Geekzone: technology news, blogs, forums
Welcome Guest.
You haven't logged in yet. If you don't have an account you can register now.
New worm threat on the internet starts spreading
Posted on 18-Feb-2004 07:58 | Tags Filed under: News

The risk of new worm named Bagle.B is being upgraded by internet security companies because of its quick spreading.

The malware contains its own SMTP engine to construct outgoing messages, collecting email addresses from the victim machine. As usual in the current wave of mass e-mailers, the From: address of messages is spoofed. It's interesting to note that this program contains a remote access component that notifies the hacker when a machine is infected.
The worm wil stop replicating from 25th February 2004.

According to McAfee security firm, users are reminded that the scanning of compressed files (default option) is required for detection.

Users can also detect and disinfect this and other malicious code using the free online antivirus Panda ActiveScan.

Still according to the antivirus maker, if the date check is satisfied, the virus executes the standard Windows Sound Recorder (SNDREC32.EXE) application. The virus uses the same icon as this application and copies itself into the Windows system directory as AU.EXE.

The following Registry key is added to hook system startup:

Run "au.exe" = C:\WINNT\SYSTEM32\AU.EXE
Additionally, the following two Registry keys are added:

HKEY_CURRENT_USER\Software\Windows2000 "frn"
HKEY_CURRENT_USER\Software\Windows2000 "gid"

The virus constructs messages using its own SMTP engine. Target email addresses are harvested from files with the following extensions on the victim machine:


The virus spoofs the sender address by using a harvested address in the From: field, using the following e-mail structure:

From : (address is spoofed)
Subject : ID (string)... thanks
Body :
Yours ID (string2)

The e-mail will contain an attachment randomly named of 11,264 bytes with .EXE file extension.

A notification is sent to the author(s) via HTTP. A GET request (containing the port number and "id") is sent to a PHP script on remote server(s). Users are recommended to block access to the following domains:

This worm is also known with other names: W32.Alua@mm, Win32/Bagle.B.Worm [Computer Associates], Bagle.B [F-Secure], W32/Bagle.b@MM [McAfee], W32/Bagle.B@mm [Norman], WORM_BAGLE.B [Trend Mirco], W32/Bagle.B.worm [Panda], W32/Tanx-A [Sophos].

More information:

comments powered by Disqus

Trending now »

Hot discussions in our forums right now:

Is Air New Zealand crapping on New Zealand?
Created by Rikkitic, last reply by ockel on 22-Mar-2018 19:19 (60 replies)
Pages... 2 3 4

Cycle Helmets, Yes or No?
Created by tdgeek, last reply by Fred99 on 22-Mar-2018 19:26 (262 replies)
Pages... 16 17 18

First Driverless Car Death
Created by networkn, last reply by PhantomNVD on 22-Mar-2018 19:03 (65 replies)
Pages... 3 4 5

Cockroach question
Created by Rikkitic, last reply by jonathan18 on 22-Mar-2018 14:55 (21 replies)
Pages... 2

Drinking in NZ
Created by networkn, last reply by MikeAqua on 22-Mar-2018 14:26 (59 replies)
Pages... 2 3 4

Air NZ flight delayed, bumped to HiFly flight
Created by snowfly, last reply by MikeAqua on 20-Mar-2018 13:27 (14 replies)

Stuff Pix - How Can This Possibly Work?
Created by tdgeek, last reply by Rikkitic on 22-Mar-2018 10:10 (26 replies)
Pages... 2

Chorus made the news again..
Created by Lias, last reply by raytaylor on 21-Mar-2018 22:02 (41 replies)
Pages... 2 3