5/20: Mytob-EU Worm Drops Copy |
 |
|
|
|
5/20: Mytob-EU Worm Drops Copy May 20, 2005
Upon execution, Worm_Mytob.EU drops a copy of itself in the Windows system folder as T4SKGMR.EXE. It also drops the component file HELLMSN.EXE in the root folder (usually C:\). This component file further creates the following copies of this worm in the root folder:
FUNNY_PIC.SCR
MY_PHOTO2005.SCR
SEE_THIS!!.SCR
Trend Micro detects HELLMSN.EXE as WORM_MYTOB.J.
This worm exploits the following Windows vulnerabilities:
LSASS vulnerability
Technical information can be found at Trend Micro page.
|
|
|
|
Check Point Directing Security to Web Applications, End Points
Security Firms Sound Alarm on Latest Microsoft Flaws
SQL Server Security Checklist
9/17: Backdoor.Nemog-D a Trojan Program
Linux Security: Tips from the Experts
Pedestal Adds Security Benchmark Score to Audit Software
4/4: VBS.Kuullio Worm Sends Emails
7/19: Rbot-DX Spreads to Remote Shares
Network-1 Offers Centralized Policy Control For Distributed Firewalls
PentaSafe Unveils Integrated Security Manager
Secure Messaging Vendor Offers Management Appliance
Buy Security Camera
 |