Spyware, Viruses, & Security forum

General discussion

VIRUS ALERTS- July 6, 2005

by Marianna Schmudlach / July 6, 2005 7:04 AM PDT

W32/Forbot-EZ

Type Worm

W32/Forbot-EZ is a network worm with backdoor Trojan functionality for the Windows platform.
Once installed, W32/Forbot-EZ connects to a preconfigured IRC server and joins a channel from which an attacker can issue further commands.

http://www.sophos.com/virusinfo/analyses/w32forbotez.html

Discussion is locked
You are posting a reply to: VIRUS ALERTS- July 6, 2005
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: VIRUS ALERTS- July 6, 2005
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
Troj/Dumaru-BN
by Marianna Schmudlach / July 6, 2005 7:06 AM PDT

Aliases Backdoor.Win32.Dumador.cx

Type Trojan

Troj/Dumaru-BN is a Trojan for the Windows platform.
Troj/Dumaru-BN includes functionality to access the internet and communicate with a remote server via HTTP.
Troj/Dumaru-BN attempts to steal confidential information and send it to a remote location. The Trojan allows a remote intruder to gain access to and control over the computer.
Troj/Dumaru-BN changes settings for Microsoft Internet Explorer by modifying registry entries.
Troj/Dumaru-BN modifies the HOSTS file, changing the URL-to-IP mappings for selected websites, therefore preventing normal access to these sites.

http://www.sophos.com/virusinfo/analyses/trojdumarubn.html

Collapse -
W32/Kelvir-AN
by Marianna Schmudlach / July 6, 2005 7:09 AM PDT

Aliases WORM_KELVIR.M
IM-Worm.Win32.Kelvir.bl

Type Worm

W32/Kelvir-AN is an Instant Messaging worm for the Windows platform.
The worm monitors the status of Windows Messenger and sends the following to all online contacts:
http://[domain removed].com/script.php?data=forum

Collapse -
Dial/DialCa-K
by Marianna Schmudlach / July 6, 2005 7:11 AM PDT

Aliases Trojan.Win32.Diamin.gen

Type Trojan

Dial/DialCa-K is a dialer for the Windows platform.
The application dials a premium rate number.
The application may also change internet security settings and download additional files.

http://www.sophos.com/virusinfo/analyses/dialdialcak.html

Collapse -
W32/Forbot-FA
by Marianna Schmudlach / July 6, 2005 7:13 AM PDT

Type Worm

W32/Forbot-FA is a worm and IRC backdoor Trojan for the Windows platform.
W32/Forbot-FA runs continuously in the background, providing a backdoor server
which allows a remote intruder to gain access and control over the computer via
IRC channels.
W32/Forbot-FA spreads by copying itself to network shares protected by weak passwords.
Once installed, W32/Forbot-FA connects to a preconfigured IRC server and joins a channel from which an attacker can issue further commands.
The worm can spread to unpatched computers affected by the LSASS vulnerability (see MS04-011) and through backdoors left open by the Troj/Optix Trojans.
The following patch for the operating system vulnerability exploited by W32/Forbot-FA can be obtained from the Microsoft website:
MS04-011

http://www.sophos.com/virusinfo/analyses/w32forbotfa.html

Collapse -
W32/Lamar-A
by Marianna Schmudlach / July 6, 2005 7:14 AM PDT
Collapse -
Troj/GrayBird-F
by Marianna Schmudlach / July 6, 2005 7:16 AM PDT

Aliases Backdoor.Win32.GrayBird.bn
BackDoor-AWQ.b

Type Trojan

Troj/GrayBird-B is a backdoor Trojan which allows a remote intruder to gain access and control over the computer.
Once installed Troj/GrayBird-B sends a notification message to a predefined server.
Troj/GrayBird-B includes functionality to:
- silently download, install and run new software
- steal and capture information
- setup an FTP server
- capture audio/video streams
- shutdown Windows
- change the Windows wallpaper
- open/close CD-ROM drives
- modify computer names

http://www.sophos.com/virusinfo/analyses/trojgraybirdf.html

Collapse -
Troj/LegMir-AL
by Marianna Schmudlach / July 6, 2005 7:19 AM PDT

Aliases Trojan-Dropper.Win32.Delf.id
Trojan-PSW.Win32.Lmir.afy

Type Trojan

Troj/LegMir-AL is a password stealing Trojan which attempts to steal passwords and user information of an online game.
Once installed, Troj/LegMir-AL creates the file <Common Files>/Microsoft Shared/msinfo/SysInfo.DLL. This file is also detected as Troj/LegMir-AL.

