Used Microsoft Security Update for Windows? Share your experience and help other users.
Developer’s Description
This worm scans a random IP range to look for vulnerable systems on TCP port 135. The worm attempts to exploit the DCOM RPC vulnerability patched by MS03-026.
Once the Exploit code is sent to a system, it downloads and executes the file MSBLAST.EXE from a remote system via TFTP. Once run, the worm creates the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "windows auto update" = msblast.exe I just want to say LOVE YOU SAN!! bill
Symptoms of the virus: Some customers may not notice any symptoms at all. A typical symptom is the system is rebooting every few minutes without user input. Customers may also see:
- Presence of unusual TFTP* files
- Presence of the file msblast.exe in the WINDOWS SYSTEM32 directory
To detect this virus, search for msblast.exe in the WINDOWS SYSTEM32 directory or download the latest anti-virus software signature from your anti-virus vendor and scan your machine.
Used Microsoft Security Update for Windows? Share your experience and help other users.
Explore More
Ransom Data Guard
FreeKuranin Anti-Ransomware
FreeJiangmin Antivirus Software KV2008
Trial versionWindows Defender Offline
FreeCustodia AntiVirus with Personal Firewall
Trial versionVoiceSecureIt
PaidSafeSpace Free Edition
FreeMy-Virus-Protection
Trial versionmEncryptor File Encryption
PaidVirusfix
Trial versionTrustPort Total Protection 2012
Trial versionNaevius USB Antivirus
Trial version