Check it Out!    
RideCamp@endurance.net
[Date Prev] [Date Next] [Thread Prev] [Thread Next]
[Date Index] [Thread Index] [Author Index] [Subject Index]

VIRUS - REAL!!!! You may have it!!!



This is NOT a joke....look up this website and see for yourself.  I have
received this virus and it may be passed on to ANY of you as it is a
worm that send itself to everyone in the address book of the person who
received it.  You do NOT have to "open" it to have it on your system.  I
am having my password changed by my server in an attempt to negate it's
functionality.

http://www.datafellows.com/v-descs/prettyp.htm
--
Teddy Lancaster
American Endurance Ride Conference # 139422
- Member since 1974
6000+ career miles

================================================
Courage is what it takes to stand up and speak;
Courage is also what it takes to sit down and listen.

-- Winston Churchill
================================================

Running Bear Farm, Inc.
Your Trail Riding Equipment Headquarters - Celebrating our 20th
Anniversary!!!!
Teddy Lancaster, President
1348 Township Road 256
Kitts Hill, Ohio, 45645 USA  -  http://runningbear.com/
Webmaster for USA East website: http://runningbear.com/ETZ
Moderator for the USA EAST mailing list:
http://www.onelist.com/community/USAEAST
1-800-533-2327, FAX: 740-533-0337
Home of Khalarado+/ 1990 IAHA National Endurance Champion
- (1982 Chestnut CMK Stallion)
Supplying the WORLD with quality endurance equipment since 1980

Title: F-Secure Computer Virus Information Pages: PrettyPark
F-SecureData Fellows
Integrated Solutions for Enterprise Security
 
>Home
>Corporate Info
>News
>Products
>Support Center
>Virus & Security Info
Virus News
Hoax Warnings
Virus Screenshots
Update Bulletins
Happy Feedback :-)
>Download & Purchase
>Partners Program
>Jobs @ Datafellows
>Investor Relations
Quick Search

Quick Search


 

F-Secure Virus Information Pages

NAME:PrettyPark
ALIAS:PSW, CHV, Pretty Park

The 'PrettyPark' also known as 'Trojan.PSW.CHV' is an Internet worm, a password stealing trojan and a backdoor at the same time. It was reported to be widespread in Central Europe in June 1999.

PrettyPark spreads itself via Internet by attaching its body to e-mails as 'Pretty Park.Exe' file. Being executed it installs itself to system and then sends e-mail messages with its copy attached to addresses listed in Address Book and also informs someone (most likely worm author) on specific IRC servers about infected system settings and passwords. It also can be used as a backdoor (remote access tool).

When the worm is executed in the system for the first time, it looks for its copy already active in memory. The worm does this by looking for application that has "#32770" window caption. If there is no such window, the worm registers itself as a hidden application (not visible in the task list) and runs its installation routine.

While installing to system the worm copies itself to \Windows\System\ directory as FILES32.VXD file and then modifies the Registry to be run each time any EXE file starts when Windows is active. The worm does this by creating a new key in the HKEY_CLASSES_ROOT. The key name is exefile\shell\open\command and it is associated with the worm file (FILES32.VXD file that was created in the Windows system folder). If the FILES32.VXD file is deleted and Registry is not corrected no EXE file will ever be started in Windows further on.

In case of error during installing the worm activates the SSPIPES.SCR screen saver (3D Pipes). If this file is missing, the worm tries to activate 'Canalisation3D.SCR' screen saver.

Then the worm opens Internet connection and activates 2 its routines. Further on theseinits socket (Internet) connection and runs its routines that are activated regularly: the first one once per 30 seconds, another one - once per 30 minutes.

The first routine that activates once in 30 seconds tries to connect to one of IRC chat servers (see the list below) and to send a messages to someone if he is present on any channel of this chat server. This allows worm author to monitor infected computers.

The list of IRC servers the worm tries to connect to:

 irc.twiny.net
 irc.stealth.net
 irc.grolier.net
 irc.club-internet.fr
 ircnet.irc.aol.com
 irc.emn.fr
 irc.anet.com
 irc.insat.com
 irc.ncal.verio.net
 irc.cifnet.com
 irc.skybel.net
 irc.eurecom.fr
 irc.easynet.co.uk

The worm may be also used as a backdoor (remote access tool) by its author. It can send out system configuration details, drives list, directories info as well as confidential information: Internet access passwords and telephone numbers, Remote Access Service login names and passwords, ICQ numbers, etc. The backdoor is also able to create/remove directories, send/receive files, delete and execute them, etc.

The second routine, which is activated once per 30 minutes, opens Address Book file, reads e-mail addresses from there, and sends messages to these addresses. The message Subject field contains the text:

 C:\CoolProgs\Pretty Park.exe

The message has an attached copy of the worm as Pretty Park.EXE file. If someone receives this message and runs the attached file his system becomes infected.

[Analysis: AVP, F-Secure and DataRescue teams]  

F-Secure framework - The new World of Security
 

 
Mirror sites:EuropeUSABack to the top

 

 



    Check it Out!    

Home    Events    Groups    Rider Directory    Market    RideCamp    Stuff

Back to TOC