dalfriendnew.jpg (26257 bytes)
     [Home] [History] [Msg Board] [Photo Album] [Irc-Help] [Tips] [Internet Survival]    
[FFALP] [Rules] [Info] [Mp3] [Links] [Downloads] [Guestbook] [Contact] [About]

Welcome to the #DalFriends Web Site!

home

history

msgboard.gif (3921 bytes)

photo album

IRC-Help

tips.gif (3836 bytes)

Internet_survival.gif (4027 bytes)

rules.gif (3869 bytes)

info.gif (3837 bytes)

Mp3

links

downloads.gif (4002 bytes)

guestbook.gif (3987 bytes)

Contact

About

 


PrettyPark


The PrettyPark virus includes an attachment called "PrettyPark.EXE" that transfers the victim to a chat room without their knowledge. Once in the
chat room, the virus appears to make data from the victim's computer
available to the virus writer or distributor. The kinds of data made
available, according to ZDNet, include address book lists, system
preferences, registration numbers, passwords, and stored autofill form
information which could include credit card information.

PrettyPark spreads in a manner similar to the Melissa virus. It accesses the victim's electronic mail address book and tries to send itself to all of the listed addresses every 30 minutes.

-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*

I-Worm.PrettyPark (info taken from AVP)

This is a worm virus spreading via Internet. It appears as a PrettyPark utility attached to email. Being executed it installs itself into the system, then sends infected messages (with its attached copy) to addresses listed in Windows Address Book, informs a user on some IRC channel about system settings and passwords, and also may be used as a Backdoor.

The worm itself is the Windows PE executable file about 37Kb of length. This file is compressed by WWPack32 utility. Being unpacked it appears to be a 58Kb EXE file written in Delphi, the "pure" code in the file occupies just about 45Kb. Despite on this short enough size for Delphi application, the worm has many features that make it a very dangerous and fast spreading program.

When the worm is executed in the system for the first time, it looks for its copy already installed in the system memory. The worm does that by looking for application that has "#32770" window caption. If there is no such window, the virus registers itself as a hidden application (not visible in the task list) and runs its installation routine.

While installing into the system the worm copies its file to the Windows system directory with the FILES32.VXD filename and registers it in the system registry to be run each time any another application starts. The virus does that by creating a new key in the HKEY_CLASSES_ROOT, the key name is exefile\shell\open\command and it is associated with the worm copy with the FILES32.VXD file that was created in the Windows system folder. This file has .VXD extension, but it is not a VxD Win95/98 driver but "true" Windows executable.

In case of error while installing the worm activates the SSPIPES.SCR screen saver (to hide its activity?). If there is no such file found, the worm tries to activate the Canalisation3D.SCR screen saver.

The worm then inits socket (Internet) connection and runs its routines that are activated: the first one once per 30 seconds, another one - once per 30 minutes.


The first of these routines each time when it is activated tries to connect some IRC chat (see the list below), and by special requests send a messages to a user on these channels. In this way worm author seems to catch affected stations to monitor them. The list of IRC servers the worm tries to connect looks as followed:

irc.twiny.net
irc.stealth.net
irc.grolier.net
irc.club-internet.fr
ircnet.irc.aol.com
irc.emn.fr
irc.anet.com
irc.insat.com
irc.ncal.verio.net
irc.cifnet.com
irc.skybel.net
irc.eurecom.fr
irc.easynet.co.uk
Being recognized by the host (virus author) the worm may be manipulated as a Backdoor trojan horse. By set of commands it sends to the remote host system configuration, disk list, directories info, as well as confidential information: Internet access passwords and telephone numbers, Remote Access Service login names and passwords, ICQ numbers, e.t.c. The backdoor also is able to create/remove directories, send/receive files, delete and execute them, e.t.c.

The second routine, which is activated once per 30 minutes, opens the Windows Address Book file, reads Internet addresses from there, and sends a message to them. The message can be sent not only to private email addresses, but to Internet conferences also, that depends on the Address Book contents only. The message Subject field contains the text:

C:\CoolProgs\Pretty Park.exe
The message itself contains nothing but attached copy of the worm.