Jump to content

Darker.A . Malicious code


andsome
 Share

Recommended Posts

- Weekly virus report -

Oxygen3 24h-365d, by Panda Software (http://www.pandasoftware.com)

Madrid, November 9, 2003 - This week's report on malicious code will focus

on a worm called Darker.A and four variants of Mimail.

Darker.A reaches computers in an e-mail message that includes an attached

file and tries to trick the user into thinking that the attachment is a

useful computer application. When this file is run, the worm sends itself

out to the contacts it finds on the affected computer (in programs like

Outlook or MSN Messenger or in files with certain extensions -WAB, HTM,

HTML, TXT, etc.-). This malicious code also tries to spread through the

following P2P (peer to peer) file sharing programs: KaZaA, Morpheus and

Grokster.

Darker.A replicates by creating copies of itself without infecting other

files. It also connects to an IRC server in order to allow hackers to gain

remote access to the compromised computer and carry out different actions.

These actions include: downloading, running and deleting files, obtaining

information on the system, closing antivirus applications and running ICMP

commands.

The E, F, G and H variants of Mimail spread in an e-mail message with the

subject 'don't be late!' and an attached file called READNOW.ZIP. When this

file is decompressed, it creates a file with a double extension called

READNOW.DOC.SCR.

These variants of Mimail are designed to send themselves out via e-mail

using their own SMTP engine. Similarly, they try to launch Denial of Service

(DoS) attacks on several websites and go memory resident in the computer.

The differences between these variants include the following:

- The servers they launch Denial of Service attacks on: Variants E and F

target spews.org, spamhaus.org and spamcop.net, whereas variant F attacks

fethard.biz and fethard-finance.com, and the objective of variant G is

mysupersales.com.

- All four variant are written in the C programming language with the LCC

Win32 compiler. They are 10,784 bytes in size when compressed with UPX and

when they are decompressed, the size of variants E, F and H increases to

23,072 bytes, whereas the size of variant G increases to 22,560 bytes.

Unlike Mimail and Mimail.B, variants E, F, G and H do not exploit the

Codebase and MHTML vulnerabilities to spread.

For further information about these and other malicious code, visit Panda

Software's Virus Encyclopedia at:

http://www.pandasoftware.com/virus_info/encyclopedia

NOTE: The address above may not show up on your screen as a single line.

This would prevent you from using the link to access the web page. If this

happens, just use the 'cut' and 'paste' options to join the pieces of the

URL.

------------------------------------------------------------

To unsubscribe from Oxygen3 24h-365d, please visit:

http://www.pandasoftware.com/unsubscribe.asp

To contact with Panda Software, please visit:

http://www.pandasoftware.com/about/contact/

------------------------------------------------------------

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue. Privacy Policy