The goal of this project is to make virtual world a safer and better place without child pornography, major computer crime and RIAA.
Login As
You can log in if you are registered at one of these services:
Security Bulletins
Latest Malware Updates

Infostealer.Posteal

02/26/2015

Downloader.Busadom

02/26/2015

Trojan.Ladocosm

02/26/2015

SONAR.SuspDocRun

02/25/2015

SONAR.SuspHelpRun

02/25/2015
02/11/2013

Infostealer.Alina

Type:  Trojan
Discovered:  11.02.2013
Updated:  11.02.2013
Affected systems:  Windows 2000, Windows 7, Windows NT, Windows Vista, Windows XP
AV Vendor:  Symantec

Description:

When the Trojan is executed, it copies itself as the following file:
%UserProfile%\Application Data\[FILE NAME].exe

File name is one of the following:
  • adobeflash.exe
  • desktop.exe
  • dwm.exe
  • java.exe
  • jucheck.exe
  • jusched.exe
  • win-firewall.exe

The Trojan then creates the following registry entry so that it runs every time Windows starts:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[FILE NAME]" = "%UserProfile%\Application Data\[FILE NAME].exe"

Next, the Trojan creates the following mutex:
Had3yghhuju98gggd9G6790hfv3.4

It then collects the following information and sends it to a remote location:
  • Computer name
  • Path of threat
  • System volume/serial number
  • Version of threat

The Trojan also enumerates the running processes on the compromised computer and sends statistics to a remote location.

Statistics on the following processes are not recorded:

  • adobeflash.exe
  • chrome.exe
  • crss.exe
  • desktop.exe
  • devenv.exe
  • dwm.exe
  • explorer.exe
  • firefox.exe
  • iexplore.exe
  • java.exe
  • jucheck.exe
  • jusched.exe
  • pidgin.exe
  • skype.exe
  • sms.exe
  • steam.exe
  • svchost.exe
  • thunderbird.exe
  • win-firewall.exe
  • wininit.exe
The preceding information is sent to one or more of the following remote locations:
  • 208.98.63.228/forum/login.php
  • someligeoas.com/whynot/sam.php
  • uipoqworkas.com/whynot/sam.php

The Trojan may also download updates of itself if necessary.

Security Advisories Database

Remote Code Execution Vulnerability in Microsoft OpenType Font Driver

A remote attacker can execute arbitrary code on the target system.

07/21/2015

SQL Injection Vulnerability in Piwigo

SQL inection vulnerability has been discovered in Piwigo.

02/05/2015

Cross-site Scripting Vulnerability in DotNetNuke

A cross-site scripting (XSS) vulnerability has been discovered in DotNetNuke.

02/05/2015

Cross-site Scripting Vulnerability in Hitachi Command Suite

A cross-site scripting vulnerability was found in Hitachi Command Suite.

02/02/2015

Denial of service vulnerability in FreeBSD SCTP RE_CONFIG Chunk Handling

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Apache Traffic Server HTTP TRACE Max-Forwards

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in MalwareBytes Anti-Exploit "mbae.sys"

An attacker can perform a denial of service attack.

01/30/2015

Denial of service vulnerability in Linux Kernel splice

An attacker can perform a denial of service attack.

01/29/2015

Denial of service vulnerability in Python Pillow Module PNG Text Chunks Decompression

An attacker can perform a denial of service attack.

01/20/2015