|
BAT_CHODE911
Aliases:
CHODE911, 911, Firkin,
W95/Firkin, Chode,
BAT.Chode.Worm,
Foreskin, VBS_BAT61
|
Subject: National Infrastructure Protection Center Information System Advisory (NIPC Sdvisory 00-038); Self-Propagating 911 Script A recent and breaking FBI case has revealed the creation and dissemination of a self-propagating script that can erase hard drives and dial-up 911 emergency systems. while investigation and technical analysis continue, the script appears to include the following characteristics: 1. Actively search the internet for computer systems set up for file and print sharing and copy itself on to these systems. 2. Overwrite victim hard drives. 3. Cause victim systems to dial 911 (possibly causing emergency authorities to check out substantial numbers of "false positive" calls). To this point case information and known victims suggest a relatively limited dissemination of this script in the houston, texas area, through source computers that scanned several thousand computers through four internet service providers (America On-Line, AT&T, MCI, and Netzero). disseminated script may be placed in hidden directories named chode, foreskin or dickhair. further script analysis by the fbi/nipc continues. 3. FBI/NIPC requests recipients immediately
report information relating to use of this script to the local FBI or FBI/NIPC
watch at 202-323-3204/3205/3206. as more technical or operational information
about
_______________________________ It is more commonly known as the 911 virus
is a new malware that is currently spreading. It has many payloads, some
of which are destructive. It randomly chooses one of three payloads when
triggered:
It does not use email to spread itself.
It uses several Batch files (*.BAT) to spread via the Internet. It searches
for an accessible Subnet on several ISPs to find accessible shared drives
and maps it to copy itself on it. It looks for IP addresses that start
with the following:
It scans the Subnet starting from AAA.244.100.100
up to
Once it finds an accessible shared drive, it first checks if this shared drive is the Drive C: If it is the Drive C:, it maps this shared drive using drive J:. After mapping it, the worm checks for previous infection on the said drive. If the drive is already infected, it starts all over again from the start using other Subnets. Then if the drive is not yet infected the worm checks if the drive is shared with write access; if it is shared with write access, the worm copies itself on to the shared drive. Then it creates a hidden folder C:\Progra~1\Foreskin
and copies all of its accompanied files on it. The files ashield.pif
, netstat.pif, and winsock.vbs are then copied into the Program-StartUp
of the infected machine. So that the worm is executed automatically upon
start up. The file winsock.vbs contains the payload, which deletes
files from the following folders on the 19th day of the month:
One of five times, the worm modifies the AUTOEXEC.BAT and adds the line that dials the Number 911 using the modem. This is done with the use of the computer's COM ports. It then Formats drives D:, E:,
F:, G: and H:, and displays the following text before
formatting Drive C:
______________________________ Delete any one or all the following
directories if they exist:
Delete the files ASHIELD.PIF, NETSTAT.PIF, and WINSOCK.VBS from the C:\WINDOWS\START MENU\PROGRAMS\STARTUP\ folder. |
||||||||
|
[an error occurred while processing this directive] |
Howdy!!! Welcome to the McCann's PooR Farm I'm not with any school or schools, Just a disable grandpa with 17 grand kids, 1 Great grand Kid Sorry! about all of the adds, Our Cost just keeping going up. Please click on one of them and help us out. or Send $1.00 U.S. to: McCann's Poor Farm 20509 Lawrence 2207 Aurora, Mo. 65605-7275 Thank You, Junior McCann Webmaster and the GrandKids See what the experts have to say about the McCann's Poor Farm Web Page Legal Disclaimer - We Are in no way connected with any School and or Companies linked to this page. Links are provided as a courtesy only. |
Argentina, Australia, Austria, Belarus, Belgium, Bermuda, Brazil, Brunei Darussalam, Bulgaria, Canada, Chile, Columbia, Costa Rica, Croatia, Croatia/Hrvatska, Czech Republic, Denmark, Dominican Republic, Ecuador, Egypt, Estonia, Finland, France, Germany, Ghana, Greece, Hong Kong, Hungary, Iceland, India, Indonesia, Ireland, Israel, Italy, Japan, Jordan, Korea, Korea, Republic of, Latvia, Lebanon, Lithuania, Luxembourg, Macedonia, Malaysia, Mexico, Moldova, Netherlands, New Calendonia, New Zealand, Norway, Old style Arpanet, Papua New Guinea, Peru, Philippines, Poland, Portugal, Romania, Russian Federation, Saudi Arabia, Singapore, Slovakia, Slovenia, South Africa, South Korea, Spain, Sweden, Switzerland, Taiwan, Thailand, Turkey, Uganda, Ukraine, United Arab Emirates, United Kingdom, United States, Uruguay, USA Government, USA Military, Viet Nam |
Tell A Friend about this Page |
Tell me when this page is updated |
|
Put a Link on your Web Page
- Legal Disclaimer - |