Close

Results 1 to 2 of 2
  1. #1
    DF VIP Member
    cronus71's Avatar
    Join Date
    May 2001
    Location
    Indonesia
    Posts
    7,081
    Thanks
    603
    Thanked:        746
    Karma Level
    1105

    Default PayPal Email - Virus

    This is out now. People should know better but posting anyway. Apologies if this was already posted.

    W32.Mimail.J@mm worm variant:

    Name of the Virus: W32.Mimail.J@mm [Symantec], W32/Mimail.gen@mm [McAfee]
    Contains its own SMTP engine for constructing email messages
    Emails itself as .pif and .exe attachments
    Harvests email addresses from the local infected machine
    Sends out large volume of data (garbage) to a remote server - suggestive of a DoS payload
    Captures information and emails it to three addresses


    Delete the email from Do_Not_Reply@PayPal.com. Do not launch or save the files attached. Users will only infect a system if they launch the attached files.

    Are Definitions Available: NO
    Detection is available through: N/A
    Detected using Virus Definitions dated:
    ScanMail pattern file:
    Norton Antivirus:



    Operating Systems Affected:
    Windows 95
    Windows 98
    Windows 2000
    Windows XP


    Ways this virus spreads: Email Mail Propagation
    Target email addresses are harvested from files on the victim's machine. The worm ignores address extraction from files that contain the following extensions:

    avi
    bmp
    cab
    com
    dll
    exe
    gif
    jpg
    mp3
    mpg
    ocx
    pdf
    psd
    rar
    tif
    vxd
    wav
    zip
    Addresses are written to the file EML.TMP in %WinDir%. Testing shows the worm is overly lax in identifying valid email addresses - as a result messages are likely to be sent to invalid recipients.

    Outgoing messages are constructed using the worm's own SMTP engine. They are formatted as follows:



    From: Do_Not_Reply@paypal.com
    Subject: Important (followed by blank spaces and random characters)
    [seeded with Subject: Problems with your PayPal account.]

    Dear PayPal member,

    We regret to inform you that your account is about to be expired in next five business days. To avoid suspension of your account you have to reactivate it by providing us with your personal information.

    To update your personal profile and continue using PayPal services you have to run the attached application to this email. Just run it and follow the instructions.

    IMPORTANT! If you ignore this alert, your account will be suspended in next five business days and you will not be able to use PayPal anymore.

    Thank you for using PayPal.



    Attachment (one of the following):

    www.paypal.com.pif
    infoupdate.exe (may be seen via seeding of the worm)


    Information stealing payload
    Credit Card Information Stealing Victims of the PayPal scam will have their credit card information collated into C:\PPINFO.SYS. The worm then attempts to send this data to three email addresses.

    kaspersky@mail15.com
    ekaspersky@mail15.com
    admin@kaspersky.cjb.net
    Thus, outgoing DNS queries to these servers will be issued from the victim machine.


    Method of Infection
    The following registry key is added to run the virus at startup:
    HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\
    Run "SvcHost32" = %WinDir%\svchost32.exe
    The worm creates the following files:



    c:\cansend.sys
    c:\pp.gif (paypal icon)
    c:\pp.hta (graphical interface)
    c:\ppinfo.sys (your credit card details)
    %WinDir%\ee98af.tmp (copy of the worm)
    %WinDir%\el388.tmp (harvested email addresses)
    %WinDir%\svchost32.exe (copy of the worm)
    %WinDir%\zp3891.tmp
    Note: %WinDir% is a variable for the Windows directory name. The worm does not use this exact name. It simply uses the system %WinDir% directory.

    The worm checks for an active Internet connection by pinging www.akamai.com

    This virus spreads via email. Manually running the attachment infects the local machine.
    “If I asked you to have sex with me, would the answer to that question be the same as the answer to this question?”


  2. #2
    DF VIP Member CominAtcha's Avatar
    Join Date
    Jan 2003
    Location
    Nowhere
    Posts
    3,219
    Thanks
    80
    Thanked:        146
    Karma Level
    473

    Default

    We've had one of these cheeky blighters at the office here. NAV sorted it, before infection though.
    If you can smell it, it's in your mouth.
    Click

Similar Threads

  1. blueyonder trashes 25,000 email accounts
    By marcode in forum The Dog and Duck
    Replies: 3
    Last Post: 17th September 2002, 09:42 PM
  2. Dodgy email
    By wonkyfox in forum PC Problems
    Replies: 6
    Last Post: 7th September 2002, 03:39 PM
  3. Bull***t Email?????
    By wonkyfox in forum The Dog and Duck
    Replies: 3
    Last Post: 5th September 2002, 06:01 AM
  4. Online Web Email Services
    By wizer in forum The Dog and Duck
    Replies: 13
    Last Post: 4th September 2002, 04:41 PM
  5. RudeYute's Email...
    By RudeYute in forum Unlocking Questions & Solutions
    Replies: 2
    Last Post: 1st September 2002, 01:58 PM

Social Networking Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •