Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

VIRUS ALERTS - December 16, 2005

Dec 15, 2005 10:58PM PST

Discussion is locked

- Collapse -
Troj/Dloadr-ACC
Dec 15, 2005 11:00PM PST
- Collapse -
Troj/Bifrose-S
Dec 15, 2005 11:02PM PST
- Collapse -
Troj/Hupigon-RD
Dec 15, 2005 11:03PM PST
- Collapse -
Troj/Tiny-AD
Dec 15, 2005 11:05PM PST
- Collapse -
Troj/Zapchas-AF
Dec 16, 2005 1:39AM PST

Type
Trojan

Aliases
Backdoor.IRC.Zapchast
IRC/Flood.gen.dr

Troj/Zapchas-AF is a backdoor Trojan for the Windows platform.

Troj/Zapchas-AF runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.

http://www.sophos.com/virusinfo/analyses/trojzapchasaf.html

- Collapse -
Troj/Feutel-BA
Dec 16, 2005 1:41AM PST
- Collapse -
Troj/Kbroy-B
Dec 16, 2005 1:43AM PST
- Collapse -
W32/Sdbot-AIP
Dec 16, 2005 1:44AM PST

Type
Worm

W32/Sdbot-AIP is a worm and IRC backdoor Trojan for the Windows platform.

W32/Sdbot-AIP runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.

http://www.sophos.com/virusinfo/analyses/w32sdbotaip.html

- Collapse -
Troj/GrayBrd-AX
Dec 16, 2005 1:46AM PST
- Collapse -
W32/Tilebot-CL
Dec 16, 2005 1:48AM PST

Type
Worm

Aliases
Backdoor.Win32.SdBot.xd
W32/Sdbot.worm.gen.ac
WORM_SDBOT.COV

W32/Tilebot-CL is a worm and IRC backdoor Trojan for the Windows platform.

W32/Tilebot-CL spreads to other network computers by exploiting common buffer overflow vulnerabilities, including: LSASS (MS04-011), RPC-DCOM (MS04-012), WKS (MS03-049) (CAN-2003-0812), PNP (MS05-039) and ASN.1 (MS04-007) and by copying itself to network shares protected by weak passwords.

W32/Tilebot-CL runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.

W32/Tilebot-CL includes functionality to access the internet and communicate with a remote server via HTTP.

http://www.sophos.com/virusinfo/analyses/w32tilebotcl.html

- Collapse -
Troj/Vixup-S
Dec 16, 2005 1:49AM PST
- Collapse -
Troj/PcClien-IJ
Dec 16, 2005 7:05AM PST

Type Spyware Trojan

Aliases Backdoor.Win32.PcClient.ij

Troj/PcClien-IJ is a Trojan for the Windows platform.
Troj/PcClien-IJ can log keystrokes and includes functionality to access the internet and communicate with a remote server via HTTP.
Troj/PcClien-IJ may use stealthing techniques, such as rootkit technology and injecting code into other processes, in an attempt to avoid detection.

http://www.sophos.com/virusinfo/analyses/trojpcclienij.html

- Collapse -
Troj/Bckdr-CHH
Dec 16, 2005 7:06AM PST
- Collapse -
Troj/Clown-A
Dec 16, 2005 7:07AM PST

Type Spyware Trojan

Aliases W32/IRCbot.gen.b

Troj/Clown-A is a backdoor Trojan for the Windows platform.
Troj Clown-A runs continuously in the background, providing backdoor access which allows a remote intruder to connect and issue further commands via IRC channels.
Troj/Clown-A includes functionality to access the internet and communicate with a remote server via HTTP.
The Trojan may attempt to steal product keys and other information for the following game and service:
Quake 4
Steam

http://www.sophos.com/virusinfo/analyses/trojclowna.html

- Collapse -
Troj/Dloadr-ACN
Dec 16, 2005 7:08AM PST
- Collapse -
Troj/DNSChan-D
Dec 16, 2005 7:09AM PST

Type Trojan

Aliases Trojan.Win32.DNSChanger.x
DNSChanger.d
Trojan.Flush.A

Troj/DNSChan-D is a Trojan for the Windows platform.
Troj/DNSChan-D includes functionality to modify the DNS setting, access the internet and communicate with a remote server via HTTP.

