My Bitdefender
  • 0 Shopping Cart


Facebook Twitter Google Plus


57344 bytes


  • the following line: shell=explorer.exe load.exe -dontrunold in the system.ini file;

    Removal instructions:

    The BitDefender Virus Analyse Team has releasead a free removal tool for this particular virus.

    Important: You will have to close all applications before running the tool (including the antivirus shields) and to restart the computer afterwards. Additionally you\'ll have to manually delete the infected files located in archives and the infected messages from your mail client.

    The BitDefender AntiNimda tool does the following:


  • it detects all the known Win32.Nimda versions;

  • it deletes the files infected with Win32.Nimda;

  • it kills the process from memory;

  • it repairs the Windows registry.

  • To prevent the virus from replicating itself from infected machines to clean machines, you should try to disinfect all computers in the network before rebooting any of them, or unplug the network cables.

    If you are running Windows 95/98/Me you will have to apply the following patch provided by Microsoft to stop the virus from using the \'Share Level Password\' Vulnerability.

    You may also need to restore the affected files.


    Analyzed By

    Costin Ionescu<br /> BitDefender Virus Researcher

    Technical Description:

    This virus comes through e-mail as an attached file, with the body of the mail apparently empty but which actually contains the code to use the IFRAME exploit which will execute the virus when the user just view the message (if he is using Outlook or Outlook Express without latest Service Packs or patches from Microsoft). Once installed it copies itself in the system directory with the name riched20.dll modifying itself to be loaded as a DLL (Dinamically Link Library). This DLL is used by applications that work with Richedit Text Format such as Wordpad.

    To be activated at every reboot, the virus modifies system.ini in the boot section, writing the following line:
    shell=explorer.exe load.exe -dontrunold

    The virus attaches a thread to explorer.exe to run its viral code.

    To spread it uses MAPI (Mailing API) functions to read user\'s e-mails from where it extracts SMTP (Simple Mail Transfer Protocol) addresses and e-mail addresses.

    Another method to spread is by using the Unicode Web Traversal exploit similar to CodeBlue.

    Using this exploit the virus gets control of the execution flow on that server and download itself under the name admin.dll, then puts a HTML code in the web page hosted by the IIS server to download the virus. To do this it tries to modify the files with the name:
    index, main, default
    and with the extension one of:

    Also the virus enumerates the network resources visible to the infected computer and tries to copy in shared files or folders.

    The virus is able to infect files by attaching the executable as a resource with raw data named f in the virus program. When the infected file is executed the virus takes over the control and executes the original file so the user doesn\'t notice anything. This is accomplished by dropping that f resource in a file with the same name as the original but with a space appended, followed by .exe.

    The virus activates the user guest with no password and add it to the Administrator group. Also it creates a share for every root directory (from C to Z) with all access rights, and disables the proxy by modifying the keys:

    HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\MigrateProxy with the value \"1\"
    HKEY_CURRENT_USER\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ProxyEnable with the value \"0\"
    HKEY_CURRENT_CONFIG\\Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ProxyEnable with the value \"0\"

    Leaving the library riched20.dll not deleted will reactivate the virus when a program using this library is executed.

    As a signature the following text can be found in the file:
    Concept Virus(CV) V.5, Copyright(C)2001 R.P.China