Your IP

You Are Visitor

web site traffic stats page

Thursday, May 10, 2007

1).... suffering from FOLDER.HTT AND DESKTOP.INI (Redloaf virus)

Suffering from FOLDER.HTT and DESKTOP.INI here is the solutin and techincal details

Virus Name :- A. VBS/Redlof@M [McAfee],
B. VBS.Redlof [AVP],
C. VBS_REDLOF.A [Trend],
D. VBS/Redlof-A

Type :- Virus



Infection Length: varies


Systems Affected :- Windows95 , windows 98, windows 2000 . windows NT , windows Xp,
Windows Me


When VBS.Redlof.A runs, it does the following:

It decrypts its viral body and then executes it.

Depending on the location of the Windows System folder, the virus copies itself as one of the following:
%Windir%\System\Kernel.dll
%Windir%\System\Kernel32.dll


NOTE:- %Windir% is a variable. The worm locates the primary Windows installation folder
(by default, this is C:\Windows or C:\Winnt) and copies itself to that location.


The virus makes the following changes to the registry to allow for the execution of
the .dll files as script files:

1) Verifies that the (Default) value of the registry key:

HKEY_CLASSES_ROOT\.dll

is equal to:

dllfile

2) For the registry key:

HKEY_CLASSES_ROOT\.dll

the virus verifies that the value:

Content Typeis equal to:

application/x-msdownload

3) In the registry key:
HKEY_CLASSES_ROOT\dllFile
the virus changes these subkeys:
* DefaultIcon

is changed to the same value as the value of the DefaultIcon subkey that is
underthe registry key:
HKEY_CLASSES_ROOT\vxdfile
* It adds the subkey ScriptEngineand

changes its value to:
VBScript
* It adds the subkey ScriptHostEncodeand

changes its value to:
{85131631-480C-11D2-B1F9-00C04F86C324}



4) In the registry key:

HKEY_CLASSES_ROOT\dllFile\Shell\Open\Command\
the virus adds a (Default) value of:
"%windir%\WScript.exe ""%1"" %*"
or:
"%windir%\System32\WScript.exe ""%1"" %*"


5) In the registry key:
HKEY_CLASSES_ROOT\dllFile\ShellEx\PropertySheetHandlers\WSHProps

the virus sets the (Default) value to:

{60254CA5-953B-11CF-8C96-00AA00B8708C}


6) Copies itself as %Windir%\web\kwjall.gif.

The virus searches for the files that have the file extensions .html, .htm, .asp, .php, .jsp, .htt and .vbs in all the folders and on all the drives, and then infects those files.

VBS.Redlof.A spreads by adding itself as the default stationery that is used to create email messages. The virus:


1) Either copies itself to

C:\Program Files\Common Files\Microsoft Shared\Stationery\Blank.htm or, if that file
already exists, it appends itself to the file.

2) Sets Outlook Express to use stationery by default. To do this, in the registry key:

HKEY_CURRENT_USER\Identities\[Default Use ID]\Software\Microsoft\Outlook
Express\[Outlook Version].0\Mail

the virus sets the value of :
Compose Use Stationery to 1


3) Then, if the following values do not exist, they are created with the following value In
data:

*the registry key:
HKEY_CURRENT_USER\Identities\[Default Use ID]\Software\Microsoft\Outlook
Express\[Outlook Version].0\Mail

the virus changes the value data of:
Stationery Name to

C:\Program Files\Common Files\Microsoft Shared\Stationery\blank.htm

4) * In the registry key:

HKEY_CURRENT_USER\Software\Microsoft\Office\9.0\Outlook\Options\Mail

the virus sets the value data of:

EditorPreference to

131072


5) Next, if the following values do not exist, they are created and set to "blank":

The value: 001e0360

in the registry key:
HKEY_CURRENT_USER\Software\Microsoft\Windows Messaging
Subsystem\Profiles\Microsoft Outlook Internet
Settings\0a0d020000000000c000000000000046

The value: 001e0360

in the registry key:

HKEY_CURRENT_USER\Software\Microsoft\Windows

NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook

Internet Settings\0a0d020000000000c000000000000046

The value: NewStationery

in the registry key:

HKEY_CURRENT_USER\Software\Microsoft\Office\10.0

\Common\MailSettings

6) In the registry key:

HKEY_CURRENT_USER\Software\Microsoft\Office\10.0

\Outlook\Options\Mail\EditorPreference

the virus sets the value in:

EditorPreference to 131072

7) Finally, in the registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

the virus adds the value: Kernel32 and set its to

SYSTEM\Kernel32.dll or SYSTEM\Kernel.dll

Recommendations

Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":

* Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.

* If a blended threat exploits one or more network services, disable, or block access to, those services until a patch is applied.

* Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services (for example, all Windows-based computers should have the current Service Pack installed.). Additionally, please apply any security updates that are mentioned in this writeup, in trusted Security Bulletins, or on vendor Web sites.

* Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.

* Configure your email server to block or remove email that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files.

* Isolate infected computers quickly to prevent further compromising your organization. Perform a forensic analysis and restore the computers using trusted media

* Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.

REMOVAL

Reversing the changes that the virus made to the registry

CAUTION:

Symantec strongly recommends that you back up the registry before you make any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify only the keys that are specified. Read the document, "How to make a backup of the Windows registry," for instructions.

1) Click Start, and then click Run. (The Run dialog box appears.)

2) Type regedit and then click OK. (The Registry Editor opens.)

3) Navigate to the key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

4) In the right pane, delete the value: Kernel32

5) Navigate to the key:

HKEY_CURRENT_USER\Identities\[Default Use ID]\Software\Microsoft\Outlook

Express\[Outlook Version].0\Mail

6) In the right pane, delete the values:

Compose Use Stationery

Stationery Name

Wide Stationery Name

7) Navigate to the key:

HKEY_CURRENT_USER\Software\Microsoft\Office\9.0\Outlook\Options\Mail

8) In the right pane, delete the value:

EditorPreference

9) Navigate to and delete these subkeys:

HKEY_CLASSES_ROOT\dllFile\Shell

HKEY_CLASSES_ROOT\dllFile\ShellEx

HKEY_CLASSES_ROOT\dllFile\ScriptEngine

HKEY_CLASSES_ROOT\dllFile\ScriptHostEncode

10) Exit the Registry Editor.




3 comments:

Anonymous said...

LOL.... but good

Anonymous said...

working... after all

Anonymous said...

good