Skip Over Navigation Links
Center for Information TechnologyAntivirus
Antivirus Home Page
Contact Us
Questions or Comments
Disclaimers

Software
Current client downloads:
 VScan Engine/Dat (SuperDat) -4.3.20/4.0.4399
 VirusScan Enterprise 8.0i - Windows NT/2000/XP/2003
 VirusScan Enterprise 7.1 - Windows NT/2000/XP/2003
 Version 4.5.1 (install Service Pack 1) - Windows 9x/ME
 Virex (OS X) Engine/Def - 7.2(v1.1)/041013
 Virex (OS 9.x) Engine/Def - 6.2/041001
 Linux & Solaris Engine/Dat - 4.3.20/4.0.4399
 Symantec Antivirus - 9.0
 Ad-aware - 6.0
 Clean Boot 1.0
 Stinger v2.4.0 virus removal tool (Updated 9/28/04, 3:22am)
 Microsoft Patch Library
Current server downloads:
 VirusScan Enterprise 7.1
 NetShield NetWare - 4.6.2
 NetShield NetWare Engine Update - 4.3.20
 ePO agent for NetWare
 Sybari Antigen - 528/966
 TrendMicro - 6.810/200
 ScanMail eManager - 3.0
 Microsoft Patch Library

Information
 Configuration Tips
 VirusScan FAQs
 Ad-aware FAQs
 Central EMail Status
 VirusScan Instructions
 Additional Resources
 ePO 3.0/VirusScan 7.0 Presentation

Archives
 List of Viruses

Virus Archives

W32/Aplore@MM Last Updated 4/10/02 4:06pm

A new email worm W32/Aplore@MM has been detected in the wild. This worm also spreads via Internet Relay Chat (IRC) and AOL Instant Messenger (AIM).

The email version of the worm arrives as follows:

The subject of the email is:
.

(note: The subject is a period only)

The message body is:
.

(note: The body is a period only)

The attachment is:
psecure20x-cgi-install.version6.01.bin.hx.com

The IRC/AIM version of the worm arrives as message with a hyperlink to the infected client's machine.

The IRC message appears as the following:

FREE PORN: http://free:porn@(infected system's IP address):8180

The AIM message appears as one of the following variations:

  • btw, download this, (infected system's IP address):8180
  • I wanted to show you this, (infected system's IP address):8180
  • please check out, (infected system's IP address):8180
  • hey go to, (infected system's IP address):8180
  • see if you can get this to work, (infected system's IP address):8180
  • this is cool, (infected system's IP address):8180
  • tell me what you think about, (infected system's IP address):8180
  • try this, (infected system's IP address):8180
  • I almost forgot about, (infected system's IP address):8180
  • I like this, (infected system's IP address):8180
  • what about, (infected system's IP address):8180
  • have you seen, (infected system's IP address):8180
  • interestin, (infected system's IP address):8180
  • lol, (infected system's IP address):8180
  • wow, (infected system's IP address):8180
  • whoa, (infected system's IP address):8180
  • neat, (infected system's IP address):8180
  • cool, (infected system's IP address):8180
  • hmm, (infected system's IP address):8180
  • psst, (infected system's IP address):8180
  • hehe, (infected system's IP address):8180
  • haha, (infected system's IP address):8180
  • silly, (infected system's IP address):8180
  • weird, (infected system's IP address):8180

When the attachment is executed the worm sends itself out to everyone in the infected client's address book. The worm creates a registry entry to load itself at startup.

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Explorer=C:\WINDOWS\SYSTEM\EXPLORER.EXE

The worm saves a copy of itself to the windows system directory as explorer.exe

The worm also attempts to connect to IRC.DAL.NET and send itself to everyone who connects to the channel. The worm also ties itself to the AIM client if it is installed. When the AIM client connects to the AIM service it will attempt to send one of the above messages to everyone in the client's buddy list.

If the hyperlink is clicked the link will connect to the infected machine on port 8180. A web page will be displayed:

    Browser Plugin Required:


    You may need to restart your browser for changes to take affect.
    Security Certificate by Verisign 2002.
    MD5: 9DD756AC-80E057FC-E00703A2-F801F2E3

    Click HERE and choose "Run" to install.

Also a prompt will appear asking to "Run the file from its current location", or "Save this program to disk".

NAI has released DAT 4196which will detect and remove this worm.

For more information see http://vil.nai.com/vil/content/v_99437.htm from NAI regarding W32/Aplore@MM

Do Not Open The Attachment!

This archive is not intended to be comprehensive. For a more complete virus library, please visit NAI's Virus Information Library at http://vil.nai.com.

Contact TASC for assistance or call
301.59.Go.CIT (V) 301.496.8294 (TDD)

National Institutes of HealthCenter for Information Technology
National Institutes of Health
Bethesda, Maryland 20892

Questions or Comments | Disclaimers

Department of Health and Human ServicesHealth and Human Services
Washington, D.C. 20201
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -