Event ID - 1052

Port No1052
Service NameHOBBIT
RFC Doc0
ProtocolTCP
DescriptionThis Windows executable worm propagates via email using MAPI and its own SMTP engine. It also propagates via the Kazaa file-sharing network.

This worm sends email with itself as attachment to all email addresses it gathers from cached Web pages with HTML and HTM extensions and to all addresses listed in infected users’ Microsoft Outlook address book. It sends email with the following details:

Subject: Fwd: Scan your computer for this new virus threat... Message Body: This is a fix and removal for the new internet worm known as BugBear. 1 in ever 4 computers in infected with this virus. When run, it will scan your computer and notify you if you're infected or not, then clean if infected. Attachment: Anti-Bug.exe
Reference LinkHOBBIT
AttackSolution:
This procedure terminates the running malware process from memory. You will need the name(s) of the file(s) detected earlier.

Open Windows Task Manager.
On Windows 9x/ME systems, press
CTRL+ALT+DELETE
On Windows NT/2000/XP systems, press
CTRL+SHIFT+ESC, and click the Processes tab.
In the list of running programs*, locate the malware file or files detected earlier.
Select one of the detected files, then press either the End Task or the End Process button, depending on the version of Windows on your system.
Do the same for all detected malware files in the list of running processes.
To check if the malware process has been terminated, close Task Manager, and then open it again.
Close Task Manager.

*NOTE: On systems running Windows 9x/ME, Task Manager may not show certain processes. You may use a third party process viewer to terminate the malware process. Otherwise, you will have to restart your machine.

Catch threats immediately

We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.

See what we caught

Did this information help you to resolve the problem?

Yes: My problem was resolved.
No: The information was not helpful / Partially helpful.