martymas Posted November 20, 2004 Report Share Posted November 20, 2004 hi team here is trend micro 's alert of the arafat worm.i tried to put it into a link.but deciced to send it in text, that way no one can be suspicious of the link, like me a lot of you are reluctant to click on links . martyDate: Friday November 19, 2004NOTE: The Weekly Virus Report will be on hiatus next week, during the Thanksgiving Holiday, but will return to its regular schedule on December3.------------------------------------------------------------------------To read an HTML version of this newsletter, go to: http://www.trendmicro.com/en/security/report/overview.htmIssue Preview: 1. Trend Micro Updates - Pattern File & Scan Engine Updates2. Arafat Worm – WORM_GOLTEN.A (Low Risk)3. Top 10 Most Prevalent Global Malware 4. Trend Micro URL Filtering Module - Important Product Update NowAvailable5. Trend Micro Announces Network VirusWall 300NOTE: Long URLs may break into two lines in some mail readers. Should this occur, please copy and paste the URL into your browser window.************************************************************************1. Trend Micro Updates - Pattern File & Scan Engine Updates ------------------------------------------------------------------------PATTERN FILE: 2.251.00 http://www.trendmicro.com/download/pattern.aspSCAN ENGINE: 7.100 http://www.trendmicro.com/download/engine.asp 2. Arafat Worm – WORM_GOLTEN.A (Low Risk)------------------------------------------------------------------------WORM_GOLTEN.A is a memory-resident network worm. It has nomass-mailing capabilities, but may have been mass-mailed to specific email addressesinstead. The email message contains two .EMF file attachments: one showsthe burial of Palestinian leader Yasser Arafat and the other contains codethat exploits a Microsoft XP vulnerability. The worm propagates vianetwork shares and attempts to connect to network shared folders. It uses alist of user names and passwords to gain access to a machines, to establisha network connection and execute a copy of itself in the accessed networkshare. This worm runs on Windows 2000 and XP, and is currently spreadingin-the-wild.Upon execution, this worm drops the following files in the Windows systemfolder: ALERTER.EXE - main component and installer COMWSOCK.DLL DMSOCK.DLL IETCOM.DLL SPTRES.DLL SCARDSER.EXE - installs .DLL (Dynamic Link Library) files that injectthis worm into LSASS.EXE and IEXPLORE.EXE It also adds a registry entry that allows it to automatically execute atevery system startup, and installs the following .DLL files: COMWSCOK.DLL DMSOCK.DLL IETCOM.DLL SPTRES.DLL These .DLL files inject this worm into the following processes: LSASS.EXE EXPLORER.EXE The .DLL files download other components from a remote location, and areresponsible for the propagation of this worm. The worm also adds a registry entry that initiates the download of aremote file, which is saved as DMSTI.EXE.WORM_GOLTEN.A propagates through network shares and attempts to connectand execute a copy of itself in the following default network folders: ADMIN$ IPC$ It also installs a service named NETLOG. This worm uses the following user names and passwords to gain access tomachines connected on the same network: !@#$ !@#$% !@#$% ~!@# 000000 00000000 111 111111 11111111 12 123 123!@# 1234 1234!@#$ 12345 12345!@#$% 123456 1234567 12345678 54321 654321 888888 88888888 admin fan@ing* oracle pass passwd password root secret security stgzs super The worm may have been mass-mailed to specific email addresses. Theemail arrives with the following: Subject: Latest News about Arafat!!! Message body: Hello guys!Latest news about Arafat!Unimaginable!!!!! The email also contains two .EMF file attachments: ARAFAT_1.EMF is a.JPG file showing the burial of Palestinian leader Yasser Arafat, andARAFAT_2.EMF contains exploit code that uses the Microsoft Windows XPMetafile Heap Overflow vulnerability. When opened, the file drops this worminto a system. For more information on this vulnerability please visit: http://www.trendmicro.com/vinfo/virusencyc...XPLOIT-MS04-032If you would like to scan your computer for WORM_GOLTEN.A or thousandsof other worms, viruses, Trojans and malicious code, visit HouseCall, Trend Micro's free, online virus scanner at: http://housecall.trendmicro.com/WORM_GOLTEN.A is detected and cleaned by Trend Micro pattern file#2.247.03 and above. For additional information about WORM_GOLTEN.A please visit: http://www.trendmicro.com/vinfo/virusencyc...e=WORM_GOLTEN.A3. Top 10 Most Prevalent Global Malware (from November 12, 2004 to November 18, 2004)------------------------------------------------------------------------1. WORM_NETSKY.P2. HTML_NETSKY.P3. WORM_NETSKY.D4. WORM_NETSKY.B5. WORM_SOBER.G6. JAVA_BYTEVER.A7. WORM_BAGLE.AT8. WORM_NETSKY.C9. WORM_NETSKY.Q10. WORM_SOBER.F4. Trend Micro URL Filtering Module - Important Product Update NowAvailable------------------------------------------------------------------------ Trend Micro URL Filtering, an optional module integrated with Trend MicroInterScan Web Security Suite, enables companies to manage employee Internetuse by restricting access to unwanted Web sites. If you have installed InterScan Web Security Suite with URL Filteringmodule, an important product update is now available:For Windows: InterScan Web Security Suite Patch for Windows v2.0 For Linux: InterScan Web Security Suite Patch for Linux v2.0 For Solaris: InterScan Web Security Suite Patch for Solaris v2.0 PLEASE NOTE: This is a mandatory patch as all unpatched systems will beunable to receive URL Filtering updates after January, 2005.You may obtain the patch by visiting: http://www.trendmicro.com/download/product.asp?productid=34If you have questions or need assistance, please contact Trend MicroTechnical Support in your area: http://kb.trendmicro.com/solutions/include...TechSupport.asp5. Trend Micro Announces Network VirusWall 2500------------------------------------------------------------------------ Trend Micro recently launched the Network VirusWall 2500 outbreakprevention appliance intended to protect multiple network segments and servers fromnetwork worms. Network VirusWall 2500 stops network worms and vulnerability exploits withcomplete accuracy. It prevents infection by enforcing security policiesby blocking noncompliant devices from network access, and it isolatesinfected network segments and automates remote clean up in case of outbreak. To learn more about the Network VirusWall 2500 please visit: http://www.trendmicro.com/en/products/netw...te/overview.htm ***********************************************************************************______________________________________________________________________This message was sent by Trend Micro's Newsletters Editor using ResponsysInteract .To unsubscribe from Trend Micro's Newsletters Editor: http://trendnewsletter.rsc03.net/servlet/o...RFpgLmDgLmDgSE0To update your subscription preference, or to change your email address:http://trendnewsletter.rsc03.net/servlet/w...kNlyLihkm_UU_UCTo view our permission marketing policy: http://www.rsvp0.netCopyright 1989-2004 Trend Micro, Inc. All rights reservedTrend Micro, Inc., 10101 N. De Anza Blvd., Suite 200, Cupertino, CA95014 Quote Link to post Share on other sites
tg1911 Posted November 20, 2004 Report Share Posted November 20, 2004 Thanks for the info, Marty. Quote Link to post Share on other sites
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.