Вы уже знаете, что весь компьютерный мир поразил этот злобный вирус. Я его получил от Сироткиндта, тут же его уничтожил Касперским и предупредил Сироткиндта, поставил себе новый Нортон Анти-вирус. У меня все чисто. Вирус этот самостоятельно отправляет сообщения по произвольным адресам. Так, мне несколько раз приходили сообщения якобы от Хвости, Розова еще каких-то битломанов, но начинка была подозрительная, поэтому не открывал. Такие подозрительные сообщения необходимо удалять нещадно не открывая их. Подозреваю, что и вам могут приходить вирусные сообщения от якобы меня zuir@mail.ru. Если вы точно не ждете сообщений, лучше их удалять. Только что я получил сообщение со знакомым обратным адресом harriontour, кажется, это Ая. Написано, что это некая противовирусная программа, но я побоялся открывать, сразу удалил, очень уж подозрительным показалась эта программа (написано было на английском!). Будьте бдительны, берегите свои компы! Подробнее здесь (к сожалению на английском)
When this worm is executed, it does the following:
It copies itself to the file %windir%\Taskbar.exe
NOTE: %windir% is a variable. The worm locates the Windows main installation folder (by default this is C:\Windows or C:\Winnt) and copies itself to that location.
It then configures itself to start when you start Windows by adding the value:
Task Bar %windir%\taskbar.exe
to the registry key:
HKEY CURRENT USER\Software\Microsoft\Windows\CurrentVersion\Run
Next, the worm obtains the computer user's SMTP server, email address, and SMTP user name from the following registry entries:
HKEY CURRENT USER\Software\Microsoft\
Internet Account Manager\Accounts\00000001\SMTP Server
HKEY CURRENT USER\Software\Microsoft\
Internet Account Manager\Accounts\00000001\SMTP Email Address
HKEY CURRENT USER\Software\Microsoft\
Internet Account Manager\Accounts\00000001\SMTP Display Name
The worm then obtains email addresses from the Microsoft Windows Address Book and from .dbx, .wab, .mbx, .eml, and .mdb files, and sends itself to those addresses. The email message has the following characteristics:
Subject: Re: Your password!
Message:
ATTENTION!
You can access
very important
information by
this password
DO NOT SAVE
password to disk
use your mind
now press
cancel
Attachments:
Decrypt-password.exe
Password.txt
NOTE: The Decrypt-password.exe attachment is a copy of the worm. It is packed with UPX and PE-Pack, and its size is approximately 48 KB. The second attachment, Password.txt, is a text file that is approximately 93 bytes in length. Password.txt is not viral by itself as such, it is not detected by Symantec antivirus products. However, if the computer was infected by W32.Frethem.M@mm worm, you should delete the file manually.
When the worm arrives by email, it uses both an IFRAME exploit and a MIME exploit, which allow the virus to be executed when you read or even preview the file. Information and a patch for MIME exploit can be found at
http://www.microsoft.com/technet/security/bulletin/MS01-020.asp .
The worm creates the "IEXPLORE MUTEX AABBCCDDEEFF" mutex. This mutex allows only one instance of the worm to execute in memory.
After sleeping for several hours, the worm copies itself to C:\Windows\All Users\Start Menu\Programs\Startup\Setup.exe so that it is executed each time that you start Windows.
Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":
Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.
If a blended threat exploits one or more network services, disable, or block access to, those services until a patch is applied.
Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services.
Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
Configure your email server to block or remove email that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files.
Isolate infected computers quickly to prevent further compromising your organization. Perform a forensic analysis and restore the computers using trusted media.
Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.
NOTE: These instructions are for all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
1. Update the virus definitions, run a full system scan. Delete all files that are detected as W32.Frethem.M@mm.
2. Delete the value
Task Bar
from the registry key
HKEY CURRENT USER\Software\Microsoft\Windows\CurrentVersion\Run