http://www.sophos.com/virusinfo/analyses/trojlegmiral.html

Collapse -
W32/Rbot-AHI
by Marianna Schmudlach / July 6, 2005 7:20 AM PDT

Aliases IM-Worm.Win32.Bropia.ap
W32/Sdbot.worm.gen.bh

Type Worm

W32/Rbot-AHI is a worm and IRC backdoor Trojan for the Windows platform.
W32/Rbot-AHI spreads:
to other network computers infected with:
- Troj/Kuang,
- Troj/Sub7,
- Troj/NetDevil,
- W32/MyDoom,
- W32/Bagle and
- Troj/Optix
to other network computers by exploiting common buffer overflow vulnerabilites, including:
- LSASS (MS04-011),
- RPC-DCOM (MS04-012),
- WKS (MS03-049) (CAN-2003-0812),
- WebDav (MS03-007),
- MSSQL (MS02-039) (CAN-2002-0649),
- UPNP (MS01-059) and
- Dameware (CAN-2003-1030)
by copying itself to network shares protected by weak passwords
W32/Rbot-AHI includes functionality to:
- steal confidential information
- carry out DDoS flooder attacks
- provide a proxy server
- silently download, install and run new software
The following patches for the operating system vulnerabilities exploited by W32/Rbot-AHI can be obtained from the Microsoft website:
MS04-011
MS04-012
MS03-049
MS03-007
MS02-039
MS01-059

http://www.sophos.com/virusinfo/analyses/w32rbotahi.html

Collapse -
Troj/Bropia-AE
by Marianna Schmudlach / July 6, 2005 7:23 AM PDT

Aliases WORM_BROPIA.L
IM-Worm.Win32.Bropia.ae

Type Trojan

Troj/Bropia-AE is a Trojan for the Windows platform.
Troj/Bropia-AE monitors the status of Windows Messenger contacts and periodically sends the following text to all online contacts:
"lol you ******!"
The Trojan also drops a member of the W32/Forbot family of network worms.

http://www.sophos.com/virusinfo/analyses/trojbropiaae.html

Collapse -
Troj/Tompai-B
by Marianna Schmudlach / July 6, 2005 7:25 AM PDT
Collapse -
W32/Sdbot-ZY
by Marianna Schmudlach / July 6, 2005 7:26 AM PDT

Aliases Backdoor.Win32.SdBot.abc

Type Worm

W32/Sdbot-ZY is a worm and IRC backdoor Trojan for the Windows platform.
W32/Sdbot-ZY spreads by copying itself to network shares protected by weak passwords.
W32/Sdbot-ZY runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.
W32/Sdbot-ZY includes functionality to:
- steal confidential information
- carry out DDoS flooder attacks
- silently download, install and run new software, including updates of its software

http://www.sophos.com/virusinfo/analyses/w32sdbotzy.html

Collapse -
Troj/HacDef-T
by Marianna Schmudlach / July 6, 2005 7:27 AM PDT

Aliases Backdoor.Win32.HacDef.073.b
Trojan.HacDef.073.B
HackerDefender.gen.c
Trojan.Hackdef.084-prog
BKDR_HACDEF.73.B

Type Trojan

Troj/HacDef-T is a backdoor Trojan for the Windows platform.
As well as allowing unauthorized remote access to the victim's computer, Troj/HacDef-T is able to hide information about the victim's system including files, folders, processes, services and registry entries.

http://www.sophos.com/virusinfo/analyses/trojhacdeft.html

Collapse -
W32/Sdbot-ZZ
by Marianna Schmudlach / July 6, 2005 7:29 AM PDT

Type Worm

W32/Sdbot-ZZ is a worm and IRC backdoor Trojan for the Windows platform.
W32/Sdbot-ZZ spreads by copying itself to network shares protected by weak passwords.
W32/Sdbot-ZZ runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.
W32/Sdbot-ZZ includes functionality to silently download, install and run new software, including updates of its software.

http://www.sophos.com/virusinfo/analyses/w32sdbotzz.html

Collapse -
W32/Nemsi-B
by Marianna Schmudlach / July 6, 2005 7:31 AM PDT

Aliases Virus.Win32.Nemsi.b
W32/Nemsi.b
W32.HLLP.Emesix
PE_NEMSI.B

Type Virus

W32/Nemsi-B is a virus for the Windows platform.
W32/Nemsi-B tries to infect Windows executable files. Most files can be disinfected, except when the virus corrupts the file during a failed infection.
On the 29th day of the month, according to the computer's clock, the virus will attempt to delete the following files:
C:\boot.ini
C:\config.sys
C:\autoexec.sys
C:\io.sys
C:\msdos.sys
C:\ntdetect.sys

http://www.sophos.com/virusinfo/analyses/w32nemsib.html

Collapse -
Troj/Vipgsm-F
by Marianna Schmudlach / July 6, 2005 7:33 AM PDT

Aliases Trojan-PSW.Win32.Vipgsm.ad

Type Trojan

Troj/Vipgsm-F is a Trojan for the Windows platform that steals passwords and logs keystrokes and window titles.
Troj/Vipgsm-F includes functionality to access the internet and communicate with a remote server via HTTP.

