W32/MTX.mm

Virus Name
W32/MTX@mm

Aliases
I-Worm.MTX
MTX_.exe
PE_MTX
W32/Apology
W32/Apology-B
W95.MTX

Variants

None

Description Added
8/24/00 1:18:15 PM

Virus Information
 
 Discovery Date:8/23/00
 Origin:Germany
 Length:18,483 bytes
 Type:Virus
 SubType:Internet Worm
 Risk Assessment:Medium
 Minimum Engine:4.0.70
 Minimum Dat:4093
 DAT Release Date:08/30/2000

Virus Characteristics
Update - September 19, 2000:
McAfee AVERT has raised the ARA for this virus from Low to Medium based on customer samples received to date.

Removal of this virus requires 4095 DAT files. This virus was discovered by McAfee AVERT Aug 23, 2000.

This is a 32bit PE file infector for Windows 9x/NT systems. This virus modifies WSOCK32.DLL in an effort to hook SMTP traffic as an attachment. This virus searches for available shares through Network Neighborhood in an effort to transfer to host systems.

W32/MTX@MM is a combination of a Virus, Worm and Backdoor.

-Worm/Backdoor part: As it has mailing capabilities users may receive an e-mail with a file attachment, the name of the attachment is variable, but it may be like: I_am_sorry_doc.pif, or zipped_files.exe etc. Regardless of the deceiving filename and extension, the attached file as such is in fact a 32 bit "pe" file. (Portable Excutable file, common on win9x/winNT).

-Virus part: the virus also modified 32 bit pe files, like .EXE and .DLL, in the windows folder. It might search local mapped drives for target files.

Symptoms
Existence of these files on the local system (Windows folder):

IE_PACK.EXE
MTX_.EXE
WIN32.DLL
WSOCK32.MTX

The file WININIT.INI is modified to replace calling of the regular wsock32.dll with the dropped file wsock32.mtx after next reboot.

When this virus sends itself via email, it could be one of the following file names, randomly picked:

ALANIS_Screen_Saver.SCR
ANTI_CIH.EXE
AVP_Updates.EXE
BILL_GATES_PIECE.JPG.pif
BLINK_182.MP3.pif
' FEITICEIRA_NUA.JPG.pif
FREE_xxx_sites.TXT.pif
FUCKING_WITH_DOGS.SCR
Geocities_Free_sites.TXT.pif
HANSON.SCR
I_am_sorry.DOC.pif
I_wanna_see_YOU.TXT.pif
INTERNET_SECURITY_FORUM.DOC.pif
IS_LINUX_GOOD_ENOUGH!.TXT.pif
JIMI_HMNDRIX.MP3.pif
LOVE_LETTER_FOR_YOU.TXT.pif
MATRiX_2_is_OUT.SCR
MATRiX_Screen_Saver.SCR
Me_nude.AVI.pif
METALLICA_SONG.MP3.pif
NEW_NAPSTER_site.TXT.pif
NEW_playboy_Screen_saver.SCR
Protect_your_credit.HTML.pif
QI_TEST.EXE
READER_DIGEST_LETTER.TXT.pif
SEICHO-NO-IE.EXE
Sorry_about_yesterday.DOC.pif
TIAZINHA.JPG.pif
WIN_$100_NOW.DOC.pif
YOU_are_FAT!.TXT.pif
zipped_files.EXE

This virus creates these key:

HKLM\Software\[MATRiX]

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
SystemBackup = "C:\WINDOWS\MTX_.EXE"

Method Of Infection
When the user doubleclicks on the attached file, several files are being dropped.Dropped files (some are marked Hidden) may be :

IE_PACK.EXE,
MTX_.EXE,
WIN32.DLL
WSOCK32.MTX

The file WININIT.INI is modified to replace calling of the regular wsock32.dll with the dropped file wsock32.mtx after next reboot. MTX_.EXE runs from the system registry at Windows startup and is memory resident when the virus is first executed on the system.

MTX_.EXE runs as a process and makes Internet calls every 2 minutes on the system in communication on TCP port 1137.

Removal Instructions
Script,Batch,Macro and non memory-resident:
Use specified engine and DAT files for detection and removal.

PE,Trojan,Internet Worm and memory resident:
Use specified engine and DAT files for detection. To remove, boot to MS-DOS mode or use an emergency boot diskette and use the command line scanner such as "SCANPM C: /CLEAN /ALL"

AVERT Recommended Updates:
Note1- Microsoft has released an update for

* Outlook to protect against "Malformed E-mail MIME Header" vulnerability at this link

* Outlook as an email attachment security update

* Exchange 5.5 as a post SP3 Information Store Patch 5.5.2652.42 - this patch corrects detection issues with GroupShield

For a list of attachments blocked by the Outlook patch and a general FAQ, visit this link.
Additionally, Network Administrators can configure this update using an available tool - visit this link for more information.

Note2- It is very common for macro viruses to disable options within Office applications for example in Word, the macro protection warning commonly is disabled. After cleaning macro viruses, ensure that your previously set options are again enabled.