Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

VIRUS ALERTS - December 22, 2005

Dec 21, 2005 9:22PM PST

W32/Rbot-BFL

Type
Spyware Worm

W32/Rbot-BFL is an internet worm and IRC backdoor Trojan for the Windows platform.

W32/Rbot-BFL spreads to other network computers by exploiting common buffer overflow vulnerabilities, including: LSASS (MS04-011) and RPC-DCOM (MS04-012) and by copying itself to network shares protected by weak passwords.

W32/Rbot-BFL runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.

W32/Rbot-BFL includes functionality to:

- steal confidential information
- carry out DDoS flooder attacks
- silently download, install and run new software

The following patches for the operating system vulnerabilities exploited by W32/Rbot-BFL can be obtained from the Microsoft website:

http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx

http://www.microsoft.com/technet/security/bulletin/MS04-012.mspx

http://www.sophos.com/virusinfo/analyses/w32rbotbfl.html

Discussion is locked

- Collapse -
Troj/Namitsu-C
Dec 22, 2005 3:28AM PST
- Collapse -
Troj/Small-FP
Dec 22, 2005 3:30AM PST
- Collapse -
Linux/Lupper-E
Dec 22, 2005 3:32AM PST
- Collapse -
Linux/Mare-A
Dec 22, 2005 3:33AM PST
- Collapse -
W32/Bagle-AR
Dec 22, 2005 4:20AM PST

Type
Worm

Aliases
Email-Worm.Win32.Bagle.ek
WORM_BAGLE.BS

W32/Bagle-AR is a mass-mailing worm for the Windows platform.

W32/Bagle-AR sends a ZIP file as an email attachment. The ZIP file contains an executable detected as either Troj/BagleDl-W, Troj/BagleDl-Y or Troj/BagleDl-Z.

Once installed, this executable attempts to download further files, which may include copies of the original worm W32/Bagle-AR.

Emails sent by W32/Bagle-AR have the following characteristics:

Subject line: <Blank>

Message text chosen from:

info
texte
The password is <image>
Password: <image>

The attachment filename chosen from:

text_sms.zip
sms_text.zip
The_new_prices.zip
Info_prices.zip
Business_dealing.zip
Business.zip
Health_and_knowledge.zip

W32/Bagle-AR will avoid sending emails to addresses containing any of the following strings:

@derewrdgrs
@eerswqe
@messagelab
@microsoft
anyone@
certific
contract@
f-secur
free-av
gold-certs@
google
icrosoft
listserv
nobody@
noone@
noreply
postmaster@
rating@
samples
support
update
winrar
winzip

Sophos's anti-virus products include Genotype? detection technology, which can proactively protect against new threats without requiring an update. Sophos customers have been protected against W32/Bagle-AR (detected as W32/Bagle-Gen) since version 3.97.

http://www.sophos.com/virusinfo/analyses/w32baglear.html

- Collapse -
W32/Rbot-AWC
Dec 22, 2005 4:22AM PST
- Collapse -
W32/Rbot-AVZ
Dec 22, 2005 4:25AM PST

Type
Spyware Worm

Aliases
Backdoor.Win32.Rbot.agi
WORM_RBOT.CON

W32/Rbot-AVZ is a worm and IRC backdoor Trojan for the Windows platform.

W32/Rbot-AVZ spreads:

- to other network computers infected with Troj/Kuang
- to other network computers by exploiting common buffer overflow vulnerabilities, including LSASS (MS04-011), RPC-DCOM (MS04-012) and PNP (MS05-039)
- by copying itself to network shares protected by weak passwords
and by copying itself to network shares protected by weak passwords.

The following patches for the operating system vulnerabilities exploited by W32/Rbot-AVZ can be obtained from the Microsoft website:

http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx

http://www.microsoft.com/technet/security/bulletin/MS04-012.mspx

http://www.microsoft.com/technet/security/bulletin/MS05-039.mspx

http://www.sophos.com/virusinfo/analyses/w32rbotavz.html

- Collapse -
W32/Tilebot-AW
Dec 22, 2005 4:29AM PST

Type
Worm

Aliases
WORM_SDBOT.CKT
Backdoor.Win32.SdBot.aad

W32/Tilebot-AW is a worm and IRC backdoor Trojan for the Windows platform.

W32/Tilebot-AW spreads to other network computers by exploiting common buffer overflow vulnerabilities, including: LSASS (MS04-011), RPC-DCOM (MS04-012), PNP (MS05-039) and ASN.1 (MS04-007) and by copying itself to network shares protected by weak passwords.

W32/Tilebot-AW includes functionality to access the internet and communicate with a remote server via HTTP.

When first run W32/Tilebot-AW creates the file <System>\rdriv.sys.

The file rdriv.sys is detected as Troj/Rootkit-W.