http://www.sophos.com/virusinfo/analyses/trojvipgsmf.html

Collapse -
Troj/Daemoni-L
by Marianna Schmudlach / July 6, 2005 8:11 AM PDT

Aliases Trojan-Proxy.Win32.Daemonize.az

Type Trojan

Troj/Daemoni-L is a backdoor Trojan which allows a remote intruder to gain access and control over the computer.
Troj/Daemoni-L includes functionality to act as a proxy, access the internet and communicate with a remote server via HTTP.

http://www.sophos.com/virusinfo/analyses/trojdaemonil.html

Collapse -
Troj/Rider-U
by Marianna Schmudlach / July 6, 2005 9:35 AM PDT
Collapse -
Troj/Skulls-Q
by Marianna Schmudlach / July 6, 2005 9:36 AM PDT

Aliases Trojan.SymbOS.Sculler.l
SymbOS/Skulls.bz!sis
SYMBOS_SKULLS.M

Type Trojan

Troj/Skulls-Q is a Trojan developed for mobile phones based on Nokia Series 60 specifications of the Symbian operating system. The Trojan has reportedly been posted on websites containing shareware applications for Symbian phones. The name of the Trojan installation file may be X-Ray Full byDotSis.SIS.
When the SIS installation file is installed it creates a number of files on the C: drive of the phone (RAM). The files are installed with the same path as the ROM system executables located on the Z:. Since the files installed with the same path in the drive C: take precedence over files in Z: all the application files are effectively replaced by the ones installed by the Trojan SIS file.

http://www.sophos.com/virusinfo/analyses/trojskullsq.html

Collapse -
Troj/Ciadoor-K
by Marianna Schmudlach / July 6, 2005 9:37 AM PDT

Aliases Backdoor.Win32.Ciadoor.13
BackDoor-ASB.gen
Backdoor.Ciadoor

Type Trojan

Troj/Ciadoor-K is a backdoor Trojan for the Windows platform.
Troj/Ciadoor-K runs in the background listening on a preconfigured TCP port for connections from a remote intruder.

http://www.sophos.com/virusinfo/analyses/trojciadoork.html

Collapse -
Troj/Dloader-PX
by Marianna Schmudlach / July 6, 2005 9:38 AM PDT
Collapse -
Troj/Teadoor-D
by Marianna Schmudlach / July 6, 2005 9:39 AM PDT

Aliases Trojan-Downloader.Win32.Agent.qq

Type Trojan

Troj/Teadoor-D is a backdoor Trojan which allows a remote intruder to gain access and control over the computer.
Troj/Teadoor-D includes functionality to access the internet and communicate with a remote server via HTTP.

http://www.sophos.com/virusinfo/analyses/trojteadoord.html

Collapse -
Troj/Dloader-PY
by Marianna Schmudlach / July 6, 2005 9:40 AM PDT
Collapse -
W32/Kelvir-AO
by Marianna Schmudlach / July 6, 2005 9:40 AM PDT

Type Worm

W32/Kelvir-AO is an instant messenger worm for the Windows platform.
W32/Kelvir-AO spreads by sending a message through Windows Messenger to the infected user's contacts. The message encourages the recipient to visit a web page to download a file which is usually a copy of the worm.
The worm drops a file which is detected by Sophos's anti-virus products as W32/Rbot-AHO

http://www.sophos.com/virusinfo/analyses/w32kelvirao.html

Collapse -
W32/Rbot-AHO
by Marianna Schmudlach / July 6, 2005 9:41 AM PDT

Type Worm

W32/Rbot-AHO is a worm and IRC backdoor Trojan for the Windows platform.
W32/Rbot-AHO runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.
W32/Rbot-AHO can spread to remote network shares protected by weak passwords. The worm may also be dropped by W32/Kelvir-AO.

http://www.sophos.com/virusinfo/analyses/w32rbotaho.html

Collapse -
Troj/Puper-Q
by Marianna Schmudlach / July 6, 2005 9:42 AM PDT

Aliases Trojan.Win32.Puper.q

Type Trojan

Troj/Puper-Q is a browser-hijacking Trojan.
The Trojan changes settings for Microsoft Internet Explorer including Start Page and search settings.
The Trojan monitors Internet Explorer sessions and may redirect HTTP requests to alternate websites.

http://www.sophos.com/virusinfo/analyses/trojpuperq.html

Collapse -
Troj/Banito-G
by Marianna Schmudlach / July 6, 2005 9:43 AM PDT

Aliases Backdoor.Win32.Banito.s
BackDoor-CCL

Type Trojan

Troj/Banito-G is a backdoor Trojan for the Windows platform.
The Trojan allows a remote user to have unauthorized access to an infected computer. Troj/Banito-G includes a keylogging component that records user keystrokes.

http://www.sophos.com/virusinfo/analyses/trojbanitog.html

Popular Forums
icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

GIVEAWAY

We are giving away 'Black Panther' swag!

Four lucky readers will be taking home *Marvel*ous "Black Panther" prizes, including magazines autographed by the King of Wakanda himself! Giveaway ends Feb. 25, 2018.