Threat Explorer

The Threat Explorer is a comprehensive resource consumers can turn to for daily, accurate, up-to-date information on the latest threats, risks and vulnerabilities.

Dialer.Cyberbill

Dialer.Cyberbill

Updated:
13 February 2007
Risk Impact:
High
File Names:
Anal_de.exe anal.exe
Systems Affected:
Windows

Behavior


Dialer.Cyberbill is a dialer program that can be used to access pornography by dialing a high-cost number using a modem.

Symptoms


The files are detected as Dialer.Cyberbill.

Behavior


The most common installation method for this dialer application is through various Web sites, mainly pornographic in nature.

Antivirus Protection Dates

  • Initial Rapid Release version 02 October 2014 revision 022
  • Latest Rapid Release version 01 February 2015 revision 020
  • Initial Daily Certified version 11 December 2003
  • Latest Daily Certified version 28 September 2010 revision 036
  • Initial Weekly Certified release date 17 December 2003
Click here for a more detailed description of Rapid Release and Daily Certified virus definitions.

When Dialer.Cyberbill is executed, it preforms the following actions:
  1. Displays a dialog box similar to the following:



  2. If Connect is clicked, it will dial a premium rate number to access pornography.
  3. Creates a series of files in the %Windir% folder, containing the following file types:
    • .bmp: A pornographic picture that the dialer software uses.
    • .ico: The icon used for shortcuts, which the dialer created.
    • .ini: A configuration file that the dialer uses.
    • .exe: A copy of the dialer executable.
    • .bat: A batch file that executes the .exe file.

      and using one of the following file names:
    • Cb002510
    • Cb002079


      Note: %Windir% is a variable. The dialer locates the Windows installation folder (by default, this is C:\Windows or C:\Winnt) and creates the files in that location.

  4. Creates shortcuts on the Windows desktop, the Start menu, and the Quick Launch toolbar with the following names:
    • geileerotik
    • anal
  5. Creates a Cyberbill cookie in the Current User's Profile.



The following instructions pertain to all Symantec antivirus products that support Security Risk detection.
  1. Update the definitions.
  2. Close modem connections
  3. Run a full system scan and delete all the files detected as Dialer.Cyberbill.
  4. Delete the associated files.
For specific details on each of these steps, read the following instructions.

1. Updating the definitions
To obtain the most recent definitions, start your Symantec program and run LiveUpdate.

2. To close modem connections
This risk uses available modems to create an Internet connection, sometimes without any visible signs. In order to successfully remove this threat, ensure that all modem-based Internet connections are disconnected before proceeding. For instructions on how to do this, consult the appropriate Internet service provider, computer manufacturer, or operating system documentation.

3. Scanning for and deleting the files
  1. Start Norton AntiVirus and make sure that it is configured to scan all the files. For more information, read the document, "How to configure Norton AntiVirus to scan all files."
  2. Run a full system scan.
  3. If any files are detected as Dialer.Cyberbill, click Delete.


    Note: If your Symantec antivirus product reports that it cannot delete a detected file, write down the path and file names. Then use Windows Explorer to locate and delete the file.

4. Deleting the associated files
  1. Using Windows Explorer, navigate to the %Windir% folder.
  2. Delete any files with the following filenames:
    • Cb002510
    • Cb002079
  3. Right-click any shortcuts on the Windows desktop with the following names:
    • geileerotik
    • anal

      and select Delete.