Threat description



This trojan was sent to several newsgroups in August 1998. It was also mailed directly to thousands of people with a spam e-mail program. The e-mail message presented the trojan as a file named IE080898.EXE and claimed it was a security update for Internet Explorer.


Automatic action

Depending on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the suspect file, or ask you for a desired action.

More scanning & removal options

More information on the scanning and removal options available in your F-Secure product can be found in the Help Center.

You may also refer to the Knowledge Base on the F-Secure Community site for more information.

Contact Support

F-Secure customers can request support online via the Request support or the Chat forms on our Home - Global site.

Technical Details

The faked spam message looked like it was coming from Microsoft:

From: (Microsoft Internet Explorer Support)

Date: 08/07/98 03:40:04 PM

FREE! Your upgrade for Microsoft Internet Explorer

As user of Microsoft Internet Explorer Microsoft Corporation

provide you an upgrade for your Microsoft Internet Explorer.

Please run Ie080898.exe to install the upgrade. This file will

fix some serious bugs in your Internet Explorer.

For more information please visit Microsoft Internet Explorer

Home Page at:

Attachment: Ie080898.exe

In fact, the original e-mail message was sent from Bulgaria.

When executed, the trojan installs itself as part of Windows system and randomly sends e-mail messages to the internet. These messages are sent to a list of addresses - obviously to irritate these people.

The trojan itself is a 25Kb Windows executable file (NE format) written in Pascal. It accesses network and sends random messages to the Internet.

When run for the first time the trojan just installs itself in the system. It copies itself to the Windows system directory with the SHELL32.EXE name and registers in the system Registry in HKEY_LOCAL_MACHINE section:

 SOFTWARE\Microsoft\Windows\CurrentVersion\Run shell32.exe

The trojan then terminates with no side effects. On next rebooting the trojan stays in the Windows memory as hidden task, sleeps and periodically inits Windows Socket APIs and opens stream socket with TCP/IP protocol for sending messages.

The messages have random selected addresses, subject and data. The "Mail From" address is randomly constructed from following parts:

 1 bulgaria badsector hacker omega vali-pedali eunet digsys
 2 main vt linux aix unix mail www host abc server veliko-tar
 3 prodigy compuserve kurva putka gerry tetra europe amstel usa
 4 com edu org mil gov net bg tr gr uk ca ro jp

For example,

The recipient address is randomly selected from these:

The subject is random selected from variants:

 Bad Sector wi razkaza igrata :))
 Greetings from Bad Sector ! Po-zdrawi
 Vleze li wi sega?
 Hi, kak e?
 Ko staa, ima problemi li
 Bad Sector
 Kogato grum udari...

The sentences of message body are randomly constructed from large set of verbs, words and sub-sentences. Some of these are vulgar, and they are mostly written in Bulgarian.

Submit a Sample

Suspect a file or URL was wrongly detected? Send it to our Labs for further analysis

Submit a Sample

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

More Info