exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ie0199.exe-trojan.txt

ie0199.exe-trojan.txt
Posted Aug 17, 1999

ie0199.exe-trojan.txt

tags | exploit, trojan
SHA-256 | decb691f6f3df2f759096ef9a47d45649c81131b02151d7d5698fb84f15438c7

ie0199.exe-trojan.txt

Change Mirror Download
Date: Thu, 28 Jan 1999 20:12:39 -0500
From: Mark E. Duck <duck@AQUASCAPE.COM>
To: BUGTRAQ@netspace.org
Subject: E-mailed Trojan


There is a trojan horse circulating the Internet as an attachment in email
with a spoofed email address of Microsoft Corporation. It contains an
announcement and an attachment that is supposedly targeted at registered
users of MS Internet Explorer. A copy of the email was not available for
examination, but the attachment was. The attachment is called ie0199.exe and
is represented as a HOTFIX for IE.

When executed it deletes sndvol32.exe from the %SystemRoot%\System32
directory, installs %SystemRoot%\System\sndvol.exe, creates a registry key
value HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Default with a
value of %SystemRoot%\System\sndvol.exe. This key causes execution of
sndvol.exe after logging into the system. This is malicious code that
continually half opens TCP connections on various ports to www1.infotel.bg.

You must delete %SystemRoot%\System\sndvol.exe, terminate the running
sndvol.exe process, remove the key (see above), and restore
%SYSTEMROOT%\System32\sndvol32.exe with a known good copy (if required) to
remove the trojan.

Thanks go out to ET, Ranger Rick, Homer, and Raz for their assistance on
tracking this down and helping me kill it. Public attribution of the authors
of this report is acceptable and expected.

Mark E. Duck, Owner
AquaScape, Internet Services http://www.aquascape.com
"Those who desire to give up Freedom, to gain Security, will not, and do not
deserve, either." -- Thomas Jefferson

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    65 Files
  • 25
    Sep 25th
    24 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close