Virus Profile: VBS/Drogam

Threat Search
Print
   
Virus Profile information details
Risk Assessment: Home Low | Corporate Low
Date Discovered: 11/24/2003
Date Added: 12/18/2003
Origin: Unknown
Length: 2,469 Bytes
Type: Virus
Subtype: VbScript
DAT Required: 4306
Removal Instructions
   
 
 
   

Description

This is a virus detection. Viruses are programs that self-replicate recursively, meaning that infected systems spread the virus to other systems, which then propagate the virus further. While many viruses contain a destructive payload, it's quite common for viruses to do nothing more than spread from one system to another.

Indication of Infection

The above files found and registry changes.

Methods of Infection

Executing the infected script.
   

Virus Characteristics

This threat is detected as VBS/Drogam.  On executing the infected VBScript, the virus will save itself as options.vbs and update.vbs in the windows SYSTEM directory.  The following registry keys will be created:

  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
    CurrentVersion\ Run "GraphicOptions"
    [windows directory]\options.vbs
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
    CurrentVersion\ Run "UpdateSecurity"
    [windows SYSTEM directory]\system32\update.vbs

If the date is 25th September, the following registry key will be added:

  • HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main\Start Page", http://h-a-m.w.xxxx.pl "
  • HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\
    CurrentVersion\ Run\Kernel32", "[windows directory]\kernel32.vbs"

The virus will then perform a Denial Of Service attack on an IP address.  The following message will be displayed :  "Thx for help with DDoS !! :)"
It will copy itself as kernel32.vbs in the windows directory.

If the date is 26th September and the time is not 5pm, the virus will perform an ipconfig /release_all .

   
Use current engine and DAT files for detection and removal.

Using File Filtering with WebShield SMTP for WindowsNT(not applicable for Solaris):
Within the Configuration console select content filtering.
Select Add.
Add a Description for the content filter rule such as VBSBlock.
Select Filter on Attachment File name.
Filter on .vbs
Select OK.

Additional Windows ME/XP removal considerations

AVERT Recommended Updates:

* Office2000 Updates

* scriptlet.typelib/Eyedog vulnerability patch

* Outlook as an email attachment security update

* Exchange 5.5 post SP3 Information Store Patch 5.5.2652.42 - this patch corrects detection issues with GroupShield

For a list of attachments blocked by the Outlook patch and a general FAQ, visit this link.
Additionally, Network Administrators can configure this update using an available tool - visit this link for more information.

   

PC Infected? Get Expert Help

McAfee
Virus Removal Service

Connect to one of our Security Experts by phone. Have your PC fixed remotely - while you watch!

$89.95