LJM Master Posted April 2, 2005 Report Share Posted April 2, 2005 WORM_KRYNOS.B is a destructive, memory-resident worm that propagates via peer-to-peer applications by dropping a .ZIP copy of itself in a certain folder. It may also spread via email by sending itself as an attachment. This worm has backdoor capabilities, allowing remote users to access and perform malicious tasks on affected machines. It can also prevent affected users from accessing certain antivirus and security Web sites by modifying the HOSTS file. WORM_KRYNOS.B is currently spreading in-the-wild, and infecting computers running Windows NT, 2000, and XP.Upon execution, this memory-resident worm drops the following files in the Windows folder:* %Windows%\Help\svchost.dat* %Windows%\Help\svchost.exe* %Windows%\Help\svchost.lceIt then displays the following message:Can't open mfc73rp.dllIt creates a registry entry that allows it to automatically execute the dropped file svchost.exe at every system startup.This worm propagates via P2P applications by making a .ZIP copy of itself in a specific folder -- the file name depends on the names of the currently saved files in that folder.The worm may also propagate by sending itself as an attachment to an email message. It searches files with the extensions HTM and TXT for target email addresses. However, it first queries www.google.com to check for an Internet connection, before it sends the email.The email it sends contains the following details:From: [email protected]To: (recipient email address harvested from affected system)Subject: Microsoft Security UpdateMessage body:* "Vulnerability in Windows Explorer Could Allow Remote Code Execution (612827)"Affected Software:* Impact of Vulnerability: Remote Code Execution* Importance: High* Maximum Severity Rating: Critical* Recommendation: Customers should apply the attached update at the earliest opportunity* Summary:* Who should read this document: Customers who use Microsoft Windows* X-Mailer: Secure Microsoft Client, Build 2.1* X-MimeOLE: Produced By Secure Microsoft Client V2.1* X-MSMail-Priority: High* X-Priority: 1 (Highest)Attachment:* ARC* ARJ* GZ* LZH* TGZ* ZIP* ZOOThe worm avoids worm avoids sending email to addresses containing certain strings. View the complete list of strings.The following backdoor capabilities are enabled by the worm:Get, upload, download, or delete a fileList files in a folderDisconnect current userRestart the systemRun a programCreate or delete a folderThis worm also modifies the system's HOSTS, which contains the host name to IP address mappings. This modification prevents affected users from accessing specific sites related to antivirus companies.If you would like to scan your computer for WORM_KRYNOS.B or thousands of other worms, viruses, Trojans and malicious code, visit HouseCall, Trend Micro's free, online virus scanner at: http://housecall.trendmicro.com/WORM_KRYNOS.B is detected and cleaned by Trend Micro pattern file #2.523.05 and above. Quote Link to post Share on other sites
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.