So, I submitted the suspicious attachment I received to virustotal (email@example.com with SCAN in the subject and suspicious file as attachment.) What follows below is the report I received. It looks like some of the big names (Symantec, McAfee are not finding anything wrong with it at this point, with the hodge-podge of names it will take me a bit to investigate and see if the other vendors are tagging it as new.)
Anyway here was my reply from virustotal…
Date: 11/23/2005 17:47:52 (CET)
AntiVir 220.127.116.11/20051123 found [TR/Bagle.EC]
Avast 4.6.695.0/20051123 found [Win32:Beagle-FR]
AVG 718/20051123 found [I-Worm/Bagle]
Avira 18.104.22.168/20051123 found [TR/Bagle.ED]
BitDefender 7.2/20051123 found [Trojan.Downloader.Bagle.F]
CAT-QuickHeal 8.00/20051123 found [(Suspicious) - DNAScan]
ClamAV devel-20051108/20051123 found [Worm.Bagle.Gen-9]
DrWeb 4.33/20051123 found [Win32.HLLM.Beagle.9219]
eTrust-Iris 22.214.171.124/20051123 found nothing
eTrust-Vet 126.96.36.199/20051123 found nothing
Fortinet 188.8.131.52/20051123 found [suspicious]
F-Prot 3.16c/20051123 found [security risk named W32/Mitglieder.GH]
Ikarus 0.2.59.0/20051123 found nothing
Kaspersky 184.108.40.206/20051123 found [Trojan-Downloader.Win32.Bagle.f]
McAfee 4634/20051122 found nothing
NOD32v2 1.1299/20051123 found [Win32/Bagle.DR]
Norman 5.70.10/20051123 found [W32/Bagle.FR@mm]
Panda 8.02.00/20051123 found nothing
Sophos 3.99.0/20051123 found nothing
Symantec 8.0/20051122 found nothing
TheHacker 5.9.1.042/20051122 found nothing
VBA32 3.10.5/20051123 found [suspected of Email-Worm.Bagle.22]
It is worth mentioning that if you have banned .exe’s within zip files it should be banned anyway.
It looks as though this is part of a wave of new bagle’s today. I don’t see anything particularly innovative in it’s way of spreading, the email I got was on the catchall account of a domain I monitor. It was to and from non-existent usernames (abc123 was the sending & receiving username) and the subject was “Alice”, signed Anne with an attachment of Bennet.zip. Not much trickery like we’re seeing with the Sober variant’s “you have visited illegal websites” “please review the charges in the attached file” kind of social engineering.
On the Sober.X (or Sober.Y depending on the AV vendor) front… since this time Monday, one mailserver I monitor for a local small business has filtered ~280+ copies of the Sober.y (or sober.x) virus. (I’m including about 6 that were filtered as banned (exe in a zip) between 2 and 3:30PM Monday when clamav updated to recognize the new bug.) In that same span there have been 2-5 phishing emails, 3 or so bagels… and another couple of banned attachements (again, application within a zip file) that may be some of these new bagel variants before clamav had detection.
As always, if you’ve got a network email setup, you might consider installing server antivirus. (Clamav on a linux server has been VERY effective for me.) I keep a few mail connections unfiltered so if/when there’s an outbreak I can actually get a first hand look at the bugs/submit to online scanners, etc… but that’s just me. The big thing that’s impressed me with clamav is the speed of updates. Most days there’s at least one update, some there are 4-6 depending on conditions. Phishing emails are among those that are detected as well. On the main mail server at the house… I use Amavis-new which handles scanning, then passes off emails to spamassassin, and clamav as necessary. (It also can deal with other virus scanners if you want multiple scans of incoming messages.)
Related PostsRelated Posts
- Clamav 0.88.4 and prior DoS According to incidents.org a denial of service vulnerability has been noted in all versions of clamav prior to 0.88.4 (inclusive). At incidents last report the download for 0.88.4 was back after disappearing for a while which seemed to indicate a fix, however. I wasn't aware 0.88.4 had been released before......
- Disinfecting a PC... part 2 Ok, the last post got a bit long with the hijackthis log, but I wanted to include the whole picture. I put a few comments in, but thought it might be useful to include the notes I took at the time. For starters I leave it unplugged from the network.......
- New Sober virus variant coming This is unusual, but there is advance notice from the Bavarian Police warning about a new variant on the Sober worm which will be released tomorrow. More information can be found at f-secure, as well as sunbeltblog. It appears that the emails may look something like this... Subject: Registration Confirmation......
- Confirmed My 5.1% Zopa CD TwoÂ days I purchased a Zopa CD right after the Federal Reserve cut the fed funds rate 75 basis points.Â I half expected Zopa to renege on the 5.1% that I signed up under, especially since Bank RateÂ not shows that a 5.1% 1 year CD is now the top yielding 1......
- Innumerate? Bring me a beer! This is another classic email making the rounds; If you had purchased $1000.00 of Nortel stock one year ago, it would now be worth $49.00. With Enron, you would have $16.50 left of the original $1000. With WorldCom, you would have less than $5.00 left. If you had purchased $1000.00......
- UF Home Coming against Arkansas The University of Florida Gators are set to go head to head with Arkansas, and the game is going to be aired at 3:30pm on CBS. The Gators football team is going to be going up against Arkansas on Saturday, October the 17. The game is going to be televised......
- Another Massive ID theft ring
- New Sober virus variant coming
- Another beagle virus variant
- FBI / CIA virus