Thank you for being a valued part of the CNET community. As of December 1, 2020, the forums are in read-only format. In early 2021, CNET Forums will no longer be available. We are grateful for the participation and advice you have provided to one another over the years.

Thanks,

CNET Support

General discussion

VIRUS ALERTS - January 8, 2006

Jan 8, 2006 1:42AM PST

W32/Loosky-S

Type
Spyware Worm

Aliases
Email-Worm.Win32.Locksky.r
W32/Loosky.dr

W32/Loosky-S is a multi-component email worm with Trojan functionality for the Windows platform.

W32/Loosky-S attempts to bypass the Windows firewall.

W32/Loosky-S will steal user passwords, window text and website information related to certain banking sites.

W32/Loosky-S acts as a proxy, rerouting information through the infected computer.

W32/Loosky-S attempts to send itself to email addresses harvested from the infected computer. Emails sent have the following characteristics:

Subject line: Your mail Account is Suspended

Message text:

We regret to inform you that your account has been suspended due to the violation of our site policy, more info is attached.

Attachment name: acc_inf19.exe

W32/Loosky-S notifies a remote site and will attempt to download and execute update files.

http://www.sophos.com/virusinfo/analyses/w32looskys.html

Discussion is locked

- Collapse -
Troj/ServU-BW
Jan 8, 2006 1:43AM PST
- Collapse -
Troj/Animoo-D
Jan 8, 2006 1:46AM PST
- Collapse -
Troj/RKFile-A
Jan 8, 2006 1:49AM PST

Type
Trojan

Aliases
SpamTool.Win32.Mailbot.b
Proxy-Xmaib
Hacktool.Rootkit

Troj/RKFile-A is a Trojan rootkit for the Windows platform.

Troj/RKFile-A attempts to hide information about certain files and registry entries as passed to it by another program, providing stealthing by directly manipulating structures in the system kernel.

http://www.sophos.com/virusinfo/analyses/trojrkfilea.html

- Collapse -
Troj/Masot-B
Jan 8, 2006 1:51AM PST

Type
Trojan

Troj/Masot-B is a configurable backdoor Trojan.

The Trojan runs a web server on the infected system which provides access to a remote attacker. Backdoor functionality includes being able to steal files, capture screen images and list and terminate processes. The Trojan may also disable the Windows firewall.

Troj/Masot-B may be configured to display a fake error message when first run.

Troj/Masot-B may send reports to a remote user by email.

http://www.sophos.com/virusinfo/analyses/trojmasotb.html

- Collapse -
Troj/RemShell-B
Jan 8, 2006 1:52AM PST
- Collapse -
Troj/Mdrop-IZ
Jan 8, 2006 2:01AM PST
- Collapse -
Troj/Dumahm-A
Jan 8, 2006 2:03AM PST
- Collapse -
Troj/VBbot-R
Jan 8, 2006 2:04AM PST

Type
Trojan

Troj/VBbot-R is a DDOS Trojan for the Windows platform.

The Trojan connects to a remote IRC server, joins a specific channel and awaits denial-of-service instructions.

Additionally the Trojan will attempt to update itself from a remote website.

http://www.sophos.com/virusinfo/analyses/trojvbbotr.html

- Collapse -
W32/Rbot-BJH
Jan 8, 2006 6:53AM PST

Type Worm

Aliases Backdoor.Win32.Rbot.amr
W32/Sdbot.worm.gen.h

W32/Rbot-BJH is a worm and IRC backdoor Trojan for the Windows platform.
W32/Rbot-BJH spreads to other network computers by exploiting common buffer overflow vulnerabilities, including: RPC-DCOM (MS04-012), PNP (MS05-039) and ASN.1 (MS04-007).
W32/Rbot-BJH runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.

http://www.sophos.com/virusinfo/analyses/w32rbotbjh.html

- Collapse -
W32/Sdranck-X
Jan 8, 2006 6:54AM PST

Type Worm

Aliases Backdoor.Win32.SdBot.gen
Trojan-Proxy.Win32.Ranky.gen
Proxy-FBSR.gen

W32/Sdranck-X is a multi-component network worm.
W32/Sdranck-X uses a dropped file detected as W32/Sdbot-Fam to spread W32/Sdranck-X to network shares with weak passwords.

http://www.sophos.com/virusinfo/analyses/w32sdranckx.html

- Collapse -
Troj/Ifradv-A
Jan 8, 2006 6:55AM PST
- Collapse -
Troj/Vixup-AE
Jan 8, 2006 6:56AM PST
- Collapse -
Troj/SmDown-D
Jan 8, 2006 6:57AM PST
- Collapse -
Troj/Certif-P
Jan 8, 2006 6:58AM PST
- Collapse -
Troj/SkledKit-A
Jan 8, 2006 6:59AM PST
- Collapse -
Troj/Skled-A
Jan 8, 2006 7:00AM PST
- Collapse -
Troj/Zlob-DV
Jan 8, 2006 9:26AM PST
- Collapse -
Troj/Zlob-EE
Jan 8, 2006 9:27AM PST
- Collapse -
Troj/Ranck-DU
Jan 8, 2006 9:28AM PST
- Collapse -
Troj/Banker-TN
Jan 8, 2006 9:29AM PST
- Collapse -
Troj/DownLdr-QX
Jan 8, 2006 9:30AM PST
- Collapse -
Troj/Banload-HP
Jan 8, 2006 9:31AM PST
- Collapse -
Troj/Banload-QW
Jan 8, 2006 9:32AM PST
- Collapse -
Troj/Banload-HQ
Jan 8, 2006 9:32AM PST
- Collapse -
Troj/Banker-TV
Jan 8, 2006 9:33AM PST
- Collapse -
Troj/BluEye-E
Jan 8, 2006 9:34AM PST

Type Trojan

Aliases Backdoor.Win32.BlueEye.10b
BackDoor-CHJ.cli
BKDR_BLUEEYE.10

Troj/BluEye-E is a backdoor generator toolkit. The Trojan is capable of recording keystrokes and opening a backdoor to allow access to the file server on the victim's computer. The keystrokes will be saved in a log file which the intruder can access via the backdoor.

http://www.sophos.com/virusinfo/analyses/trojblueyee.html

- Collapse -
Troj/Banker-TY
Jan 8, 2006 9:35AM PST

Type Spyware Trojan

Aliases Trojan-Spy.Win32.Banker.ahy

Troj/Banker-TY is a Trojan for the Windows platform.
The Trojan monitors internet sessions and captures keypresses entered into web forms on certain banking web sites. Stolen credentials are sent to a remote attacker via email.

http://www.sophos.com/virusinfo/analyses/trojbankerty.html