Suffering from FOLDER.HTT and DESKTOP.INI here is the solutin and techincal details
Virus Name :- A. VBS/Redlof@M [McAfee],
B. VBS.Redlof [AVP],
C. VBS_REDLOF.A [Trend],
D. VBS/Redlof-A
Type :- Virus
Infection Length: varies
Systems Affected :- Windows95 , windows 98, windows 2000 . windows NT , windows Xp,
Windows Me
When VBS.Redlof.A runs, it does the following:
It decrypts its viral body and then executes it.
Depending on the location of the Windows System folder, the virus copies itself as one of the following:
%Windir%\System\Kernel.dll
%Windir%\System\Kernel32.dll
NOTE:- %Windir% is a variable. The worm locates the primary Windows installation folder
(by default, this is C:\Windows or C:\Winnt) and copies itself to that location.
The virus makes the following changes to the registry to allow for the execution of
the .dll files as script files:
1) Verifies that the (Default) value of the registry key:
HKEY_CLASSES_ROOT\.dll
is equal to:
dllfile
2) For the registry key:
HKEY_CLASSES_ROOT\.dll
the virus verifies that the value:
Content Typeis equal to:
application/x-msdownload
3) In the registry key:
HKEY_CLASSES_ROOT\dllFile
the virus changes these subkeys:
* DefaultIcon
is changed to the same value as the value of the DefaultIcon subkey that is
underthe registry key:
HKEY_CLASSES_ROOT\vxdfile
* It adds the subkey ScriptEngineand
changes its value to:
VBScript
* It adds the subkey ScriptHostEncodeand
changes its value to:
{85131631-480C-11D2-B1F9-00C04F86C324}
4) In the registry key:
HKEY_CLASSES_ROOT\dllFile\Shell\Open\Command\
the virus adds a (Default) value of:
"%windir%\WScript.exe ""%1"" %*"
or:
"%windir%\System32\WScript.exe ""%1"" %*"
5) In the registry key:
HKEY_CLASSES_ROOT\dllFile\ShellEx\PropertySheetHandlers\WSHProps
the virus sets the (Default) value to:
{60254CA5-953B-11CF-8C96-00AA00B8708C}
6) Copies itself as %Windir%\web\kwjall.gif.
The virus searches for the files that have the file extensions .html, .htm, .asp, .php, .jsp, .htt and .vbs in all the folders and on all the drives, and then infects those files.
VBS.Redlof.A spreads by adding itself as the default stationery that is used to create email messages. The virus:
1) Either copies itself to
C:\Program Files\Common Files\Microsoft Shared\Stationery\Blank.htm or, if that file
already exists, it appends itself to the file.
2) Sets Outlook Express to use stationery by default. To do this, in the registry key:
HKEY_CURRENT_USER\Identities\[Default Use ID]\Software\Microsoft\Outlook
Express\[Outlook Version].0\Mail
the virus sets the value of :
Compose Use Stationery to 1
3) Then, if the following values do not exist, they are created with the following value In
data:
*the registry key:
HKEY_CURRENT_USER\Identities\[Default Use ID]\Software\Microsoft\Outlook
Express\[Outlook Version].0\Mail
the virus changes the value data of:
Stationery Name to
C:\Program Files\Common Files\Microsoft Shared\Stationery\blank.htm
4) * In the registry key:
HKEY_CURRENT_USER\Software\Microsoft\Office\9.0\Outlook\Options\Mail
the virus sets the value data of:
EditorPreference to
131072
5) Next, if the following values do not exist, they are created and set to "blank":
The value: 001e0360
in the registry key:
HKEY_CURRENT_USER\Software\Microsoft\Windows Messaging
Subsystem\Profiles\Microsoft Outlook Internet
Settings\0a0d020000000000c000000000000046
The value: 001e0360
in the registry key:
HKEY_CURRENT_USER\Software\Microsoft\Windows
NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook
Internet Settings\0a0d020000000000c000000000000046
The value: NewStationery
in the registry key:
HKEY_CURRENT_USER\Software\Microsoft\Office\10.0
\Common\MailSettings
6) In the registry key:
HKEY_CURRENT_USER\Software\Microsoft\Office\10.0
\Outlook\Options\Mail\EditorPreference
the virus sets the value in:
EditorPreference to 131072
7) Finally, in the registry key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
the virus adds the value: Kernel32 and set its to
SYSTEM\Kernel32.dll or SYSTEM\Kernel.dll
Recommendations
Symantec Security Response encourages all users and administrators to adhere to the following basic security "best practices":
* Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP server, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.
* If a blended threat exploits one or more network services, disable, or block access to, those services until a patch is applied.
* Always keep your patch levels up-to-date, especially on computers that host public services and are accessible through the firewall, such as HTTP, FTP, mail, and DNS services (for example, all Windows-based computers should have the current Service Pack installed.). Additionally, please apply any security updates that are mentioned in this writeup, in trusted Security Bulletins, or on vendor Web sites.
* Enforce a password policy. Complex passwords make it difficult to crack password files on compromised computers. This helps to prevent or limit damage when a computer is compromised.
* Configure your email server to block or remove email that contains file attachments that are commonly used to spread viruses, such as .vbs, .bat, .exe, .pif and .scr files.
* Isolate infected computers quickly to prevent further compromising your organization. Perform a forensic analysis and restore the computers using trusted media
* Train employees not to open attachments unless they are expecting them. Also, do not execute software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched.
REMOVAL
Reversing the changes that the virus made to the registry
CAUTION:
Symantec strongly recommends that you back up the registry before you make any changes to it. Incorrect changes to the registry can result in permanent data loss or corrupted files. Modify only the keys that are specified. Read the document, "How to make a backup of the Windows registry," for instructions.
1) Click Start, and then click Run. (The Run dialog box appears.)
2) Type regedit and then click OK. (The Registry Editor opens.)
3) Navigate to the key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
4) In the right pane, delete the value: Kernel32
5) Navigate to the key:
HKEY_CURRENT_USER\Identities\[Default Use ID]\Software\Microsoft\Outlook
Express\[Outlook Version].0\Mail
6) In the right pane, delete the values:
Compose Use Stationery
Stationery Name
Wide Stationery Name
7) Navigate to the key:
HKEY_CURRENT_USER\Software\Microsoft\Office\9.0\Outlook\Options\Mail
8) In the right pane, delete the value:
EditorPreference
9) Navigate to and delete these subkeys:
HKEY_CLASSES_ROOT\dllFile\Shell
HKEY_CLASSES_ROOT\dllFile\ShellEx
HKEY_CLASSES_ROOT\dllFile\ScriptEngine
HKEY_CLASSES_ROOT\dllFile\ScriptHostEncode
10) Exit the Registry Editor.
3 comments:
LOL.... but good
working... after all
good
Post a Comment