The Web    Google
5/20: Mytob-EU Worm Drops Copy

5/20: Mytob-EU Worm Drops Copy
May 20, 2005

Upon execution, Worm_Mytob.EU drops a copy of itself in the Windows system folder as T4SKGMR.EXE. It also drops the component file HELLMSN.EXE in the root folder (usually C:\). This component file further creates the following copies of this worm in the root folder:

  • MY_PHOTO2005.SCR

    Trend Micro detects HELLMSN.EXE as WORM_MYTOB.J.

    This worm exploits the following Windows vulnerabilities:

  • LSASS vulnerability

    Technical information can be found at Trend Micro page.

  • Check Point Directing Security to Web Applications, End Points
  • Security Firms Sound Alarm on Latest Microsoft Flaws
  • SQL Server Security Checklist
  • 9/17: Backdoor.Nemog-D a Trojan Program
  • Linux Security: Tips from the Experts
  • Pedestal Adds Security Benchmark Score to Audit Software
  • 4/4: VBS.Kuullio Worm Sends Emails
  • 7/19: Rbot-DX Spreads to Remote Shares
  • Network-1 Offers Centralized Policy Control For Distributed Firewalls
  • PentaSafe Unveils Integrated Security Manager
  • Secure Messaging Vendor Offers Management Appliance
  • Buy Security Camera