tm) Has Discovered A New Set Of The Warezov/stration Malicious Code

  • Please log in to reply
No replies to this topic

#1 fozzie


    aut viam inveniam aut faciam

  • Members
  • 3,516 posts
  • Gender:Male
  • Location:Ossendrecht/The Netherlands
  • Local time:09:12 AM

Posted 22 March 2007 - 03:27 PM

<!--QuoteBegin-"Websense"websense Security Labs™ has discovered a new set of the Warezov/Stration malicious code. This new code is currently spreading through the Skype network. Although the code itself is not self-propagating+ when it runs, a URL is sent to all users within the user's Contacts List.

This attack appears to be the same as the version mentioned on the FSecure Blog Feb 27th, http://www.f-secure.com/weblog/archives/ar...7.html#00001126[/url],
but with new URL information and a new version of the malicious code.

Skype users receive a message that says "Check up this," with a URL containing a hyperlink. When users click on the link, they are redirected to a site that is hosting a file named file_01.exe. Users are prompted to run the file (note: there is no vulnerability within Skype). If the user runs the file, several other files are downloaded and run.

The files listed below are loaded from different domains. These domains were up and running at the time of this alert.

1e61617b7498c5cad41c4d26b8e4ca8c file_01.exe 7c2b181ab4fbe858e22bbbdc725e4f53 gdi32.exe 7306bed6c39560ed78fe67cfc5e643c8 ndis.exe 5262a217d2ca7f28be6fc398d8f8aee3 sk.exe

The user's contacts also receive the URL within Skype. Once the Trojan is installed in a system, it tries to connect to a Yahoo mail server to send an SMTP message. However, that server does not seem to be operative and the communication fails. This inoperability is probably an attempt to notify the attacker that a certain machine has been infected.

The downloaded files are other versions of the Warezov/Stration malicious code. This code opens backdoors to the users systems and also downloads new code.

Screenshot available in full alert.

The whole websense article

Edited by fozzie, 22 March 2007 - 03:28 PM.

BC AdBot (Login to Remove)


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users