O LOVGATE.J parece que é pior
Nome do Virus -- Risco -- Data
PE_LOVGATE.J -- Medium -- May 13
PE_LOVGATE.K -- Low -- May 13
PE_LOVGATE.I -- Low -- May 13
WORM_FIZZER.A -- Medium -- May 11
WORM_CYDOG.C -- Low -- May 8
WORM_XMS.A -- Low -- May 1
WORM_LOVELORN.A -- Low -- Apr 28
WORM_PUROL.A -- Low -- Apr 25
WORM_AGOBOT.F -- Low -- Apr 25
WORM_CORONEX.A -- Low -- Apr 24
WORM_HORSMAN.A -- Low -- Apr 15
WORM_CULT.C -- Low -- Apr 9
WORM_AGOBOT.E -- Low -- Apr 7
VBS_LISA.A -- Low -- Apr 1
WORM_OROR.AI -- Low -- Mar 28
WORM_LOVGATE.G -- Low -- Mar 25
WORM_BIBROG.E -- Low -- Mar 24
WORM_LOVGATE.F -- Low -- Mar 23
WORM_CULT.A -- Low -- Mar 23
WORM_HOLAR.E -- Low -- Mar 21
____________________________________
WORM_LOVGATE.J
This malware is currently spreading rapidly in Korea, from where TrendLabs has received a significant number of infection reports. As of Tuesday, May 13, 12:46 AM (US Pacific Time), Trend Micro has declared a Medium Risk Alert to control the spread of this malware.
This file-infecting virus propagates via shared network drives and via email.
To spreads through network shares, it searches for shared folders with read/write access in the same network and drops copies of itself into these folders using the following file names:
100 free essays school.pif
Age of empires 2 crack.exe
AN-YOU-SUCK-IT.txt.pif
Are you looking for Love.doc.exe
autoexec.bat
CloneCD + crack.exe
How To Hack Websites.exe
Mafia Trainer!!!.exe
MoviezChannelsInstaler.exe
MSN Password Hacker and Stealer.exe
Panda Titanium Crack.zip.exe
Sex_For_You_Life.JPG.pif
SIMS FullDownloader.zip.exe
Star Wars II Movie Full Downloader.exe
The world of lovers.txt.exe
Winrar + crack.exe
This malware propagates via email by replying to all new messages received in Microsoft Outlook and Outlook Express. It sends out email with the following format:
From: <Infected User’s Name>
To: <Original Sender>
Subject: RE: <Original Subject>
Message Body:
'''<Infected User’s Name>' wrote:
====
><Original Body> >
====
YAHOO.COM Mail auto-reply:
If you can keep your head when all about you
Are losing theirs and blaming it on you;
If you can trust yourself when all men doubt you,
But make allowance for their doubting too;
If you can wait and not be tired by waiting,
Or, being lied about,don't deal in lies,
Or, being hated, don't give way to hating,
And yet don't look too good, nor talk too wise;
... ... more look to the attachment.
> Get your FREE <Original Sender’s SMTP account> account now! <
Attachment: (Randomly selected from any of the following:)
I am For u.doc.exe"
Britney spears nude.exe.txt.exe
joke.pif
DSL Modem Uncapper.rar.exe
Industry Giant II.exe
StarWars2 - CloneAttack.rm.scr
dreamweaver MX (crack).exe
Shakira.zip.exe
SETUP.EXE
Macromedia Flash.scr
How to Crack all gamez.exe
Me_nude.AVI.pif
s3msong.MP3.pif
Deutsch BloodPatch!.exe
Sex in Office.rm.scr
the hardcore game-.pif
An example of this email would be:
This malware also gathers target email addresses from HTML files that it finds in the current and Windows folders and a specific registry key, and sends an email message with itself as attachment to all the said email addresses. The email message it sends selects randomly from any of the following subjects, message bodies and attachments:
Subject:
Reply to this!
Let's Laugh
Last Update
for you
Great
Help
Attached one Gift for u..
Hi
Hi Dear
See the attachement
Message Body:
For further assistance, please contact!
Copy of your message, including all the headers is attached.
This is the last cumulative update.
Tiger Woods had two eagles Friday during his victory over
Stephen Leaney. (AP Photo/Denis Poroy)
Send reply if you want to be official beta tester.
