Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

VIRUS ALERTS - December 25, 2005

Dec 25, 2005 2:01PM PST

Discussion is locked

- Collapse -
Troj/Kango-B
Dec 25, 2005 2:02PM PST
- Collapse -
W32/Rbot-BFP
Dec 25, 2005 2:02PM PST

Type Worm

W32/Rbot-BFP is a worm and with backdoor functionality for the Windows platform.
W32/Rbot-BFP spreads:
- to other network computers infected with: Troj/Kuang, Troj/Sub7, W32/Sasser, Troj/NetDevil, W32/MyDoom, W32/Bagle and Troj/Optix
- to other network computers by exploiting common buffer overflow vulnerabilities, including: LSASS (MS04-011), RPC-DCOM (MS04-012), WKS (MS03-049) (CAN-2003-0812), WebDav (MS03-007), UPNP (MS01-059) and Dameware (CAN-2003-1030)
- by copying itself to network shares and MSSQL servers protected by weak passwords
W32/Rbot-BFP can be controlled by a remote attacker over IRC channels. The backdoor component of W32/Rbot-BFP can be instructed by a remote user to perform the following functions:
start an FTP server
start a Proxy server
start a web server
take part in distributed denial of service (DDoS) attacks
packet sniffing
port scanning
download/execute arbitrary files
start a remote shell (RLOGIN)

http://www.sophos.com/virusinfo/analyses/w32rbotbfp.html

- Collapse -
W32/Rbot-BFQ
Dec 25, 2005 2:03PM PST

Type Spyware Worm

Aliases WORM_SDBOT.CSB

W32/Rbot-BFQ is a worm for the Windows platform.
W32/Rbot-BFQ spreads to other network computers by exploiting common buffer overflow vulnerabilities, including: LSASS (MS04-011) and RPC-DCOM (MS04-012) and by network shares protected by weak passwords.
W32/Rbot-BFQ can be controlled by a remote attacker over IRC channels. The backdoor component of W32/Rbot-BFQ can be instructed by a remote user to perform the following functions:
start an FTP server
start a Proxy server
start a web server
take part in distributed denial of service (DDoS) attacks
log keypresses
capture screen/webcam images
packet sniffing
port scanning
download/execute arbitrary files
start a remote shell (RLOGIN)
steal product registration information from certain software

http://www.sophos.com/virusinfo/analyses/w32rbotbfq.html

- Collapse -
Troj/Small-FR
Dec 25, 2005 2:04PM PST
- Collapse -
Troj/Dloadr-AHL
Dec 25, 2005 2:05PM PST

Type Trojan

Aliases TROJ_DLOADER.AHL

Troj/Dloadr-AHL is a Trojan for the Windows platform.
Troj/Dloadr-AHL includes functionality to download, install and run new software.
When Troj/Dloadr-AHL is installed it creates the file <Windows>\Tasks\Kuho_Install_Program.job in order to be run by the Windows task scheduler.

http://www.sophos.com/virusinfo/analyses/trojdloadrahl.html

- Collapse -
Troj/Bdoor-CSN
Dec 25, 2005 2:06PM PST
- Collapse -
Troj/Flood-ET
Dec 25, 2005 2:07PM PST

Type Trojan

Troj/Flood-ET is a Trojan for the Windows platform.
Troj/Flood-ET runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.

http://www.sophos.com/virusinfo/analyses/trojfloodet.html

- Collapse -
Troj/ServU-BQ
Dec 25, 2005 2:08PM PST

Type Trojan

Aliases Backdoor.Win32.ServU-based.u

Troj/ServU-BQ is a modified version of a commercial FTP application, which can act as a backdoor Trojan.
Troj/ServU-BQ runs continuously in the background providing an FTP server on a TCP port specified in its configuration file (the default is port 4395Cool.

http://www.sophos.com/virusinfo/analyses/trojservubq.html

- Collapse -
W32/Sdbot-AIM
Dec 25, 2005 2:09PM PST

Type Worm

Aliases Backdoor.Win32.SdBot.aix
W32/Sdbot.worm.gen.bp

W32/Sdbot-AIM is a worm and IRC backdoor Trojan for the Windows platform.
W32/Sdbot-AIM runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.

http://www.sophos.com/virusinfo/analyses/w32sdbotaim.html

- Collapse -
W32/Rbot-BDT
Dec 25, 2005 2:10PM PST
- Collapse -
W32/Spybot-EP
Dec 25, 2005 2:11PM PST