Skip Over Navigation Links
Center for Information TechnologyAntivirus
Antivirus Home Page
Contact Us
Questions or Comments
Disclaimers

Software
Current client downloads:
 VScan Engine/Dat (SuperDat) -5300/2777.5511
 VirusScan Enterprise 8.5i (with Patch 6) - Windows NT/2000/XP/2003
 VirusScan Enterprise 7.1 - Windows NT/2000/XP/2003
 Virex (OS X) Engine/Def - 7.2(v1.1)/081029
 Virex (OS 9.x) Engine/Def - 6.2/071001
 Linux & Solaris Engine/Dat - 5.2.00/4.0.5196
 Symantec Antivirus - 10.1.7.7000
 Symantec Antivirus - 10.2
 Clean Boot 1.0
 Stinger v3.8.0 virus removal tool (Updated 09/10/07)
Current server downloads:
 VirusScan Enterprise 8.5
 VirusScan Enterprise 7.1
 NetShield NetWare - 4.6.2
 NetShield NetWare - 4.6.3
 NetShield NetWare Engine Update - 4.4.00
 ePO agent for NetWare
 ScanMail eManager - 3.0

Information
 ePO 3.0/VirusScan 7.0 Presentation
 Virex 7.x Installation Instructions
 VirusScan FAQs
 VirusScan Instructions
 Additional Resources

Archives
 List of Viruses

Virus Archives

W32.Blaster.worm Last Updated 8/12/03 11:41am

A new worm, W32.Blaster.worm is spreading in the wild. The worm takes advantage of the Microsoft DCOM RPC vulnerability (see "What's New"). Presently the worm's action appears to be replication only.

The worm may indirectly cause windows machines to reboot by hanging the RPC service. By default when the service is hung Windows will reboot the machine. This affects incorrectly patched machines. see "What's New" regarding patch information.

The worm copies itself to the default Windows system directory as MSBLAST.EXE and creates the following registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "windows auto update" = msblast.exe

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "windows auto update" = msblast.exe I just want to say LOVE YOU SAN!! bill

NAI heuristically detects W32.Blaster.Worm with the 4283 Dat/SuperDat. NAI will detect/remove W32.Blaster.Worm with the 4284 Dat/SuperDat. The 4284 DAT/SuperDat is now available.

Symantec Antivirus definitions Dated 08-11-2003 or later detect and remove W32.Blaster.worm. Use the Symantec (Norton) LiveUpdate feature of Symantec Antvirus to update your software.

Blaster Removal tool is available here (Stinger version 1.8.3)

For Admins and ISSO's only, Retina Scanning tool available here.

Microsoft Blaster Worm Removal Tool for Windows XP and Windows 2000: (KB833330) - 12/31/2003

Microsoft Windows Malicious Software Removal Tool: (KB890830) - 1/10/2005

More information will be posted as it becomes available.

This archive is not intended to be comprehensive. For a more complete virus library, please visit NAI's Virus Information Library at http://vil.nai.com.

Contact NIH Help Desk for assistance:
866-319-4357 (toll free), 301-496-4357 (6-HELP) (local), 301-496-8294 (TDD)
http://ithelpdesk.nih.gov/support
Register for iForgotMyPassWord

National Institutes of HealthCenter for Information Technology
National Institutes of Health
Bethesda, Maryland 20892

Questions or Comments | Disclaimers | Privacy Policy

Department of Health and Human ServicesHealth and Human Services
Washington, D.C. 20201
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -