sos5.1.0
critical
This signature detects e-mails with the content 'Software
provided by Matrix' sent via POP3. This may indicate the
e-mail virus Matrix is attempting to enter the system. The
executed file first checks for antivirus software running on
the host and terminates if found. Otherwise, the virus copies
itself to the Windows directory as Ie_pack.exe, runs, and
renames to Win32.dll. Matrix also installs the downloader
program Mtx_.exe (which downloads plug-ins for the virus
upon reboot), and infects Win32 executables.
VIRUS:POP3:MATRIX
sos5.1.0
high
This signature detects e-mail attachments named
'pics4you.exe' sent via POP3. This may indicate the e-mail
virus MyPics is attempting to enter the system. The executed
file installs as Pics4You.exe and writes itself to the Windows
Startup directory, obtains e-mail addresses from the
Microsoft Outlook database, and sends infected e-mail
messages to 50 addresses at a time. MyPics was also
designed to corrupt CMOS data and reformat hard drives
on 1/1/2000.
VIRUS:POP3:MYPICS
sos5.1.0
high
This signature detects e-mails with the subject 'ble bla' with
the attachments myjuliet.chm and myromeo.exe sent via
POP3. This may indicate the e-mail virus Verona is
attempting to enter the system. Because CHM files are
compressed HTML files, myjuliet.chm is activated when
viewed in the Microsoft Outlook preview pane; once
triggered, the CHM file runs myromeo.exe in the background.
Myromeo.exe obtains e-mail addresses from the Microsoft
Outlook database, sends infected e-mail messages to all
addresses found, and edits the Window directory file hh.dat.
VIRUS:POP3:MYROMEO-BLE-BLA
sos5.1.0
high
This signature detects e-mail attachments with the name
'myromeo.exe' accompanied by myjuliet.chm and sent via
POP3. This may indicate the e-mail virus Verona is
attempting to enter the system. Because CHM files are
compressed HTML files, myjuliet.chm is activated when
viewed in the Microsoft Outlook preview pane; once
triggered, the CHM file runs myromeo.exe in the background.
Myromeo.exe obtains e-mail addresses from the Microsoft
Outlook database, sends infected e-mail messages to all
addresses found, and edits the Window directory file hh.dat
VIRUS:POP3:MYROMEO-EXE
sos5.1.0
high
This signature detects e-mails with the attachments
myjuliet.chm and myromeo.exe sent via POP3. This may
indicate the e-mail virus Verona is attempting to enter the
system. Because CHM files are compressed HTML files,
myjuliet.chm is activated when viewed in the Microsoft
Outlook preview pane; once triggered, the CHM file runs
myromeo.exe in the background. Myromeo.exe obtains
e-mail addresses from the Microsoft Outlook database,
sends infected e-mail messages to all addresses found, and
edits the Window directory file hh.dat.
VIRUS:POP3:MYROMEO-I-LOVE-YOU
Copyright © 2010, Juniper Networks, Inc.
930
Network and Security Manager Administration Guide
Summary of Contents for NETWORK AND SECURITY MANAGER 2010.3
Page 6: ...Copyright 2010 Juniper Networks Inc vi...
Page 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Page 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Page 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Page 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Page 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Page 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Page 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Page 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Page 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Page 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Page 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Page 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Page 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Page 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Page 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Page 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Page 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Page 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Page 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Page 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Page 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Page 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Page 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Page 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Page 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Page 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...