sos5.1.0
critical
This signature detects e-mails with the subject
'C:\CoolProgs\Pretty Park.exe' sent via POP3. This may
indicate the e-mail virus Pretty Park is attempting to enter
the system. The executed file copies itself to the Windows
System directory as FILES32.VXD and edits the Registry to
run the virus on reboot. Pretty Park then obtains e-mail
addresses from Microsoft Outlook database and sends
infected messages to all addresses found every 30 minutes.
The virus also attempts to contact its author via IRC chat
every 30 seconds; attackers may use the installed virus as
a backdoor remote access tool to further compromise the
system.
VIRUS:POP3:PRETTY-PARK
sos5.1.0
high
This signature detects e-mail attachments named
'SETUP.EXE' sent via POP3. This may indicate the e-mail
virus Simbiosis (Cholera worm executable containing a CTX
virus) is attempting to enter the system. The executed
Cholera worm copies itself to the Windows directory and
edits either the WIN.INI file (Windows 9x) or the Registry
(NT) to run the virus on reboot. Simbiosis then obtains e-mail
addresses from Internet-related files and sends infected
messages to all addresses found using its own SMTP server.
The executed CTX virus appends and infects Microsoft
Windows PE executables; the virus does not carry a payload
and is apparent only through a video effect.
VIRUS:POP3:SIMBIOSIS
sos5.1.0
critical
This signature detects e-mail attachments named
'Suppl.doc' sent via POP3. This may indicate the e-mail
virus/trojan Suppl is attempting to enter the system. The
executed file macros copy the active (virus) document to
the Windows directory as Anthrax.ini and decompress the
malicious Wsock32.dll file appended to Suppl.doc. On
reboot, the virus file DLL.tmp replaces the malicious
Wsock32.dll and the original Wsock32.dll is renamed to
Wsock33.dll. Suppl then attaches to all outgoing SMTP
e-mail messages, locates files with common extensions
(DOC, .TXT, .ZIP, etc) on available hard drives, and truncates
those files to zero bytes.
VIRUS:POP3:SUPPL
sos5.1.0
high
This signature detects e-mail attachments named
'The_Fly.chm' sent via POP3. This may indicate the e-mail
virus The Fly is attempting to enter the system. The executed
file copies itself as THE_FLY.CHM to the Windows directory,
as DXGFXB3D.DLL to Windows system directory, and opens
a graphic with message 'If you ride a motorcycle, close your
mouth'. The Fly then copies MSJSVM.JS to the Windows
system directory and edits the Registry to run this JavaScript
upon reboot. The virus also obtains e-mail addresses from
the Microsoft Outlook database and sends infected
messages to all addresses found.
VIRUS:POP3:THEFLY
Copyright © 2010, Juniper Networks, Inc.
932
Network and Security Manager Administration Guide
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...