The Chip Board
Custom Search
   


The Chip Board Archive 07

Wayne Murphy Virus Help

For future Ref. all I did was go to Google and searched for bvt.exe and this popped up. I also checked my computers and these files do not exist in the systems. In other words, just delete them, they are part of the trojan.

-=-=-

Virus Name Downloader-W

Risk Assessment Low

Virus Information

Discovery Date:

04/09/2002

Origin:

Unknown

Length:

Varies

Type:

Trojan

SubType:

Win32

Minimum Dat:

4198

Minimum Engine:

4.1.50

DAT Release Date:

04/24/2002

Description Added:

04/19/2002

Description Modified:

04/30/2002 4:38 PM (PT)

Description Menu

Virus Characteristics

Symptoms

Method Of Infection

Removal Instructions

Variants / Aliases

Rate this page

Print This Page

Virus Characteristics

A JavaScript was recently found on a two webpages (on koolkatalog.com and online1net.com), which

exploits the Microsoft VM ActiveX Component" Vulnerability. The script modifies the Internet Explorer

security settings to automatically install all ActiveX Controls. As a result, an ActiveX Control gets

installed, which downloads other trojan components. This ActiveX Control can be found in the

%WinDir%\Downloaded Program Files folder as IO Class. Checking the properties of this file will

show a CodeBase reference to ONLINE1NET.COM.

There are several components to this trojan:

MNSVC.EXE (20,480 bytes) - This is the part that downloads AUSVC.EXE from

http://www.wwws1.com/. It contains the text: "MinStaller Mutex"

AUSVC.EXE (57,344 bytes) - This downloads the rest of the trojan. It contains the text:

"Autoupdater Mutex"

BVT.EXE (114,760 bytes) - This is an Internet Explorer Browser Plugin. It contains the text

"BrowserEvt"

ABSR.EXE (118,858 bytes) - This is another IE Plugin. It contains the text "AutoBrowser"

AUUPG.EXE (69,632 bytes) - This appears similiar to AUSVC.EXE, but it doesn't have the

same text.

COOLSTUFF.OCX (65,653 bytes) - This ActiveX Control makes referrence to several

commerical firewall programs, as well as the other trojan components. It works inconjunction

with setup information type files, which reside on a webserver, to download and install trojan

components.

EA.BIN (366,438 bytes) - File contains numbers. It's currently unclear what the purpose of this

file is.

MBTCD.BAK (8,884 bytes) - File contains encrypted data. It's currently unclear what the

purpose of this file is.

Msvcp60.dll (401,462 bytes) - This is not a trojan file, but rather a Microsoft C++ Runtime

Library used by other trojan components. This .DLL is typically found in the SYSTEM directory

on non-infected systems. A second copy may be found in the WINDOWS directory on infected

systems.

UNDO.BAT (49 bytes) - This file simply calls %TEMP%\undo.exe and then deletes the

UNDO.EXE file.

UNDO.EXE (57,405 bytes) - An uninstaller to remove the trojan.

Top of Page

Symptoms

- Presence of the files mentioned above.

- Presence of registry run keys which point to these files:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

- Some users also report that this trojan causes crashes.

Top of Page

Method Of Infection

This trojan gets installed when visiting a hosting website. Currently http://www.koolkatalog.com and

http://www.online1net.com, contains malicous javascript code which installs MNSVC.EXE, as well as

the COOLSTUFF.OCX ActiveXControl.

Trojan components are downloaded to the temp directory as FF0*.tmp is compressed form. The files

are then extracted to the WINDOWS directory.

Top of Page

Removal Instructions

All Windows Users:

Use current engine and DAT files for detection and removal.

Manual Removal Instructions

Go to the directory: %WinDir%\Downloaded Program Files

Right-click on IO Class and choose REMOVE

Delete any registry keys that reference the files mentioned in the characteristics section of this

description

Restart the computer

Delete the files mentioned in the characteristics section of this description


Copyright 2022 David Spragg