[ mstarc17 @ 25.03.2004. 14:00 ] @
Kako ga se rjesiti? |
[ mstarc17 @ 25.03.2004. 14:00 ] @
[ Sundance @ 12.12.2004. 12:44 ] @
This detection is for a downloading trojan known to have been spammed to many users on several occasions. The latest of which occured on May 23, 2004 in a message as follows:
-- From: cosmo [[email protected]] Subject: International Virtual Greetings Center Body: Congratulations! You've recieved a postcard from your mom! "I Sent the Sun" Picture attached. ======== International Virtual Greetings Center www.freegreetings.com Attachment: Picture.zip (containing report.pif) -- May 16, 2004 spamming From: sales [[email protected]] Subject: Re: Payment approved (invoce #5997) Body: Dear customer! Thank you for shopping with us! Sales department approved your payment, you will be billed within 2 days. Shipping UPS ground insured. See the attached file for details. (report # 5986) Attachment: REPORT.ZIP (Zip file containing REPORT.EXE) Other mass mailings include the following message: From: support ([email protected]) this may change Subject: Re: item purchase Body: Thank you for shopping with us! See the attached file for details. Best Regards! Attachment: DETAILS.ZIP (Zip file containing DETAILS.EXE) The trojan exists only to download and execute a remote file (path to which is stored in the trojan). Access to the following domains should be blocked at the firewall to prevent the file download: http://marnet.us http://animalloversleague.org http://technalytics.net When run, it attempts to download this file via HTTP, saving it to the Windows system directory as TEMPFILE.EXE or TMPFILE.EXE %SysDir%\TEMPFILE.EXE %SysDir%\TMPFILE.EXE This file is then executed. Obviously the exact contents of this file may change. At the time of writing it is a remote access trojan, detection for which is included in Daily Dats as BackDoor-BAC . Copyright (C) 2001-2025 by www.elitesecurity.org. All rights reserved.
|