Virus alert please help!

Debbie

Persnickety slattern
Joined
Feb 4, 2001
Posts
24,213
I have another virus on my computer.
Zone alarm is telling me that KERNEL32>EXE is trying to access the internet and that is has previously done so. Checked it out using Google.
This came up


W95/Babylonia
Type
Windows 95 executable file virus and email worm.

Detection
Detected by Sophos Anti-Virus since December 1999.

Description
This is a memory-resident virus that infects Windows EXE and HLP files.

The virus also patches WSOCK32.DLL in a similar manner to W32/Ska-Happy99. If you detect an infection of W95/Babylonia on your system Sophos recommends setting Sophos Anti-Virus to do a 'Full SWEEP' to detect the altered WSOCK32.DLL file. 'Full SWEEP' is a configuration option that is not enabled by default, and does not need to be set unless you have already found a W95/Babylonia infection on your computer. Please refer to the Sophos Anti-Virus documentation for your platform for details on how to enable this option if it is required.

The virus uses WSOCK32.DLL to send emails with an attached infected executable called X-MAS.EXE. The attachment is displayed as an icon with the face of Father Christmas.



When the attachment is executed, it displays two dialog boxes in succession: "API not found!" and "Windows NT required. This program will be terminated".





When an infected file is run, the virus drops a file called C:\BABYLONIA.EXE and runs it. BABYLONIA.EXE copies itself to C:\WINDOWS\SYSTEM\KERNEL32.EXE and modifies the registry so that KERNEL32.EXE runs on every startup.

KERNEL32.EXE waits until it detects a dial-up connection, contacts the homepage of a virus writers' group, downloads any available plug-in modules for this virus and executes them.

At the time of writing, the modules downloaded from the website allow the virus to spread over mIRC claiming to be a "Y2K bug fix", make the system display a greeting message on startup, and send email to a Hotmail account, allowing the virus writers to track infections.

The virus includes the following text:

W95/Babylonia by Vecna (c) 1999
Greetz to RoadKil and VirusBuster
Big thankz to sok4ever webmaster
Abracos pra galera brazuca!!!
---
Eu boto fogo na Babilonia!





I have done a full sweep and Norton says it has detected nothing.
Any ideas as to what I can do next? I won't be sending any emails till I fix this problem in case it is spread this way
 
Last edited:
debbiexxx said:
I have done a full sweep and Norton says it has detected nothing.
Any ideas as to what I can do next? I won't be sending any emails till I fix this problem in case it is spread this way

When did you last update your Norton pattern files? It sounds like something Norton should have been aware of for a long time, but it might not be in the psattern files it uses to check for viruses.

Contact Norton's customer service if your pattern files is current or try a different virus check.
 
Babylonia has been around since 1999 and Symantec/Norton AntiVirus does block it... WH is right, when did you last update your virus definitions?

Everyone should be doing weekly updates of def files. Also - when did you buy your version of NAV? For the last year or two def file updating is an automated process - if your copy license has run out you might need a new copy...

From the Symantec site:

http://securityresponse.symantec.com/avcenter/venc/data/w95.babylonia.html

W95.Babylonia was originally posted to an Internet news group on December 3, 1999, as a Windows Help file named Serialz.hlp. It appeared to be a list of serial numbers for commercial software. When this Windows help file is run, it executes the virus. The virus appears to have been written by the same individual who released the W32.Coke and W95.Fono (El_Inca) viruses.

Type: Trojan Horse, Virus, Worm

Infection Length: 11,036 bytes

Technical description:

W95.Babylonia is a complex virus that propagates using mIRC, or as an email attachment. All infected .hlp and .exe files can cause infection on other systems. This Windows 95 virus employs many proven infection techniques, which have been developed by virus writers for the Windows 9x platforms over the past few years.

