
NOTE: These instructions are for all current and recent Symantec antivirus products, including the Symantec AntiVirus and Norton AntiVirus product lines.
1. Update the virus definitions.
2. Run a full system scan. Delete and, if it is necessary, replace all files that are detected as W32.Lamin.
3. Reverse any changes that the virus may have made to your personal firewall software.
For details on how to do this, read the following instructions.
To update the virus definitions:
All virus definitions receive full quality assurance testing by Symantec Security Response before being posted to our servers. There are two ways to obtain the most recent virus definitions:- Run LiveUpdate, which is the easiest way to obtain virus definitions. These virus definitions are posted to the LiveUpdate servers once each week (usually Wednesdays) unless there is a major virus outbreak. To determine whether definitions for this threat are available by LiveUpdate, look at the Virus Definitions (LiveUpdate) line at the top of this write-up.
- Download the definitions using the Intelligent Updater. Intelligent Updater virus definitions are posted on U.S. business days (Monday through Friday). They must be downloaded from the Symantec Security Response Web site and installed manually. To determine whether definitions for this threat are available by the Intelligent Updater, look at the Virus Definitions (Intelligent Updater) line at the top of this write-up.
Intelligent Updater virus definitions are available here. For detailed instructions on how to download and install the Intelligent Updater virus definitions from the Symantec Security Response Web site, click here.
To scan for and delete the infected files:1. Start your Symantec antivirus program, and make sure that it is configured to scan all files. 2. Run a full system scan.
3. If any files are detected as infected with W32.Lamin, click Delete. If necessary, replace the deleted file with a clean backup copy.
Reverse any changes that may have been made to your firewall
If you suspect that your firewall software has been modified by the virus, check the product's settings, and change them to their original settings.
Additional information:
* What are Portable Executable (PE) files?
PE files are files that are portable across all Microsoft 32-bit operating systems. The same PE-format executable can be executed on any version of Windows 95, 98, Me, NT, 2000, and XP. All PE files are executable, but not all executable files are portable.
A common example of a Portable Executable file is a screen saver (.scr) file.
Backdoor
If the IRC Backdoor Trojan component was installed on the computer, it is possible that your system has been accessed remotely by an unauthorized user. For this reason it is impossible to guarantee the integrity of a system that has had such an infection. The remote user could have made changes to the system, including but not limited to the following:
- Stealing or changing passwords or password files
- Installing remote-connectivity host software, also known as backdoors
- Installing keystroke logging software
- Configuring firewall rules
- Stealing credit card numbers, banking information, personal data, and so on
- Deleting or modifying files
- Sending inappropriate or even incriminating material from a customer's email account
- Modifying access rights on user accounts or files
- Deleting information from log files to hide such activities
To be certain that your organization is secure, you must reinstall the operating system, restore files from a backup that was created before the infection took place, and change all passwords that may have been on the infected computer or that were accessible from it. This is the only way to ensure that your system is safe. For more information about security in your organization, contact your system administrator.
Write-up by: Neal Hindocha