The following patches for the operating system vulnerabilities exploited by W32/Tilebot-AW can be obtained from the Microsoft website:

http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx

http://www.microsoft.com/technet/security/bulletin/MS04-012.mspx

http://www.microsoft.com/technet/security/bulletin/MS05-039.mspx

http://www.microsoft.com/technet/security/bulletin/MS04-007.mspx

http://www.sophos.com/virusinfo/analyses/w32tilebotaw.html

- Collapse -
W32/Sdbot-AEV
Dec 22, 2005 4:31AM PST

Type
Worm

Aliases
Sdbot.worm.gen.bg
W32.Spybot.Worm

W32/Sdbot-AEV is a worm and IRC backdoor Trojan for the Windows platform.

W32/Sdbot-AEV spreads via file sharing on P2P networks and to other network computers by exploiting common buffer overflow vulnerabilities, including: LSASS (MS04-011), RPC-DCOM (MS04-012), WKS (MS03-049) (CAN-2003-0812), PNP (MS05-039) and ASN.1 (MS04-007).

The following patches for the operating system vulnerabilities exploited by W32/Sdbot-AEV can be obtained from the Microsoft website:

http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx

http://www.microsoft.com/technet/security/bulletin/MS04-012.mspx

http://www.microsoft.com/technet/security/bulletin/MS03-049.mspx

http://www.microsoft.com/technet/security/bulletin/MS05-039.mspx

http://www.microsoft.com/technet/security/bulletin/MS04-007.mspx

http://www.sophos.com/virusinfo/analyses/w32sdbotaev.html

- Collapse -
W32/Sdbot-AEY
Dec 22, 2005 4:33AM PST

Type
Worm

Aliases
Backdoor.Win32.SdBot.ach
W32.Randex

W32/Sdbot-AEY is a worm and IRC backdoor Trojan for the Windows platform.

W32/Sdbot-AEY spreads to other network computers by exploiting common buffer overflow vulnerabilities, including: PNP (MS05-039) and by copying itself to network shares protected by weak passwords.

The following patches for the operating system vulnerabilities exploited by W32/Sdbot-AEY can be obtained from the Microsoft website:

http://www.microsoft.com/technet/security/bulletin/MS05-039.mspx

W32/Sdbot-AEY runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.

http://www.sophos.com/virusinfo/analyses/w32sdbotaey.html

- Collapse -
W32/Sdbot-AEZ
Dec 22, 2005 4:35AM PST

Type
Worm

Aliases
Backdoor.Win32.SdBot.adg
W32.Randex
WORM_RBOT.CAS

W32/Sdbot-AEZ is a worm and IRC backdoor Trojan for the Windows platform.

W32/Sdbot-AEZ spreads to other network computers by exploiting common buffer overflow vulnerabilities, including: PNP (MS05-039) and by copying itself to network shares protected by weak passwords.

The following patches for the operating system vulnerabilities exploited by W32/Sdbot-AEZ can be obtained from the Microsoft website:

http://www.microsoft.com/technet/security/bulletin/MS05-039.mspx

W32/Sdbot-AEZ runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.

http://www.sophos.com/virusinfo/analyses/w32sdbotaez.html

- Collapse -
W32/Sdbot-AFB
Dec 22, 2005 4:38AM PST

Type
Worm

Aliases
Backdoor.Win32.SdBot.acg
Sdbot.worm.gen.bh
W32/Sdbot-AFB is a worm and IRC backdoor Trojan for the Windows platform.

W32/Sdbot-AFB spreads to other network computers by exploiting common buffer overflow vulnerabilities, including: PNP (MS05-039) and by copying itself to network shares protected by weak passwords.

The following patches for the operating system vulnerabilities exploited by W32/Sdbot-AFB can be obtained from the Microsoft website:

http://www.microsoft.com/technet/security/bulletin/MS05-039.mspx

W32/Sdbot-AFB runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.

http://www.sophos.com/virusinfo/analyses/w32sdbotafb.html

- Collapse -
Troj/Lineage-BE
Dec 22, 2005 4:39AM PST
- Collapse -
W32/Bagle-EX
Dec 22, 2005 9:43AM PST

Type Worm

W32/Bagle-EX is an E-mail worm for the Windows platform.
The worm sends email with ZIP file attachments and various subjects and message texts. At the time of writing, these ZIP files and the contained EXE files are detected by Sophos's anti-virus products as Troj/BagleDl-AY.
The email may use one of the following for a message subject:
New Year's
New Year's Day.
Happy New Year
We congratulate happy New Year
The message text may contain either "The password is <image file>" or "Password: <image file>"

http://www.sophos.com/virusinfo/analyses/w32bagleex.html

- Collapse -
Troj/BagleDl-AV
Dec 22, 2005 9:44AM PST
- Collapse -
Troj/BagleDl-AW
Dec 22, 2005 9:45AM PST
- Collapse -
Troj/BagleDl-AX
Dec 22, 2005 9:45AM PST
- Collapse -
Troj/BagleDl-AY
Dec 22, 2005 9:46AM PST