BugTraq
JS/Zerolin Aug 12 2004 03:37PM
T.H. Haymore (bonk webchat chatsystems com) (1 replies)
Re: JS/Zerolin Aug 13 2004 08:38AM
Nicolas Gregoire (ngregoire exaprobe com) (1 replies)
Le jeu 12/08/2004 à 17:37, T.H. Haymore a écrit :

> There are incoming reports of a JS/Zerolin (java script virus). Anyone
> else seeing this ? (I have no further information yet).

Hi,

I've seen theses emails since last Friday, and my gateway has since
received around 200 of them. KAV and ClamAV detect them as
"TrojanDropper.VBS.Zerolin"

It appears that a small Jscript.Encoded code is hidden at the botton of
a false (true ?) spam. After several redirections, un ss.exe file is
downloaded. This file is detected as following :

KAV : Trojan.Win32.Genme.c
Trend : not detected
ClamAV : Trojan.Xebiz.A
F-Prot : W32/Xebiz.A
NAI : not detected

>From the Symantec website :

http://securityresponse.symantec.com/avcenter/venc/data/backdoor.xebiz.h
tml
A large scale spamming of messages contained a link to a Web page
hosting the backdoor. Following the link downloads the file Links.HTA,
which in turn downloads and executes the Trojan as ss.exe

Regards,
--
Nicolas Gregoire ----- Consultant en Sécurité des Systèmes d'Information
ngregoire (at) exaprobe (dot) com [email concealed] ------[ ExaProbe ]------ http://www.exaprobe.com/
PGP KeyID:CA61B44F FingerPrint:1CC647FF1A55664BA2D2AFDACA6A21DACA61B44F

[ reply ]
Re: JS/Zerolin Aug 13 2004 02:50PM
T.H. Haymore (bonk webchat chatsystems com)


 

Privacy Statement
Copyright 2010, SecurityFocus