Used Microsoft Security Update for Windows?
Developer’s Description
This worm scans a random IP range to look for vulnerable systems on TCP port 135. The worm attempts to exploit the DCOM RPC vulnerability patched by MS03-026.
Once the Exploit code is sent to a system, it downloads and executes the file MSBLAST.EXE from a remote system via TFTP. Once run, the worm creates the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "windows auto update" = msblast.exe I just want to say LOVE YOU SAN!! bill
Symptoms of the virus: Some customers may not notice any symptoms at all. A typical symptom is the system is rebooting every few minutes without user input. Customers may also see:
- Presence of unusual TFTP* files
- Presence of the file msblast.exe in the WINDOWS SYSTEM32 directory
To detect this virus, search for msblast.exe in the WINDOWS SYSTEM32 directory or download the latest anti-virus software signature from your anti-virus vendor and scan your machine.
Used Microsoft Security Update for Windows?
Explore More
Quick Heal AntiVirus 2010 32-bit
Trial version
Shiela USB Shield
FreeProtea AntiVirus Tools (VirusBuster version)
Trial version
Trend Micro RansomBuster
Free
Trend Micro Anti-Ransomware for GOZ and CryptoLocker (64-bit)
Free
USB Disk Protector
FreeURLX
PaidPlumKeys
PaidMaxilaris Sesame
PaidMultiAccounts
PaidPassWallet Duo
PaidAK CCC
Paid