 
Bugtraq mailing list archives
Spam with trojan horse installed
From: amohammed () CARIB-LINK NET (Ansar Mohammed)
Date: Fri, 26 Feb 1999 09:30:04 -0500
This is a multi-part message in MIME format.
------=_NextPart_000_002B_01BE616A.9797FAE0
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Some idiot sent out the following e-mail a couple days ago:
Goodmorning.
02/23/99
We at mail.yahoo.com are pleased to release this cute little game which =
promises to captive and mesmerize you for hours on end.
Lots of dedication went into the production of this compact little PC =
entertainer. Simply download the file "Yahoo.exe", double-click and let =
the fun begin.
Brandon.
Assistant Director Yahoo Inc.
_________________________________________________________
DO YOU YAHOO!?
Get your free @yahoo.com address at http://mail.yahoo.com
// Yahoo.exe is actually the netbus 2.0 server designed to install =
without the user knowing anything.
// The following registry entries were embeded within the exe.
REGEDIT4
[HKEY_CLASSES_ROOT\.dl_]
@=3D"exefile"
"Content Type"=3D"application/x-msdownload"
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
"Rundll32"=3D"rundll2.dl_"
[HKEY_LOCAL_MACHINE\Software\Net Solutions]
[HKEY_LOCAL_MACHINE\Software\Net Solutions\NetBus Server]
[HKEY_LOCAL_MACHINE\Software\Net Solutions\NetBus Server\General]
"Accept"=3D"1"
"TCPPort"=3D"20043"
"Visibility"=3D"3"
"AccessMode"=3D"2"
[HKEY_LOCAL_MACHINE\Software\Net Solutions\NetBus Server\Protection]
"Password"=3D"$\".-("
------=_NextPart_000_002B_01BE616A.9797FAE0
Content-Type: text/html;
        charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
<!DOCTYPE HTML PUBLIC "-//W3C//DTD W3 HTML//EN">
<HTML>
<HEAD>
<META content=3Dtext/html;charset=3Diso-8859-1 =
http-equiv=3DContent-Type>
<META content=3D'"MSHTML 4.71.2016.0"' name=3DGENERATOR>
</HEAD>
<BODY bgColor=3D#ffffff>
<DIV><FONT size=3D2>Some idiot sent out the following e-mail a couple =
days=20
ago:</FONT></DIV>
<DIV><FONT size=3D2></FONT> </DIV>
<DIV><FONT size=3D2>Goodmorning.<BR>02/23/99<BR><BR><BR>We at =
mail.yahoo.com are=20
pleased to release this cute little game which promises to captive and =
mesmerize=20
you for hours on end.<BR><BR>Lots of dedication went into the production =
of this=20
compact little PC entertainer. Simply download the file =
"Yahoo.exe",=20
double-click and let the fun begin.<BR><BR><BR>Brandon.<BR>Assistant =
Director=20
Yahoo =
Inc.<BR>_________________________________________________________<BR>DO=20
YOU YAHOO!?<BR>Get your free @yahoo.com address at <A=20
href=3D"http://mail.yahoo.com">http://mail.yahoo.com</A></FONT></DIV>
<DIV><FONT size=3D2></FONT> </DIV>
<DIV><FONT size=3D2></FONT> </DIV>
<DIV><FONT size=3D2></FONT> </DIV>
<DIV><FONT size=3D2>// Yahoo.exe is actually the netbus 2.0 server =
designed to=20
install without the user knowing anything.</FONT> </DIV>
<DIV><FONT size=3D2>// The following registry entries were embeded =
within the=20
exe.</FONT></DIV>
<DIV><FONT size=3D2></FONT> </DIV>
<DIV><FONT size=3D2><FONT face=3DTerminal size=3D1>
REGEDIT4</P>
[HKEY_CLASSES_ROOT\.dl_]</P>
@=3D"exefile"</P>
"Content Type"=3D"application/x-msdownload"</P>
[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]</P>=
"Rundll32"=3D"rundll2.dl_"</P>
 </P>
[HKEY_LOCAL_MACHINE\Software\Net Solutions]</P>
[HKEY_LOCAL_MACHINE\Software\Net Solutions\NetBus Server]</P>
[HKEY_LOCAL_MACHINE\Software\Net Solutions\NetBus Server\General]</P>
"Accept"=3D"1"</P>
"TCPPort"=3D"20043"</P>
"Visibility"=3D"3"</P>
"AccessMode"=3D"2"</P>
[HKEY_LOCAL_MACHINE\Software\Net Solutions\NetBus =
Server\Protection]</P>
"Password"=3D"$\".-("</P>
 </P>
 </P></FONT></FONT></DIV></BODY></HTML>
------=_NextPart_000_002B_01BE616A.9797FAE0--
Current thread:
- Spam with trojan horse installed Ansar Mohammed (Feb 26)


