BAT.Chode Worm

Foreskin

W95/Firkin.worm

 

Using a network connection to internet ??

Read this

 

BAT.Chode.Worm
Detected as:        BAT.Chode  Worm
Aliases:               Chode, Foreskin, BAT911
Infection Length:  Multiple batch files
Area of Infection: Shared drive
Trigger Dates:     19th of the month
Characteristics:    Batch file worm

Description
BAT.Chode.Worm is an internet-worm that uses BAT files. It searches through a range of IP addresses of known ISPs to find an accessible computer. If an accessible computer has its C drive shared, it will copy its files into the other computer.

Technical description
BAT.Chode.
Worm uses multiple BAT files, with an accompanying VBScript (.VBS),  and some system programs to spread itself through an internet connection. It searches through a range of IP addresses of known ISPs to find an accessible computer.
If an accessible computer has a shared drive that is not password protected, the worm checks for the presence of the file C:\WINDOWS\WIN.COM.
If such file presents, it assumes the shared drive is the C drive of the other computer.
It will then copy its files into the other computer's C:\PROGRA~1\CHODE directory.

It creates subdirectories called
C:\progra~1\chode,
C:\progra~1\foreskin
and C:\progra~1\dickhair.

Note that these subdirectories are created with the "hidden" attribute, so if you want to see if they exist on your system you must configure the "Find" command to show hidden directories.
Under the Windows Explorer menu choose View/Options and make sure "Show All Files" is selected.

The main batch file assumes it is running from C:\PROGRA~1\CHODE directory. When launched, it searches for an accessible subnet on several ISPs:

Note: Connecting to one of these ISPs does not make your computer vulnerable to this worm. Your computer is vulnerable to this worm (and other intrusions) if your computer's shared resources are not properly protected. This worm can only spread to a computer that has a shared drive without password protection for write-access.

It attempts to access computers within the subnets of various IP addresses.  Once the worm finds an accessible subnet, it will search for an accessible shared drive. If there is no accessible shared drive in the subnet, it will repeat the subnet search above.

Once the worm finds an accessible shared drive, it will do a quick test to see if the drive is the C drive. If it is the C drive, it will map the shared drive.
After mapping the drive, it makes sure that it hasn't infected this mapped drive. While performing the check, it also searches and removes VBS.Network, a worm that uses VBS script. Then, it verifies the writability of the drive, and proceeds to copy its files to the other computer.

While copying its files to the other computer, it adds the following:

The worm also uses a freeware utility to hide its activity. The freeware utility is a win32 program that the worm names ASHIELD.EXE. NAV will not detect this utility.

Payload

The WINSOCK.VBS is lauched when Windows starts on an infected computer.
On the 19th of the month, this VBS script deletes all files from the following directories:

Then, it displays two message boxes:

Repair Notes

Write-up by: Raul K. Elnitiarta and info at SOPHOS and McAfee
Updated: April 1, 2000   No joke

Personal I think you can remove this better with a virus scanner.

More information at McAfee

 

Download this full trial version from AVP (Anti Virus Protection), see at Trial Versions
Anti Virus Experts: Your First, Last, and Only Line of Defense

Anti Virus Experts, AVX 2000 Professional Evaluation, FULLY FUNCTIONAL for 30 days


You're not alone.


  mailto  Michel Beyens

W32.CIH.Spacefiller | BAT.Chode worm
Internet Explorer | email | Backdoors | PC | Macro Warning | Virus Warning

HomePage | Overview Pages
Calpe-Spain | Entertainment | Favorite | Hockey | Reefaquarium | Virus

Sign My Guestbook Go to GuestWorld Lycos View My Guestbook