Opening a help (.HLP) file
When an infected .hlp file is run under Windows 9x, the virus code is activated. The virus modifies the entry point of .hlp files to a short script routine. This routine transfers control from the script interpretation to the binary virus code that is placed at the end of the infected .hlp files in variable packed form. When the binary virus code assumes control, the virus attempts to install itself to the kernel memory area of the computer, and it hooks the file system to its own code. The virus then creates a 4 KB file named C:\Babylonia.exe. This file then executes.

Execution of Babylonia.exe
When Babylonia.exe starts, it copies itself to the \Windows\System folder as Kernel32.exe, and adds its value to the following registry key:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

As a result, Babylonia.exe executes each time Windows starts.

This module is registered as a system service, and as a result, it cannot be seen on the Windows 9x task list. The Trojan checks to see if the Rnaapp.exe application is running by enumerating the active processes. If it does not find a similar process, it sleeps for some time and tries again later. Rnaapp.exe is active under Windows 9x during dial-up connections. When the application is loaded, the virus attempts to connect to a virus writer's Web site in Japan.

If it is successful, the Trojan downloads a text file named Virus.txt. This text file lists a few file names (currently four). The file names are:

* Dropper.dat
* Greetz.dat
* Ircworm.dat
* Poll.dat


They appear to use a special file format with a header that begins with "VMOD." This stands for "Virus Module." The header of the virus modules contains an entry point for the module. The Trojan then downloads the files and executes them, one by one, inside its own process. By doing this, the Trojan can introduce additional functionality on the already infected system. If the system is disinfected, but the Trojan is active, the virus code is reintroduced by the dropper virus module. It creates a 17 KB application (Instalar.exe) and executes it. This file is infected by the virus. Finally, the file is deleted.

When the month is January, the Greetz.dat module modifies the C:\Autoexec.bat file. Part of the "marker" for this virus includes the following text in the C:\Autoexec.bat file:

W95/Babylonia by Vecna (c) 1999

The Ircworm.dat appears to be an mIRC worm installer. The worm seems to propagate two files:

2kBug-MircFix.exe
2kbugfix.ini

to everyone on the active mIRC channel.

The last module in Virus.txt sends messages to babylonia_counter@hotmail.com containing the text:

Quando o mestre chegara?

This information was intended by the virus writer to track the number of infections that W95.Babylonia causes.

Infected .exe and .hlp files
W95.Babylonia hooks the file system to itself and checks for .exe and .hlp file extensions. It infects such files whenever they are accessed. Infected Windows .hlp files and 32-bit PE.exe files can introduce the full functionality of the virus to new systems.

The virus uses an insertion technique (does not modify the entry point of PE files) when it infects files, probably in an attempt to avoid detection by heuristic analyzers. The virus body is attached to the end of the infected files.

As long as the virus is in memory, it cannot be easily removed from the system. This infection mechanism is very similar to the W95.CIH virus.

Wsock32.dll modifications
Another very important detail is that W95.Babylonia is able to modify Wsock32.dll when the file is not loaded in memory. The virus adds a very short hook routine to the "Send" API of Wsock32.dll similar to the Happy99 worm. This short hook routine transfers control to the active part of the virus code when an email is sent. The end result of this code is that the virus adds a MIME-encoded attachment of itself to all outgoing email, thus increasing its rate of spread. W95.Babylonia is technically a worm, as well as a virus.

The possible file names of the email attachment are:

* I-watch-u.exe
* Babilonia.exe
* X-mas.exe
* Surprise!.exe
* Jesus.exe
* Buhh.exe
* Chocolate.exe


It appears that the virus has a bug in this routine and therefore only the X-mas.exe file name is used. This file appears to be the same as the Instalar.exe that is created by one of the virus modules. It has a Santa Claus icon.
 
Hey Debbie... contact your ISP help desk. Ihug helped me with a virus a few months back and were pleased to do so. Give it a go.

Good luck...
 