This message was created automatically by mail delivery
software (Exim).
It's the long-awaited film version of the Broadway hit.
Set in the roaring 20's, this is the story of Chicago
chorus girl Roxie Hart(Zellweger), who shoots her unfaithful
lover (West).
Adult content!!! Use with parental advisory.
Patrick Ewing will give Knick fans something to cheer
about Friday night.
Send me your comments...
Attachment:
About_Me.txt.pif
driver.exe
Doom3 Preview!!!.exe
enjoy.exe
YOU_are_FAT!.TXT.pif
Source.exe
Interesting.exe
README.TXT.pif
images.pif
Pics.ZIP.scr
This malware runs on Windows NT, 2000, and XP systems.
Solution:
AUTOMATIC REMOVAL INSTRUCTIONS
To automatically remove this malware from your system, please use the Trend Micro System Cleaner.
MANUAL REMOVAL INSTRUCTIONS
Identifying the Malware Program
Before proceeding to remove this malware, first identify the malware program.
Scan your system with Trend Micro antivirus and NOTE all files detected as PE_LOVGATE.J. To do this, Trend Micro customers must download the latest pattern file and scan their system. Other Internet users can use HouseCall, Trend Micro's free online virus scanner.
Terminating the Malware Program
This procedure terminates the running malware process from memory. You will need the name(s) of the file(s) detected earlier.
Open Windows Task Manager. Press
CTRL+SHIFT+ESC, and click the Processes tab.
In the list of running programs, locate the malware file or files detected earlier.
Select one of the detected files, then press either the End Task or the End Process button, depending on the version of Windows on your system.
Do the same for all detected malware files in the list of running processes.
To check if the malware process has been terminated, close Task Manager, and then open it again.
Close Task Manager.
NOTE: Terminating an instance of this malware also launches an instance of IEXPLORE.EXE. Terminate all other malware instances first before terminating IEXPLORE.EXE.
Addressing Registry Shell Spawning
Registry shell spawning executes the malware when a user tries to open an .TXT file. The following procedures should restore the registry to its original settings.
Open Registry Editor. To do this, click Start>Run, type REGEDIT, then press Enter.
In the left panel, double-click the following:
HKEY_CLASSES_ROOT>txtfile>shell>open>command
In the right panel, locate the registry entry:
Default
Check whether its value is the path and file name of the malware file:
"winrpc.exe %1"
If the value is the malware file, right-click Default and select Modify to change its value.
In the Value data input box, delete the existing value and type the default value:
%System%\NOTEPAD.EXE %1
(NOTE: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 9x and ME, C:\WINNT\System32 on Windows NT and 2000, or C:\Windows\System32 on Windows XP.)
Close Registry Editor.
Press Enter.
Removing Autostart Entries from the Registry
Removing autostart entries from the registry prevents the malware from executing during startup.
Open Registry Editor. To do this, click Start>Run, type REGEDIT, then press Enter.
In the left panel, double-click the following:
HKEY_LOCAL_MACHINE>Software>Microsoft>
Windows>CurrentVersion>Run
In the right panel, locate and delete the entries:
WinHelp = "C:\WINNT\System32\WinHelp.exe"
WinGate initialize = “C:\WINNT\System32\WinGate.exe –remoteshell”
Remote Procedure Call Locator = "RUNDLL32.EXE reg678.dll ondll_reg"
Program In Windows = "C:\WINNT\System32\IEXPLORE.EXE"
In the left panel, double-click the following:
HKEY_CURRENT_USER>Software>Microsoft>WindowsNT>
CurentVersion>Windows
In the right panel, locate and delete the entry:
Run = ”RAVMOND.EXE”
Close Registry Editor.
Disabling Malware Service
Restart your machine to terminate the malware service.
Open Registry Editor.
To do this, click Start>Run, type REGEDIT, then press Enter
In the left panel, double-click the following:
HKEY_LOCAL_MACHINE>SYSTEM>CurrentControlSetServices>
Microsoft NetWork FireWall Services
Still in the left panel, delete the subkey:
Microsoft NetWork FireWall Services
Close Registry Editor.
_____________________________
Ficou um bocado grande
desculpem a seca
Cump
Patdav