Ok my previous post was deleted with the following message:
Hi Mythoz,
Your post had some virus scanners detect a virus sample in it. I didn’t see a problem in the links, Only the info on the virus it self, But I deleted your post for our users sake.
Try to take extra caution when posting certain links
I am assuming the checkers detect a virus simply because of the html code appended to the html files which I included in my post. So to protect those of you who may be inclined to go running the code blindly I have reposted with the offending data Base64 encoded.
Hopefully this will protect you poor innocents.
Ironic really, comodo antivirus cannot detect the code yet the message board users can?
Foolishly I clicked an unknown program, no alert from Comodo. HD lit up and went nuts and comodo firewall popped a connection request which I blocked.
CTL+ALT+DEL popped the task manager window which instantly dissappeared again, and again …
Hit the big button on the wall and killed everything.
Restarted and checked my startups found this:
HKCU \ run
svcshare = C:\WINDOWS\system32\drivers\spoclsv.exe
removed it and used spybot to kill the running process. Spybot reported it as an “FUJACKS-J” infection.
Looked it up and found this to be the most informative and comprehensive information:
LINKS REMOVED
This has some extra info too in the “more info” tab.:
LINKS REMOVED
Luckily I killed the machine in time to minimize the damage but even scanning a known infected file comodo does not recognize it.
This is extremely dissappointing as it is an old virus and not a very clever one.
It placed a “Desktop_.ini” file in every folder it visited.
It appended:
(Base64 encoded to protect the simpletons)
PGlmcmFtZSBzcmM9aHR0cDovL3d3dy5rcnZrci5jb20vd29ybS5odG0gd2lkdGg9MCBoZWlnaHQ9
MD48L2lmcmFtZT4=
To every html file it found. (probably would have done the asp,aspx etc too but it didnt find any)
It prepended 75kb of code to every exe it found (probably com etc too but it didnt find any)
Each time an infected file is run it reinstalls spoclsv.exe and the registry entry and attempts to connect to the net (didnt note where)
The pre infection program code is not infected just appended after the virus code.
The virus PE headers have the section names nsp0,nsp1,nsp2,vmp0
Come on comodo this is basic crap!!! doesnt even infect programs in memory!!! I am a little pissed right now!
===============================================
To clean up the mess I used Uedit to find and replace in files:
(Base64 encoded to protect the simpletons)
PGlmcmFtZSBzcmM9aHR0cDovL3d3dy5rcnZrci5jb20vd29ybS5odG0gd2lkdGg9MCBoZWlnaHQ9
MD48L2lmcmFtZT4=
replacing with nothing.
then did a uedit find in files searching for nsp0 to locate all infected exe, scr files. Not sure if this would detect com files too as they dont have PE headers but suprisingly windows loads com files the same as exe files checking for the PE headers first (you learn something new everyday) so it probably prepends the same code to com files.
You can find the original code at 75269d (12605h) and deleteing the previous bytes using uedit removes the virus. I only had 35 files to do luckily.
(the virus only infects files which have an embedded icon oddly enough)
Not sure if this information helps anyone but it never hurts to have info.
Now I am clean again I have to look for a new virus checker.
Mod Edit: Some AV’s Detected posted links as a Virus (Eg, Avast!), So links have been removed.