http://www.sophos.com/virusinfo/analyses/trojdnschand.html

- Collapse -
Troj/GrayBrd-L
Dec 16, 2005 7:10AM PST
- Collapse -
Troj/Inject-B
Dec 16, 2005 7:10AM PST

Type Trojan

Aliases Exploit.Win32.IISInjector
TROJ_IISINJECT.A

Troj/Inject-B is a Trojan component for the Windows platform.
Troj/Inject-B is used for injecting libraries into the Windows Task Manager process in order to prevent malicious code from being detected, terminated or deleted.

http://www.sophos.com/virusinfo/analyses/trojinjectb.html

- Collapse -
Troj/Lewor-Q
Dec 16, 2005 7:11AM PST
- Collapse -
Troj/MisDOM-A
Dec 16, 2005 7:12AM PST

Type Trojan

Troj/MisDOM-A exploits a vulnerability in Internet Explorer to download a file and execute it.
The following patch for the operating system vulnerability exploited by Troj/MisDOM-A can be obtained from the Microsoft website:
MS05-054

http://www.sophos.com/virusinfo/analyses/trojmisdoma.html

- Collapse -
Troj/ServU-BN
Dec 16, 2005 7:13AM PST

Type Trojan

Troj/ServU-BN is a modified version of a commercial FTP application.
Troj/ServU-BN runs continuously in the background providing an FTP server on a TCP port specified in its configuration file (the default is port 4395Cool.

http://www.sophos.com/virusinfo/analyses/trojservubn.html

- Collapse -
W32/Dasher-A
Dec 16, 2005 7:14AM PST

Type Worm

W32/Dasher-A is a multi-component network worm for the Windows platform.
W32/Dasher-A spreads by exploiting the MSDTC (MS05-051) vulnerability.
When first run W32/Dasher-A creates the following files in the same location :
<Temp>\Sqltob.exe
<Temp>\SqlExp.exe
<Temp>\SqlScan.bat
<Temp>\SqlScan.exe
<Temp>\Sqlrep.exe
<Temp>\Temp.txt
<Temp>\log.txt
The main "parent" component is Sqltob.exe, which uses the other components to perform various aspects of the worm's functionality.
Sqlscan.exe is a port scanner, used to search networks for open ports.
Sqlexp.exe is the component which contains the code that attempts to exploit the MS05-051 vulnerability. However this is based on a proof-of-concept code that appears to have a relatively poor success rate.
W32/Dasher-A searches a set of pre-defined networks for open ports and attempts to exploit and vulnerable computers it finds. The exploit opens a backdoor on the vulnerable computer and causes it to connect to a remote server for further instructions.
A patch for the operating system vulnerability exploited by W32/Dasher-A is available from Microsoft:
MS05-051

http://www.sophos.com/virusinfo/analyses/w32dashera.html

- Collapse -
What's a body to do?
Dec 17, 2005 1:27AM PST

What do these posts mean to a moderate or less user? It looks like the posts say that a person can't count on his antivirus programs to protect him from viruses. But sophos says its programs are for high end users. Where does that leave a low end user who can't afford either the expense or time required by the sophos programs? grandpaw

- Collapse -
Hi Grandpaw, we are just
Dec 17, 2005 1:36AM PST

posting virus alerts for anyone that is interested. Sophos happens to be the easiest for us to use. There is no particular reason other than that. Those that wish to read them can, those that don't wish to read them don't have to. Happy

- Collapse -
Thanks, Rod, but.....
Dec 17, 2005 4:20AM PST

I still wonder if sophisticated users don't think users in general should rely just on their antivirus programs for virus protection? Also, Rod, it does seem like the posts are intended to have more use than just providing reading material, no? Thanks, grandpaw

- Collapse -
Yes, everybody should rely on
Dec 17, 2005 5:32AM PST

their antivirus programs Grandpaw. The name of this forum is the Virus and Security Alerts forum. These are the virus alerts that SOME poeple like to read just so they are familiar with the threats that are out here. Plus, IF you happen to get one if these viruses and you click on the Sophos link and then on the ''recovery'' tab on the particular link, it tells you how to get rid of it so it DOES serve another purpose than just reading material IMO. Hopefully you will never get infected and need any of them, Happy

- Collapse -
(NT) (NT) Makes sense to me, Rod; thanks.
Dec 17, 2005 10:16PM PST
- Collapse -
(NT) (NT) You're welcome Grandpaw :)
Dec 17, 2005 10:36PM PST