[33537] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Outbreak warning: possibly Mydoom.C (Now Deadhat/Vesser)

daemon@ATHENA.MIT.EDU (Nick FitzGerald)
Mon Feb 9 15:08:36 2004

Date: Tue, 10 Feb 2004 08:21:11 +1300
From: Nick FitzGerald <nick@virus-l.demon.co.uk>
In-reply-to: <20040209180152.22803.qmail@www.securityfocus.com>
To: bugtraq@securityfocus.com
Reply-To: nick@virus-l.demon.co.uk
Message-id: <40289477.23172.1F1A9070@localhost>
MIME-version: 1.0
Content-type: text/plain; charset=US-ASCII
Content-transfer-encoding: 7BIT
Content-description: Mail message body

K-OTiK Security <Special-Alerts@k-otik.com> wrote:

> it's not mydoom.c - ...

Correct.

> ... his name is Vesser (W32.HLLW.Deadhat) :

Not.

Vesser (which a few AV companies have called Deadhat) was discovered 
early in the weekend spreading via Mydoom.A-infected machiens (and 
rpesumably it would also hit the occasional Mydoom,.B out there too).  
What Gadi alerted on as Mydoom.C has been agreed following analysis by 
AV industry experts to be sufficiently different in critical ways from 
Mydoom to be put in a new family and will be called Doomjuice.A by most 
AVs.

> Vesser mainly targets computers that have previously been infected
> with the Mydoom.A or Mydoom.B worms. Vesser scans for the backdoors in
> those worms on IP addresses. While doing that it connects to TCP ports
> 1080. 3127 and 3128 and tries to copy itself there in a
> specially-crafted package. 
> 
> http://www.f-secure.com/v-descs/vesser.shtml
> http://securityresponse.symantec.com/avcenter/venc/data/w32.hllw.deadhat.html

Correct, but irrelevant to this thread...


-- 
Nick FitzGerald
Computer Virus Consulting Ltd.
Ph/FAX: +64 3 3529854


home help back first fref pref prev next nref lref last post