sos5.1.0
high
This signature detects the J variant of the Dumaru SMTP
virus. Dumaru sends e-mails with the subject line: "Important
information for you. Read it immediately!"; the e-mail
includes a .zip attachment that contains a malicious payload
disguised as a picture. When the picture is viewed, the
malicious executable program infects the target host. The
virus then sends a copy of itself to e-mail addresses found
in the target's address book, using the target's e-mail address
as the return address.
VIRUS:SMTP:DUMARU.J
sos5.1.0
info
This signature detects the EICAR antivirus test file sent as
an e-mail attachment.
VIRUS:SMTP:EICAR-ATTACHMENT
sos5.1.0
medium
This signature detects Win32 executables sent as a MIME
attachment. Many viruses, worms, and other malicious
programs are transmitted through SMTP attachments. You
might want to block all executable attachments and instead
require your users to send executables in a compressed
format.
VIRUS:SMTP:EXE-ATTACH-1
sos5.1.0
medium
This signature detects Win32 executables sent within a ZIP
file as a MIME attachment. Many viruses, worms, and other
malicious programs are transmitted through SMTP
attachments. You might want to block all executable
attachments.
VIRUS:SMTP:EXE-IN-ZIP
sos5.0.0
high
This signature detects attempts by the e-mail virus Nail to
enter the system. When executed, the virus assigns the
Microsoft Word auto.dot template to a template located on
an attacker Web site, enabling the attacker to upload new
virus code. Nail then starts a MAPI (Mail API) session, obtains
e-mail addresses from the Microsoft Outlook database, and
sends infected e-mail messages to all addresses found.
Finally, the virus sends an e-mail message to
[email protected], assumed to be the e-mail address
of the virus author.
VIRUS:SMTP:NAIL
sos5.1.0
low
This signature detects e-mail attachments named
'EXPLORER.DOC' sent via SMTP. This may indicate the
e-mail virus Resume is attempting to enter the system. The
executed file obtains e-mail addresses from Microsoft
Outlook database and sends infected messages to all
addresses found. When the file is closed, Resume creates
directory C:Data, copies itself there as Normal.dot, and edits
the Registry to run the virus on reboot. The virus then
attempts to delete all files from several directories (including
Windows) and all drives from A: to Z:.
VIRUS:SMTP:RESUME-EXPLORER-DOC
sos5.1.0
medium
This signature detects e-mail attachments with one of the
following file name sent via SMTP: approved.pif,
application.pif, doc_details.pif, movie28.pif, password.pif,
ref-39xxxx.pif, screen_doc.pif, screen_temp.pif, _approved.pif.
This may indicate the SOBIG e-mail virus is attempting to
enter the system.
VIRUS:SMTP:SOBIG-ATTACHMENTS
935
Copyright © 2010, Juniper Networks, Inc.
Appendix E: Log Entries
Содержание NETWORK AND SECURITY MANAGER 2010.3
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 144: ...Copyright 2010 Juniper Networks Inc 94 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 234: ...Copyright 2010 Juniper Networks Inc 184 Network and Security Manager Administration Guide...
Страница 310: ...Copyright 2010 Juniper Networks Inc 260 Network and Security Manager Administration Guide...
Страница 364: ...Copyright 2010 Juniper Networks Inc 314 Network and Security Manager Administration Guide...
Страница 366: ...Copyright 2010 Juniper Networks Inc 316 Network and Security Manager Administration Guide...
Страница 478: ...Copyright 2010 Juniper Networks Inc 428 Network and Security Manager Administration Guide...
Страница 576: ...Copyright 2010 Juniper Networks Inc 526 Network and Security Manager Administration Guide...
Страница 580: ...Copyright 2010 Juniper Networks Inc 530 Network and Security Manager Administration Guide...
Страница 592: ...Copyright 2010 Juniper Networks Inc 542 Network and Security Manager Administration Guide...
Страница 684: ...Copyright 2010 Juniper Networks Inc 634 Network and Security Manager Administration Guide...
Страница 690: ...Copyright 2010 Juniper Networks Inc 640 Network and Security Manager Administration Guide...
Страница 696: ...Copyright 2010 Juniper Networks Inc 646 Network and Security Manager Administration Guide...
Страница 698: ...Copyright 2010 Juniper Networks Inc 648 Network and Security Manager Administration Guide...
Страница 748: ...Copyright 2010 Juniper Networks Inc 698 Network and Security Manager Administration Guide...
Страница 778: ...Copyright 2010 Juniper Networks Inc 728 Network and Security Manager Administration Guide...
Страница 870: ...Copyright 2010 Juniper Networks Inc 820 Network and Security Manager Administration Guide...
Страница 872: ...Copyright 2010 Juniper Networks Inc 822 Network and Security Manager Administration Guide...
Страница 898: ...Copyright 2010 Juniper Networks Inc 848 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 910: ...Copyright 2010 Juniper Networks Inc 860 Network and Security Manager Administration Guide...
Страница 995: ...PART 6 Index Index on page 947 945 Copyright 2010 Juniper Networks Inc...
Страница 996: ...Copyright 2010 Juniper Networks Inc 946 Network and Security Manager Administration Guide...