This attack appears to be the same as the version mentioned on the FSecure Blog Feb 27th, http://www.f-secure.com/weblog/archives/ar...7.html#00001126[/url],
but with new URL information and a new version of the malicious code.
Skype users receive a message that says "Check up this," with a URL containing a hyperlink. When users click on the link, they are redirected to a site that is hosting a file named file_01.exe. Users are prompted to run the file (note: there is no vulnerability within Skype). If the user runs the file, several other files are downloaded and run.
The files listed below are loaded from different domains. These domains were up and running at the time of this alert.
1e61617b7498c5cad41c4d26b8e4ca8c file_01.exe 7c2b181ab4fbe858e22bbbdc725e4f53 gdi32.exe 7306bed6c39560ed78fe67cfc5e643c8 ndis.exe 5262a217d2ca7f28be6fc398d8f8aee3 sk.exe
The user's contacts also receive the URL within Skype. Once the Trojan is installed in a system, it tries to connect to a Yahoo mail server to send an SMTP message. However, that server does not seem to be operative and the communication fails. This inoperability is probably an attempt to notify the attacker that a certain machine has been infected.
The downloaded files are other versions of the Warezov/Stration malicious code. This code opens backdoors to the users systems and also downloads new code.
Screenshot available in full alert.
The whole websense article
Edited by fozzie, 22 March 2007 - 03:28 PM.