Geekzone: technology news, blogs, forums
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
New worm threat on the internet starts spreading
Posted on 18-Feb-2004 07:58. | Tags Filed under: News.

The risk of new worm named Bagle.B is being upgraded by internet security companies because of its quick spreading.

The malware contains its own SMTP engine to construct outgoing messages, collecting email addresses from the victim machine. As usual in the current wave of mass e-mailers, the From: address of messages is spoofed. It's interesting to note that this program contains a remote access component that notifies the hacker when a machine is infected.
The worm wil stop replicating from 25th February 2004.

According to McAfee security firm, users are reminded that the scanning of compressed files (default option) is required for detection.

Users can also detect and disinfect this and other malicious code using the free online antivirus Panda ActiveScan.

Still according to the antivirus maker, if the date check is satisfied, the virus executes the standard Windows Sound Recorder (SNDREC32.EXE) application. The virus uses the same icon as this application and copies itself into the Windows system directory as AU.EXE.

The following Registry key is added to hook system startup:

Run "au.exe" = C:\WINNT\SYSTEM32\AU.EXE
Additionally, the following two Registry keys are added:

HKEY_CURRENT_USER\Software\Windows2000 "frn"
HKEY_CURRENT_USER\Software\Windows2000 "gid"

The virus constructs messages using its own SMTP engine. Target email addresses are harvested from files with the following extensions on the victim machine:


The virus spoofs the sender address by using a harvested address in the From: field, using the following e-mail structure:

From : (address is spoofed)
Subject : ID (string)... thanks
Body :
Yours ID (string2)

The e-mail will contain an attachment randomly named of 11,264 bytes with .EXE file extension.

A notification is sent to the author(s) via HTTP. A GET request (containing the port number and "id") is sent to a PHP script on remote server(s). Users are recommended to block access to the following domains:

This worm is also known with other names: W32.Alua@mm, Win32/Bagle.B.Worm [Computer Associates], Bagle.B [F-Secure], W32/Bagle.b@MM [McAfee], W32/Bagle.B@mm [Norman], WORM_BAGLE.B [Trend Mirco], W32/Bagle.B.worm [Panda], W32/Tanx-A [Sophos].

More information:

comments powered by Disqus

Trending now »

Hot discussions in our forums right now:

RNZAF Boeing 757 breaks down when carrying PM. RNZAF must have an atrocious dispatch reliability figure.
Created by amiga500, last reply by amiga500 on 26-Oct-2016 18:44 (64 replies)
Pages... 3 4 5

WiFi and 3G/4G controlled Wall Switches
Created by maxeon, last reply by wbx0838 on 26-Oct-2016 17:46 (21 replies)
Pages... 2

Is it me, or have Trade Me prices increased?!
Created by Geektastic, last reply by mattwnz on 26-Oct-2016 18:51 (19 replies)
Pages... 2

New PC build
Created by Lyderies, last reply by joker97 on 26-Oct-2016 16:11 (18 replies)
Pages... 2

Gigabit cable now available
Created by sub, last reply by Kodiack on 26-Oct-2016 18:22 (107 replies)
Pages... 6 7 8

Galaxy Note 7 Announcement and Owners' Thread
Created by eracode, last reply by joker97 on 26-Oct-2016 16:14 (1200 replies)
Pages... 78 79 80

Mould Issues
Created by networkn, last reply by SepticSceptic on 26-Oct-2016 15:57 (13 replies)

Shifting ISP and domain name
Created by noob, last reply by noob on 25-Oct-2016 18:45 (13 replies)