Related info:

http://securityresponse.symantec.com/avcenter/venc/dyn/9720.html

W95.Babylonia (HLP)

Detected as:

W95.Babylonia (HLP)

Aliases:

None

Area of Infection:

.EXE Files

Characteristics:

Wild

This is a virus that infects Windows PE files and Windows Help files. Please refer to our write-up for more information about this virus.

<http://securityresponse.symantec.com/avcenter/graphics/black.gif>

This threat is detected by the latest Virus Definitions.

All computer users should employ safe computing practices, including:

* Keeping your Virus Definitions updated.
* Installing Norton AntiVirus program updates, when available.
* Deleting suspicious looking emails.

You may also scan your PC for threats now, by using the free online Symantec Security Check.

To ensure complete protection against viruses and similar threats, please review Symantec's product offerings for Home and Corporate users.

http://securityresponse.symantec.com/avcenter/venc/dyn/10816.html

W95.Babylonia (dat)

Detected as:

W95.Babylonia (dat)

Aliases:

None

Area of Infection:

.COM Files

This is a virus that infects Windows PE files and Windows Help files. Please refer to our write-up for more information about this virus.

<http://securityresponse.symantec.com/avcenter/graphics/black.gif>

This threat is detected by the latest Virus Definitions.

All computer users should employ safe computing practices, including:

* Keeping your Virus Definitions updated.
* Installing Norton AntiVirus program updates, when available.
* Deleting suspicious looking emails.

You may also scan your PC for threats now, by using the free online Symantec Security Check.

To ensure complete protection against viruses and similar threats, please review Symantec's product offerings for Home and Corporate users.

http://securityresponse.symantec.com/avcenter/venc/dyn/10815.html

W95.Babylonia

Detected as:

W95.Babylonia

Aliases:

None

Area of Infection:

.COM Files

Characteristics:

Wild

This is a virus that infects Windows PE files and Windows Help files. Please refer to our write-up for more information about this virus.

<http://securityresponse.symantec.com/avcenter/graphics/black.gif>

This threat is detected by the latest Virus Definitions.

All computer users should employ safe computing practices, including:

* Keeping your Virus Definitions updated.
* Installing Norton AntiVirus program updates, when available.
* Deleting suspicious looking emails.

You may also scan your PC for threats now, by using the free online Symantec Security Check.

To ensure complete protection against viruses and similar threats, please review Symantec's product offerings for Home and Corporate users.
 
I have Norton anti virus Gold edition version 4.0
I updated two weeks ago


I just ran the online symantec security check (Norton said system was clean)

Two files infected

Results of Virus Detection Scan
The scan detected one or more viruses in the files it scanned.
To Fix This Problem:
Consider purchasing a comprehensive anti-virus program to help you repair.
Or, delete the following files:
c:\WINDOWS\SYSTEM\KERNEL32.EXE is infected with W32.Badtrans.B@mm
c:\WINDOWS\SYSTEM\kdll.dll is infected with W32.Badtrans.B@mm

I didn't receive an email with a santa tag or any of the other email names. Could be the kids opened one in their email addresses.
 
I use Sophos and it kick's major ass, I know for a fact it's the anti virus of choice at the Reuter's office where my bro in law work's.
 
Thank you very much for your help and links! I updated Norton and managed to get the virus deleted.
Thanks to Dillinger, Weird Harold, Guru, Sweet Cherry, Outsider, kiwiwolf and Bob Peale.
I have a scheduler running now on Norton to update weekly. I thank you and my virus free computer thanks you! :)
 
debbiexxx said:
Thank you very much for your help and links! I updated Norton and managed to get the virus deleted.
Thanks to Dillinger, Weird Harold, Guru, Sweet Cherry, Outsider, kiwiwolf and Bob Peale.
I have a scheduler running now on Norton to update weekly. I thank you and my virus free computer thanks you! :)

Your welcome but I really didn't do anything other than crow about the fact that I have SOPHOS but I'll take all the praise I can get :D
 
Back
Top