Troj/Banker-S is a password stealing Trojan that attempts to capture keylogs
associated with web browsing.
Troj/Banker-S creates the following files which are all detected by this
In order to run on system restart Troj/Banker-S creates the following
Troj/Banker-S adds the name of one of the copies of itself to the Run= line of
win.ini and the shell= line of system.ini.
Troj/Banker-S uses it's own SMTP engine to send results of the keylogger to a
russian email address.
Discovered on: April 22, 2004
Last Updated on: April 23, 2004 01:45:15 PM
W32.Gaobot.ADV is a minor variant of W32.Gaobot.SY. This worm attempts to spread through network shares that have weak passwords and allows attackers to access an infected computer using a predetermined IRC channel.
The worm uses multiple vulnerabilities to spread, including:
The DCOM RPC vulnerability (described in Microsoft Security Bulletin MS03-026) using TCP port 135.
The WebDav vulnerability (described in Microsoft Security Bulletin MS03-007) using TCP port 80.
The Workstation service buffer overrun vulnerability (described in Microsoft Security Bulletin MS03-049) using TCP port 445. Windows XP users are protected against this vulnerability if Microsoft Security Bulletin MS03-043 has been applied. Windows 2000 users must apply MS03-049.
The Microsoft Messenger Service Buffer Overrun Vulnerability (described in Microsoft Security Bulletin MS03-043)
The Locator service vulnerability (described in Microsoft Security Bulletin MS03-001) using TCP port 445. The worm specifically targets Windows 2000 computers with this exploit.
The UPnP vulnerability (described in Microsoft Security Bulletin MS01-059).
The vulnerabilities in Microsoft SQL Server 2000 or MSDE 2000 audit (described in Microsoft Security Bulletin MS02-061) using UDP port 1434.
Sending itself to the backdoor ports that the Beagle and Mydoom families of worms open.
This threat may be compressed with UPX and Yoda.
Infection Length: about 100K