Quote from Panda's site follows 02/09/2004. - It seems to have been created by the same author as the Mydoom family
"- It is designed to spread like a network worm, which makes it extremely dangerous, as it cannot be detected or viewed by the user via e-mail, like other viruses can
While the infections caused by Mydoom.A are just starting to cool off, a new worm has appeared that exploits the damage caused by this worm: Doomjuice.A. Evidence suggests that the Mydoom attack is not going to end on February 12, the date on which it seemed that the worm would stop spreading. It is supposed that the same author has launched this new malicious code that cannot even be detected in e-mail, as it exploits the ports opened by Mydoom.A and Mydoom.B. This new virus behaves in a similar way to SQLSlammer, i.e., it is a network worm that exploits an open port in the same way as SQLSlammer exploited a server vulnerability.
The actions carried out by Doomjuice.A on the computers it infects include the following:
- In order to ensure that it is run, it creates the following entry in the Windows Registry:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "Gremlin" intrenat.exe
- It generates a copy of itself in %system% called intrenat.exe (36,864 bytes).
- It creates a file called sync-src-1.00.tbz (28,569) in %Windows%, in %Temp%, in %System% and in the C: drive. This file is compressed and contains the source code of Mydoom.A.
- It launches a Denial of Service (DoS) attack against www.microsoft.com.
Evidence suggests that Doomjuice.A was created by the same author as Mydoom.A. Panda Software?s experts are currently studying this malicious code. As PandaLabs gathers more information, it will be published on the company?s website (www.pandasoftware.com/).
Due to the appearance of Doomjuice.A, Panda Software advises users to take extra precautions, and to update their antivirus solutions immediately. The company has already made the updates to its products available to its clients to ensure their solutions can detect and eliminate Doomjuice.A. Those whose software is not configured to update automatically, should update their solutions from www.pandasoftware.com/. Users can also detect this and other malicious code using the free, online antivirus, Panda ActiveScan, which is available on the company?s website at www.pandasoftware.com." P.S. There is an I.E. security update available today, but knowing Microsoft's usual relaxed attitude I doubt that it fixes this particular vulnerability
Roger.
|