> Sorry for the confusion. Sandbox is part of Norman's AV 
> product, and not a
> separate product.

Ah, OK.  I'll take a look at that then.

> Also I never scanned the cab file yesterday I just posted a 
> report from a
> earlier infection I had. I did this just to illustrate the 
> type of info you
> get when it finds something suspicious.

OK. I guess there's no way to update a ClamAV submission with new
information.

> from http://www.linemovie.com/link/user2/update/winmsg2k_1.exe
> It may also attempt to get the same file from
> http://www.linkno1.com/link/update/winmsg2k_1.exe
> I tried to get this file from both servers, but it was not there.

Poking around a bit at www.linemovie.com and looking at the source for the
index page (retrieved via wget and viewed with vi), let me to
http://www.abcroot.com/line/user1/update/winmsg2k_1.exe , which also seems
to have a full copy of whatever this thing is.  (Although the winmsg2k*.exe
files retrieved from both sites are different. Possibly just a difference
between the 'user1' and 'user2'.)

> As I said, I only used 'strings' so although the info here is 
> correct, some
> of my conclusions may not be. I would however suggest you check your
> registry and do a search for the mentioned files including 
> winmsg2k_1.exe.

Patrick, thanks again for doing all that you have.  I'm pretty sure my
system is safe, since I've only been looking at this stuff from my linux
mail gateway. :)  I am however concerned about any folks in my network that
may have allowed the original email to get their machine infected because
they don't make use of the spamassassin tags (which has been tagging the
email as spam all along), and also have the preview pane enabled.

Doing a google search on the clsid 65431623-C69F-410E-A392-6360366CAC19
leads me to believe that this virus/worm/whatever has been out there since
the end of March-- there are google usenet hits for Mar 31, 2004 .

For anybody else who is inclined to take a look at this as well--
www.linemovie.com seems to be some kind of central distribution point for
desktops that are trying to infect themselves. On a hunch, I ran wget
against several similar urls, and each url hands out different (but similar)
files. 

http://www.linemovie.com/line/user1/msxml20.cab
http://www.linemovie.com/line/user3/msxml20.cab
http://www.linemovie.com/line/user4/msxml20.cab
http://www.linemovie.com/line/user5/msxml20.cab
http://www.linemovie.com/line/user6/msxml20.cab
http://www.linemovie.com/link/user6/msxml20.cab

-ron

I am now more than ever very interested in putting web proxies in front of
all internet connections, and having clamav w/mod_proxy scan all incoming
web content-- at least this way when I recognize a risk faster than the
commercial scanners do I can create my own signatures.








-------------------------------------------------------
This SF.Net email is sponsored by: Oracle 10g
Get certified on the hottest thing ever to hit the market... Oracle 10g. 
Take an Oracle 10g class now, and we'll give you the exam FREE.
http://ads.osdn.com/?ad_id=3149&alloc_id=8166&op=click
_______________________________________________
Clamav-users mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/clamav-users

Reply via email to