V
Virus Guy
I performed a some-what rare total scan (using NAV 2002) on my Win-98
system today and NAV quarantined a couple of .hlp files that were
located in one of those wierd IE cache directories.
Their names were:
search1[1].hlp (15,674 bytes)
search[1].hlp (18,578 bytes)
(yes, the square brackets were in the file name).
Seems I picked those up on March 12, 2005.
NAV calls it "BloodHound.Exploit.22". I submitted it to Kaspersky and
it came back as suspicious.
I submitted the first one to Virus Total and here are the results:
This is a report processed by VirusTotal on 07/05/2005 at 06:40:55
(CET) after scanning the file "search_1_.hlp" file.
------------------------
Antivirus Version Update Result
AntiVir 6.31.0.7 07.04.2005 no virus found
AVG 718 07.04.2005 no virus found
Avira 6.31.0.7 07.04.2005 no virus found
BitDefender 7.0 07.05.2005 no virus found
ClamAV devel-20050501 07.05.2005 no virus found
DrWeb 4.32b 07.04.2005 no virus found
eTrust-Iris 7.1.194.0 07.04.2005 no virus found
eTrust-Vet 11.9.1.0 07.04.2005 no virus found
Fortinet 2.36.0.0 07.04.2005 HLP/CVE_2004_1361-exploit
Ikarus 2.32 07.04.2005 no virus found
Kaspersky 4.0.2.24 07.05.2005 Exploit.WinHLP.CVE-2004-1361
McAfee 4527 07.04.2005 Exploit-Winhlp
NOD32v2 1.1161 07.04.2005 no virus found
Norman 5.70.10 06.30.2005 no virus found
Panda 8.02.00 07.04.2005 no virus found
Sybari 7.5.1314 07.05.2005 no virus found
Symantec 8.0 07.04.2005 Bloodhound.Exploit.22
TheHacker 5.8.2.065 07.04.2005 no virus found
VBA32 3.10.4 07.04.2005 no virus found
------------------------
I submitted it also directly to McAfee and here's the result:
-------------------------
AVERT Labs - Beaverton
Current Scan Engine Version:4.4.00
Current DAT Version:4527
Thank you for your submission.
Name Findings Detection Type Extra
search[1].hlp current detection exploit-winhlp Trojan no
current detection [ search[1].hlp ]
The file received is infected and can be detected and removed with our
current DAT files and engine. It is recommended that you update your
DAT and engine files and scan your computer again. If you are not
seeing this with the product you are using, please speak with
technical support so that they can help you determine the cause of
this discrepancy.
If you use the McAfee VirusScan Online or VirusScan Retail retail
products, and do not have the Dat File Version specified, please send
an e-mail to (e-mail address removed) to request an extra.dat for your
product. You must include the Analysis ID number found in the subject
line of this message to receive the extra.dat file.
-------------------------
I'm not sure what I need to do to "remove" these files other than
delete them (I don't believe I've run them).
A search of my hard drive for any files created / modified on the same
date (and same approximate time) as the above .hlp files shows the
following:
1[2].htm
1[3].htm
1[4].htm
1[5].htm
(something)@indextools[2].txt
(something)@help[1].txt
(something)@windowsforumz[1].txt
Here is the contents of 1[5].htm (the others are similar):
--------------------
<html>
<head>
<meta http-equiv="refresh" content="3000; url=1.htm">
</head>
<body>
<script language="javascript">
//img = new Array();
//for (i=0;i<100;i++)
//{
// img = new Image();
// img.src="loadimage.ICO";
//}
</script>
<iframe name=f1></iframe>
<iframe name=f2></iframe>
<iframe name=f3></iframe>
<iframe name=f4></iframe>
<iframe name=f5></iframe>
</body>
</html>
--------------------
The .htm files are time-stamped 1 minute after the suspect .hlp
files. The cookie files are a few minutes before.
Here is the contents of the @help[1].txt file:
--------------------
bblastvisit (some 9 digit number) www.d-a-l.com/help/ (more numbers)
bblastactivity (more numbers) www.d-a-l.com/help/ (more numbers)
-------------------
I suspect that I picked up these files from the web site
http://www.d-a-l.com/.
There is evidence that something strange is going on there:
http://groups.google.ca/group/micro...www.d-a-l.com/"&rnum=5&hl=en#dff790dbc107a51e
Anyways, you guys might want to scan your IE cache files for these
questionable .HLP files...
If anyone want me to post (or e-mail) these files to you, let me
know. I think there is a .virus source-code news group I could post
these in. I had a quick look at them in a text editor and there's a
few readable items but it's mostly binary junk.
system today and NAV quarantined a couple of .hlp files that were
located in one of those wierd IE cache directories.
