Actually I can go one better.
Virus notification is as follows:
Scan type: Realtime Protection Scan
Event: Virus Found!
Virus name: W95.Hybris.worm
File: C:\Documents and Settings\hefe\Desktop\joke.exe
Location: Quarantine
Computer: *classified*
User: *classified*
Action taken: Clean failed : Quarantine succeeded : Access denied
Date found: Tue Jan 22 18:44:48 2002
From Symantec's web site.
Technical
description:
When the worm attachment is executed, the Wsock32.dll file is modified or
replaced. Once the worm has infected wsock32.dll, it has the ability to
monitor the Internet connection as well as incoming and outgoing email
traffic. The worm then scans for email addresses. When an email address is
detected whether on an Internet site or in email being sent or received, the
worm waits for a period of time and then sends an infected message to the
detected address.
The worm attempts to connect to the alt.comp.virus newsgroup. If it connects
successfully, then the worm uploads its own plug-ins to this newsgroup in an
encrypted form. It goes thru the subject header of the messages, and tries
to match a specific format. The subject header will also specify the version
number of the attached plug-in if the plug-ins are present. If newer
versions of the plug-ins are found, the worm downloads them and updates its
behavior.
One of the plug-ins for W95.Hybris.gen generates a spiral image. Upon
execution, the plug-in initially loads OpenGL libraries which are used to
draw a large black and white spiral image. It also registers itself as a
service; this prevents it from being displayed in the Close Programs dialog
box. For additional information on this, see the document W95.Hybris.Plugin.
This worm also has a plug-in that infects executable programs. The DOS EXE
infection is fairly simple dropping technique. The virus code is appended to
the end of the file with a small 16-bit dropper routine. This routine
creates a temporary file with an .exe extension in the TEMP folder and
executes it. It then deletes the temporary executable. In this way,
Wsock32.dll is infected with the actual worm body. The PE executables have a
much more complicated file infection process. PE files become infected only
if they have a long enough code section. The virus infection plug-in packs
the original code area and overwrites it if it will fit in the same place.
This complicated antiheuristic infection technique is difficult but possible
to repair.
If Wsock32.dll is being used by the system, the worm cannot modify it. In
this situation, the worm will add a registry entry to one of the following
subkeys:
HKEY_LOCAL_MACHINE\Software\Microsoft\
Windows\CurrentVersion\RunOnce
HKEY_CURRENT_USER\Software\Microsoft\
Windows\CurrentVersion\RunOnce
It always alternates between these two keys as the worm spreads from one
computer to another. The worm hooks onto the following exports of
Wsock32.dll:
send()
recv()
connect()
Whenever you send email, the worm sends a second message to the same person,
attaching a copy of itself using a randomly generated file name.
Hope nobody ran it.
Peter
----- Original Message -----
From: "Michael Valentiner" <mpv(a)yuck.net>
To: <mba(a)thebarn.com>
Sent: Tuesday, January 22, 2002 6:33 PM
Subject: SPAM WARNING (was Re: Snowhite and the Seven Dwarfs - The REAL
story!)
Don't run the attachment unless you want trouble.
--
Michael Valentiner, Minneapolis, Minnesota
mpv(a)yuck.net