Heads Up: sexy_bedroom.pif
Results 1 to 4 of 4

Thread: Heads Up: sexy_bedroom.pif

  1. #1
    Senior Member
    Join Date
    Jul 2003
    Posts
    813

    Heads Up: sexy_bedroom.pif

    Well the title is as much as I know about this piece of malware, this and the fact that it auto-sends itself to everybody in the infected user's MSN contact list.

    My girlfriend noticed this behaviour when her MSN Plus! asked her repeatedly if she would like to zip the file to be sent [a feature of the plug-in]. The file was in the process list and could only be deleted after a boot in safe mode [so as to not get loaded again].

    HouseCall and Symantec online AV scans did not report anything after this deletion, so I'd assume deleting the file was enough [no registry key or anything of the sort]. However either because of the scanners' limitations [not checking .pif files or not checking certain folders] the file was not detected inside the Recycle Bin either [although it was still present when the AV scans were run].

    Somebody else on my contact list had gotten the same thing since I had a request for a file transfer when I got home, but the person wasn't online so I couldn't inquire further.

    When she got infected, my S.O. said the file was called love_me.pif, which makes me think it is possible for the virus to randomly change its name from a list. The transfer request I had received had the same filename as the title - sexy_bedroom.pif.

    I forgot to ask whether she was running her AV at the time but I think not [and since the file requires user interaction to infect the computer it would not be detected by anything less than an active AV].

    I assume people would be duped into opening the file because .pif is an old extension from DOS IIRC and its close resemblance to .pic could trick many into opening it.

    Symantec has no entry about this, neither does Google at large return anything.

    Anybody know anything more about this? Is it truly a virus or some other kind of malware? I believe I could still get a copy of it and PM it to *some* people that would require it for analysis, however I'd rather not go into that kind of a situation...

    So this is both a Heads Up and a Request for Comments[:P]/Info... stay alert!
    /\\

  2. #2
    Senior Member IKnowNot's Avatar
    Join Date
    Jan 2003
    Posts
    792
    Maybe this WORM_BROPIA.A

    Lucky you, you got it first!
    " And maddest of all, to see life as it is and not as it should be" --Miguel Cervantes

  3. #3
    Banned
    Join Date
    Apr 2003
    Posts
    1,147
    Symantec posted information about the W32.Bropia late yesterday and had updates to handle it shortly after. It is a two stager that uses MSN Messenger to spread, and drops a new variant of the W32.Spybot worm. Since MSN Messenger allows active content (ads), it is no surprise that that vector would be used.

    Since we are moving to the new Windows Messenger 5.1 (which is not vulnerable) to work with out LiveComm Server, we're removing MSN Messenger. I got the updates out, I hope, before anyone in our organization got caught with this today.

    You can uninstall MSN Messenger and then download and install Windows Messenger 5.1 without losing any of your contacts. Just to be safe, though, do an export just before doing this.

  4. #4
    Senior Member
    Join Date
    Jul 2003
    Posts
    813
    Originally posted here by IKnowNot
    Lucky you, you got it first!
    Well luckily, I'm part of the Free World

    I've seen more or less of a rapid spread of this piece of malware, however AV companies quickly came out with fixes and whatnot.
    /\\

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •