[Esa-l] Might want to add .scr to poisoned list

Seth Cohn seth at oregonmed.net
Mon Nov 20 11:26:40 PST 2000


Hybris hides as an .scr file...

http://www.symantec.com/avcenter/venc/data/w32.hybris.gen.html


 Discovered on: September 25, 2000
 Last Updated on: November 16, 2000 0 9:54:12 AM PST


 W32.Hybris is worm that spreads by email as an attachment to outgoing
emails. It was
 discovered in late September of 2000. Although minimum reports of
infection were reported in
 October 2000, the worm started to become common in early Nov 2000. 

 Also known as: W32.Hybris.22528.dr, W32/Hybris.gen at M, I-Worm.Hybris 

 Category: Worm

 Virus definitions: September 25, 2000

 Threat assessment: 


 Wild: 
 Medium 
 Damage: 
 Low 
 Distribution: 
 High 

  

 Wild 

 Number of infections: 50-999 
 Number of sites: More than 10 
 Geographical distribution: Medium 
 Threat containment: Moderate 
 Removal: Moderate 

 Distribution 

 Name of attachment: Random with EXE or SCR file name extension 

 Technical description: 

 When the worm attachment is executed, the WSOCK32.DLL file will be
modified or replaced. This
 will give the worm the ability to attach itself to all outbound
email. The email attachment will have
 a random name but the filename extension is either EXE or SCR). 

 The worm attempts to connect to the newsgroup alt.comp.virus. After it
connects successfully,
 the worm uploads its own plug-ins in an encrypted form to this
newsgroup. It goes thru the subject
 header of the messages, and tries to match a specific format. The subject
header will also specify
 the version number of the attached plug-in if these plug-ins are indeed
present. If a newer version
 of plug-ins is found, the worm downloads these modules and updates its
behavior. For example,
 there are known modules that give the worm ability to infect compressed
files like ZIP. 

 If WSOCK32.DLL is being used by the system, the worm will be unable to
modify this file. Thus,
 in this situation, the worm will add a registry key to one of the
following subtrees: 

 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce

 HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce

 It will always alternate between these two trees mentioned above as the
worm spreads from
 one machine to another. The worm hooks on the following exports on
WSOCK32.DLL:
 send(), recv(), connect(). Whenever a user sends out an email to a
person, the worm will also
 send out another email to the same person attaching a copy of itself
using a randomly
 generated filename. 

 Removal: 

 Use Norton AntiVirus to repair the infected WSOCK32.DLL. Other files
detected as W32.Hybris
 contain only the virus body and must be deleted. 






More information about the esd-l mailing list