Their names were:
search1[1].hlp (15,674 bytes)
search[1].hlp (18,578 bytes)
(yes, the square brackets were in the file name).
Seems I picked those up on March 12, 2005.
NAV calls it "BloodHound.Exploit.22". I submitted it to Kaspersky and
it came back as suspicious.
I submitted the first one to Virus Total and here are the results:
This is a report processed by VirusTotal on 07/05/2005 at 06:40:55
(CET) after scanning the file "search_1_.hlp" file.
------------------------
Antivirus Version Update Result
AntiVir 6.31.0.7 07.04.2005 no virus found
AVG 718 07.04.2005 no virus found
Avira 6.31.0.7 07.04.2005 no virus found
BitDefender 7.0 07.05.2005 no virus found
ClamAV devel-20050501 07.05.2005 no virus found
DrWeb 4.32b 07.04.2005 no virus found
eTrust-Iris 7.1.194.0 07.04.2005 no virus found
eTrust-Vet 11.9.1.0 07.04.2005 no virus found
Fortinet 2.36.0.0 07.04.2005 HLP/CVE_2004_1361-exploit
Ikarus 2.32 07.04.2005 no virus found
Kaspersky 4.0.2.24 07.05.2005 Exploit.WinHLP.CVE-2004-1361
McAfee 4527 07.04.2005 Exploit-Winhlp
NOD32v2 1.1161 07.04.2005 no virus found
Norman 5.70.10 06.30.2005 no virus found
Panda 8.02.00 07.04.2005 no virus found
Sybari 7.5.1314 07.05.2005 no virus found
Symantec 8.0 07.04.2005 Bloodhound.Exploit.22
TheHacker 5.8.2.065 07.04.2005 no virus found
VBA32 3.10.4 07.04.2005 no virus found
------------------------
I submitted it also directly to McAfee and here's the result:
-------------------------
AVERT Labs - Beaverton
Current Scan Engine Version:4.4.00
Current DAT Version:4527
Thank you for your submission.
Name Findings Detection Type Extra
search[1].hlp current detection exploit-winhlp Trojan no
current detection [ search[1].hlp ]
The file received is infected and can be detected and removed with our
current DAT files and engine. It is recommended that you update your
DAT and engine files and scan your computer again. If you are not
seeing this with the product you are using, please speak with
technical support so that they can help you determine the cause of
this discrepancy.
If you use the McAfee VirusScan Online or VirusScan Retail retail
products, and do not have the Dat File Version specified, please send
an e-mail to (e-mail address removed) to request an extra.dat for your
product. You must include the Analysis ID number found in the subject
line of this message to receive the extra.dat file.
-------------------------
I'm not sure what I need to do to "remove" these files other than
delete them (I don't believe I've run them).
A search of my hard drive for any files created / modified on the same
date (and same approximate time) as the above .hlp files shows the
following:
1[2].htm
1[3].htm
1[4].htm
1[5].htm
(something)@indextools[2].txt
(something)@help[1].txt
(something)@windowsforumz[1].txt
Here is the contents of 1[5].htm (the others are similar):
--------------------
<html>
<head>
<meta http-equiv="refresh" content="3000; url=1.htm">
</head>
<body>
<script language="javascript">
//img = new Array();
//for (i=0;i<100;i++)
//{
// img = new Image();
// img.src="loadimage.ICO";
//}
</script>
<iframe name=f1></iframe>
<iframe name=f2></iframe>
<iframe name=f3></iframe>
<iframe name=f4></iframe>
<iframe name=f5></iframe>
</body>
</html>
--------------------
The .htm files are time-stamped 1 minute after the suspect .hlp
files. The cookie files are a few minutes before.
Here is the contents of the @help[1].txt file:
--------------------
bblastvisit (some 9 digit number) www.d-a-l.com/help/ (more numbers)
bblastactivity (more numbers) www.d-a-l.com/help/ (more numbers)
-------------------
I suspect that I picked up these files from the web site
http://www.d-a-l.com/.
There is evidence that something strange is going on there:
http://groups.google.ca/group/micro...www.d-a-l.com/"&rnum=5&hl=en#dff790dbc107a51e
Anyways, you guys might want to scan your IE cache files for these
questionable .HLP files...
If anyone want me to post (or e-mail) these files to you, let me
know. I think there is a .virus source-code news group I could post
these in. I had a quick look at them in a text editor and there's a
few readable items but it's mostly binary junk.