Welcome To P8ntballer.com
The Home Of European Paintball
Sign Up & Join In

bloody virus AGAIN - computer help needed

jahlad

Emortal
Feb 11, 2002
3,980
57
83
47
Planet, 0161
sorry guys but my computer has a virus again so if anyone gets any attachments from me then dont open em!!!!

my virus scanner says its called w32.miMail.j@mm

ok so i know what it is but its infected 2 files on my computer that a) i dont know what they are or do
and b) cant seem to repair

can anyone help
the files are
ee98af.tmp
and
svchost32.exe

the 2nd one has been popping up error messages on and off for a couple of weeks!
computer SEEMS to be ok now ive quarantained em BUT i dunno how important these files are, do i need to repair them or can i just delete?

sorry mods not exactly paintball but last time i had a virus half the users on here got it via my email :(:mad:
 

Collier

Arsed?
Jan 2, 2002
6,193
28
123
Macclesfield
Visit site
Originally posted by jahlad
sorry guys but my computer has a virus again so if anyone gets any attachments from me then dont open em!!!!

my virus scanner says its called w32.miMail.j@mm

ok so i know what it is but its infected 2 files on my computer that a) i dont know what they are or do
and b) cant seem to repair

can anyone help
the files are
ee98af.tmp
and
svchost32.exe

the 2nd one has been popping up error messages on and off for a couple of weeks!
computer SEEMS to be ok now ive quarantained em BUT i dunno how important these files are, do i need to repair them or can i just delete?

sorry mods not exactly paintball but last time i had a virus half the users on here got it via my email :(:mad:

You not got any virus protection?
So go on, what attachment did you open??? :D

Paul
:)
 

jahlad

Emortal
Feb 11, 2002
3,980
57
83
47
Planet, 0161
ive got norton internet security 2k1 but i didnt pay the subscription for 6 months so my virus definitions were shot to hell....ive done it today and thats what the scan turned up.

not sure what ive opened....although i do know my better half has discovered in the last day or so that if you turn the firewall off that msn messenger works!
 

Cro

Permanently semi
Jan 2, 2003
626
2
53
51
Naaaarich
www.walkonzone.com
Dunno what the first one is m8 but don't delete the second one it's a windows thing (I think it is something to do with connecting to the internet).

Try going to www.symantec.com (think thats the correct address) and look at their fixes, they will more than likely have one on there for you. I downloaded all off them once to check my machine for everything, took ages but was worth while, I just get the new ones from time to time to make sure I'm clean.

Hope this helps, I am in no way a computer expert.

Cro
 

Pinchaaay

New Member
Jan 29, 2003
704
0
0
Yo' momas crease
www.alfa145.com
To remove the W32/Mimail.I worm:

Press Ctrl+Alt+Del to terminate the process svchost32.exe.
Delete svchost32.exe and any temporary (.tmp) files from your Windows folder.
Delete the files ppinfo.sys, pp.gif and pp.hta from the root folder.
Using the Registry Editor, expand HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run, and delete the svchost32 entry.
Run your virus scanner to ensure that the worm files are removed from the system.


Other names for W32/Mimail.I: W32/Paylap@mm,Worm_Mimail.I, I-Worm.Mimail.I

Similar viruses (variants): W32/Mimail.J


"Pinchaaay!"
 

Pinchaaay

New Member
Jan 29, 2003
704
0
0
Yo' momas crease
www.alfa145.com
W32/Mimail.i@MM Classed as a "Medium Risk" virus/worm. what ya wanna call it!


Overview

This new variant of W32/Mimail.gen@MM attempts to steal credit card information by displaying a fake PayPal message as shown below. The user's information is stored in a file named ppinfo.sys , which is sent to four email addresses, hard-coded in the worm. (Access to these mailboxes is in the process of being blocked).

The worm constructs email messages using its own SMTP engine. As with previous variants, the mailing routine queries the mail server for the domain related to the target (harvested) address. This is determined via an MX lookup on the target domain. Messages are then sent through that SMTP server.

This worm is received in an email message as follows:

From: "PayPal.com" donotreply@paypal.com
Subject: YOUR PAYPAL.COM ACCOUNT EXPIRES

Dear PayPal member,

PayPal would like to inform you about some important information regarding your PayPal account. This account, which is associated with the email address will be expiring within five business days. We apologize for any inconvenience that this may cause, but this is occurring because all of our customers are required to update their account settings with their personal information. We are taking these actions because we are implementing a new security policy on our website to insure everyone's absolute privacy. To avoid any interruption in PayPal services then you will need to run the application that we have sent with this email (see attachment) and follow the instructions. Please do not send your personal information through email, as it will not be as secure. IMPORTANT! If you do not update your information with our secure application within the next five business days then we will be forced to deactivate your account and you will not be able to use your PayPal account any longer. It is strongly recommended that you take a few minutes out of your busy day and complete this now. DO NOT REPLY TO THIS MESSAGE VIA EMAIL! This mail is sent by an automated message system and the reply will not be received. Thank you for using PayPal

Attachment (one of the following):
www.paypal.com.scr
paypal.asp.scr (may be seen via seeding of the worm)




Mail Propagation

The worm emails itself to addresses found on the infected computer. Target email addresses are harvested from files on the victim's machine. The worm ignores address extraction from files that contain the following extensions:
avi
bmp
cab
com
dll
exe
gif
jpg
mp3
mpg
ocx
pdf
psd
rar
tif
vxd
wav
zip
Target folders are determined by querying the following Registry key:
HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \
Explorer \ Shell Folders
Credit Card Information Stealing
Victim credit card information is collated into C:\PPINFO.SYS. The worm then attempts to send this data to email address hard-coded in its body. The target addresses are all within the following domain:

CENTRUM.CZ

Thus, outgoing DNS queries for this server will be issued from the victim machine.

Symptoms

The following registry key is added to run the virus at startup:
HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \
Run "SvcHost32" = %WinDir%\svchost32.exe
The worm creates the following files:
c:\pp.gif (paypal icon)
c:\pp.hta (graphical interface)
c:\ppinfo.sys (your credit card details)
%WinDir%\ee98af.tmp (copy of the worm)
%WinDir%\el388.tmp (harvested email addresses)
%WinDir%\svchost32.exe (copy of the worm)
%WinDir%\zp3891.tmp
Note: %WinDir% is a variable for the Windows directory name. The worm does not use this exact name. It simply uses the system %WinDir% directory.

The worm checks for an active Internet connection by pinging www.akamai.com.

AAAhhhhhhh.....finished!

Hope this helps dude!

Gives u a bit of useless insight into the virus m8, if nothing else.

"Pinchaaay!"