W32/Yenik.A@mm

description-logoAnalysis

  • Virus is 32 bit with a packed file size of 18,432 bytes
  • The virus is kind of buggy in that it requires to be run from the System folder as "updater.exe", otherwise it could cause an Illegal Page Fault [with itself] when executed
  • The virus will read addresses from the Windows address book and write them into a TEXT file named YENIK.TXT - this file is later removed
  • The virus will then compose an email for each address found - the subject lines and body text may be different among emails, and all will have an infectious file attachment; below are an example of possible subjects and body text -

    Subjects possible:
    Big Virus Cleaner Tools
    Free Antivirus
    Internet Explorer Security Bug Fix
    New Big Patcher
    New Private Message
    New Security Patcher
    No Virus and New Life
    Virus Hunter in your box
    Win98 Security Tools

    Body text possibilities:
    (1)
    What are Viruses, Trojan Horses and Worms? "Though these terms are often used interchangeably, they refer to different types of "malicious computer programs.

    (2)
    Guide to Online Security "Protecting your privacy and information online is extremely important to Yahoo!. We are " constantly evaluating our security technologies to ensure we are taking every reasonable "step to protect your personal information.

    (3)
    Disabling System Restore (Windows Me/XP) "If you are running Windows Me or Windows XP, we recommend that you temporarily turn off System" Restore. Windows Me/XP uses this feature, which is enabled by default, to restore the files on your "computer in case they become damaged. If a virus, worm, or Trojan infects a computer, System "Restore may back up the virus, worm, or Trojan on the computer.

    Attachment file names:
    FreeAntivirus.exe
    InternetExplorerSecurity.exe
    NewVirusCleaner.exe
    Patcher.exe
    PrivateMessage.exe
    VirusHunherII.exe
    W32-Myd00m_Blocker.exe
    Win98Security.exe
    WinXP-SP1.exe

  • The virus could write itself to any of these hard-coded folders -

    C:\Program Files\Bearshare\Shared\
    C:\Program Files\eDonkey2000\Incoming\
    C:\Program Files\eMule\Incoming\
    C:\Program Files\Grokster\My Grokster\
    C:\Program Files\ICQ\Shared Folder\
    C:\Program Files\Kazaa Lite K++\My Shared Folder\
    C:\Program Files\Kazaa Lite\My Shared Folder\
    C:\Program Files\Kazaa\My Shared Folder\
    C:\Program Files\Morpheus\My Shared Folder\

    as any or all of these file names -

    DivX Pro.exe
    ICQ Hacker.exe
    Half Life 2 Original KeyGen.exe
    GTA Keygen.exe
    Windows Password Cracker.exe
    Matrix Screen Saver.exe
    NetBIOS Hacker.exe
    New Exploit.exe
    Kaspersky Anti-Hacker.exe
    Linux Kernel Hacker.exe
    Ftp Hacker.exe
    PopStar-Firdevs.mp3.exe
    PopStar-Abidin.mp3.exe
    PopStar-Bayhan.mp3.exe
    New Keylogger.exe
    Hotmail Hacker.exe

recommended-action-logoRecommended Action

  • Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option

Telemetry logoTelemetry

Detection Availability

FortiClient
Extreme
FortiMail
Extreme
FortiSandbox
Extreme
FortiWeb
Extreme
Web Application Firewall
Extreme
FortiIsolator
Extreme
FortiDeceptor
Extreme
FortiEDR