[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
VIRUS WARNING!!!! VIRUS WARNING!!! Re: C:\CoolProgs\Pretty Park.exe
- To: Aus loco discussion mailing list <Ausloco@listbot.com>
- Subject: VIRUS WARNING!!!! VIRUS WARNING!!! Re: C:\CoolProgs\Pretty Park.exe
- From: David Johnson <trainman@ozemail.com.au>
- Date: Mon, 06 Dec 1999 23:44:49 +1100
- CC: mailbox@hedgehog.highway1.com.au
- Delivered-To: mailing list Ausloco@listbot.com
- Mailing-List: ListBot mailing list contact Ausloco-help@listbot.com
- References: <199912060250.KAA27838@hedgehog.highway1.com.au>
- Reply-To: "Aus loco discussion mailing list" <Ausloco@listbot.com>
Aus loco discussion mailing list
do not open Pretty Park.exe!!!!! It is a trojan virus. The following information is
an extract from http://www.Europe.Datafellows.com/v-descs/prettyp.htm
F-Secure Virus Information Pages
NAME:
PrettyPark
ALIAS:
PSW, CHV, Pretty Park
The 'PrettyPark' also known as 'Trojan.PSW.CHV' is an Internet
worm, a password
stealing trojan and a backdoor at the same time. It was reported
to be widespread in
Central Europe in June 1999.
PrettyPark spreads itself via Internet by attaching its body to
e-mails as 'Pretty
Park.Exe' file. Being executed it installs itself to system and
then sends e-mail
messages with its copy attached to addresses listed in Address
Book and also informs
someone (most likely worm author) on specific IRC servers about
infected system
settings and passwords. It also can be used as a backdoor (remote
access tool).
When the worm is executed in the system for the first time, it
looks for its copy already
active in memory. The worm does this by looking for application
that has "#32770"
window caption. If there is no such window, the worm registers
itself as a hidden
application (not visible in the task list) and runs its
installation routine.
While installing to system the worm copies itself to
\Windows\System\ directory as
FILES32.VXD file and then modifies the Registry to be run each
time any EXE file starts
when Windows is active. The worm does this by creating a new key
in the
HKEY_CLASSES_ROOT. The key name is exefile\shell\open\command and
it is
associated with the worm file (FILES32.VXD file that was created
in the Windows
system folder). If the FILES32.VXD file is deleted and Registry is
not corrected no EXE
file will ever be started in Windows further on.
In case of error during installing the worm activates the
SSPIPES.SCR screen saver (3D
Pipes). If this file is missing, the worm tries to activate
'Canalisation3D.SCR' screen
saver.
Then the worm opens Internet connection and activates 2 its
routines. Further on
theseinits socket (Internet) connection and runs its routines that
are activated regularly:
the first one once per 30 seconds, another one - once per 30
minutes.
The first routine that activates once in 30 seconds tries to
connect to one of IRC chat
servers (see the list below) and to send a messages to someone if
he is present on any
channel of this chat server. This allows worm author to monitor
infected computers.
The list of IRC servers the worm tries to connect to:
irc.twiny.net
irc.stealth.net
irc.grolier.net
irc.club-internet.fr
ircnet.irc.aol.com
irc.emn.fr
irc.anet.com
irc.insat.com
irc.ncal.verio.net
irc.cifnet.com
irc.skybel.net
irc.eurecom.fr
irc.easynet.co.uk
The worm may be also used as a backdoor (remote access tool) by
its author. It can
send out system configuration details, drives list, directories
info as well as confidential
information: Internet access passwords and telephone numbers,
Remote Access
Service login names and passwords, ICQ numbers, etc. The backdoor
is also able to
create/remove directories, send/receive files, delete and execute
them, etc.
The second routine, which is activated once per 30 minutes, opens
Address Book file,
reads e-mail addresses from there, and sends messages to these
addresses. The
message Subject field contains the text:
C:\CoolProgs\Pretty Park.exe
The message has an attached copy of the worm as Pretty Park.EXE
file. If someone
receives this message and runs the attached file his system
becomes infected.
[Analysis: AVP, Data Fellows and DataRescue teams]
Anne Chapple wrote:
> Aus loco discussion mailing list
>
> Test: Pretty Park.exe :)
>
> Anne Chapple
>
> ______________________________________________________________________
> To unsubscribe, write to Ausloco-unsubscribe@listbot.com
> Start Your Own FREE Email List at http://www.listbot.com/links/joinlb
>
> --------------------------------------------------------------------------------
> Name: Pretty Park.exe
> Pretty Park.exe Type: unspecified type (application/octet-stream)
> Encoding: base64
--
David Johnson
trainman@ozemail.com.au
http://www.ozemail.com.au/~trainman/
______________________________________________________________________
To unsubscribe, write to Ausloco-unsubscribe@listbot.com
______________________________________________________________________
Today might be your lucky day! Win monthly prizes from leading online retailers in sporting goods, computers, entertainment, gourmet foods and many more! It's the easy way to win on the web! Enter today at:
http://www.listbot.com/links/winfreestuff