Used Microsoft Security Update for Windows? Share your experience and help other users.
Developer’s Description
This worm scans a random IP range to look for vulnerable systems on TCP port 135. The worm attempts to exploit the DCOM RPC vulnerability patched by MS03-026.
Once the Exploit code is sent to a system, it downloads and executes the file MSBLAST.EXE from a remote system via TFTP. Once run, the worm creates the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "windows auto update" = msblast.exe I just want to say LOVE YOU SAN!! bill
Symptoms of the virus: Some customers may not notice any symptoms at all. A typical symptom is the system is rebooting every few minutes without user input. Customers may also see:
- Presence of unusual TFTP* files
- Presence of the file msblast.exe in the WINDOWS SYSTEM32 directory
To detect this virus, search for msblast.exe in the WINDOWS SYSTEM32 directory or download the latest anti-virus software signature from your anti-virus vendor and scan your machine.
Used Microsoft Security Update for Windows? Share your experience and help other users.
Explore More
AutoRun Disable by Endpoint Protector
FreeSI Internet Security
FreeCryptor
Trial versionTrustPort Total Protection 2013
Trial versionYes AntiVirus-Tool Netsky-P
FreeComplete Protection System - System Scanner
Trial versionCleanFsysna
FreeRaven Security
FreeCleanDofoil
FreeQuick Heal Internet Security
Trial versionCleanDarkKomet
FreePasswords Plus
Trial version