NetAV is the worm that spreads in email messages. email addresses are collected from the users' Address Book and HTML files located in the 'Temporary Internet Files' folder. Every Tuesday the worm searches for *.DOC files in the 'My Documents' folder and, if there are several files there, picks one randomly and sends it out. The worm does not spread on Tuesday, it only sends *.DOC files out.
Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.
Find the latest advice in our Community Knowledge Base.
See the manual for your F-Secure product on the Help Center.
Submit a file or URL for further analysis.
Like most backdoors, NetBus has client and server components, and to function properly needs the server component to be installed on the remote system to be accessed. Once installed, Netbus allows a hacker to remotely access data and gain control over some Windows functions on the computer system.
Version 1.60 of NetBus server is a Windows PE file named PATCH.EXE. On execution, the server part installs itself to Windows directory and it will be executed automatically during the next Windows startup. The execution command for the server part is written to the registry:
The client part allows to control the remote computer system where the server part is installed and activated. The client part has a dialog interface which allows to perform tricks (some of them are really nasty) on remote system and to receive/send data, text and other information.
The client and server parts use TCP/IP protocol to communicate with each other. The client part has an option to scan a range of IP addresses to search for active server part and connect to it.
Below is a list of NetBus features:
1. Open/close the CD-ROM tray once or in intervals (specified in seconds); 2. Show optional BMP or JPG image (full path allowed); 3. Swap mouse buttons - the right button gets the left button's functions and vice versa; 4. Start optional application (full path allowed); 5. Play optional WAV sound-file (full path allowed); 6. Point the mouse to optional coordinates; 7. Show a message dialog on the screen and allow the user on remote system to answer it; 8. Shutdown Windows, reboot, logoff or power off; 9. Go to an optional URL within the default web-browser; 10. Send keystrokes to the active application on the target computer; 11. Listen for keystrokes on remote system and save them to file; 12. Get a screenshot from remote computer; 13. Return information about the target computer; 14. Upload any file to the target computer or update the server part of NetBus; 15. Increase and decrease the sound-volume; 16. Record sounds that the microphone catch - to listen what happens in the room where remote computer is; 17. Make click sounds every time a key is pressed; 18. Download and deletion of any file from the target system; 19. Blocking certain keys on the remote system keyboard; 20. Password-protection management of the remote server; 21. Show, kill and focus windows on remote system.
The server part takes steps to protect itself from being removed from the system - it hides its process name in Windows task manager and denies access to file on attempt to delete or rename it. When the server part is called with '/noadd' command line it will be not started every time Windows starts. When '/remove' command is passed to server part, it removes itself from the system.
Date Created: -
Date Last Modified: -