Spyware, Viruses, & Security forum

General discussion

VIRUS ALERTS - June 9, 2004

by Marianna Schmudlach / June 9, 2004 1:09 AM PDT

W32/Rbot-AA

Aliases
Backdoor.Rbot.gen, W32/Sdbot.worm.gen.g virus, W32.Spybot.Worm

Type
Win32 worm

Description
W32/Rbot-AA is a worm which attempts to spread to remote network shares. It
also contains backdoor Trojan functionality, allowing unauthorised remote
access to the infected computer via IRC channels while running in the
background as a service process.
W32/Rbot-AA spreads to network shares with weak passwords as a result of the
backdoor Trojan element receiving the appropriate command from a remote user.

More: http://www.sophos.com/virusinfo/analyses/w32rbotaa.html

Discussion is locked
You are posting a reply to: VIRUS ALERTS - June 9, 2004
The posting of advertisements, profanity, or personal attacks is prohibited. Please refer to our CNET Forums policies for details. All submitted content is subject to our Terms of Use.
Track this discussion and email me when there are updates

If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.

You are reporting the following post: VIRUS ALERTS - June 9, 2004
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Collapse -
W32/Sdboter-E
by Marianna Schmudlach / June 9, 2004 1:11 AM PDT
Collapse -
Troj/Dloader-U
by Marianna Schmudlach / June 9, 2004 1:13 AM PDT

Type
Trojan

Description
Troj/Dloader-U drops a file to the Windows folder named svchost.exe and creates the following registry entry so that this file is run when a user logs on to Windows:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Windows Default Configuration = svchost.exe

When this file is run it will attempt to download and execute several files.

http://www.sophos.com/virusinfo/analyses/trojdloaderu.html

Collapse -
Troj/Dloader-W
by Marianna Schmudlach / June 9, 2004 1:15 AM PDT
Collapse -
Troj/Small-Z
by Marianna Schmudlach / June 9, 2004 1:17 AM PDT
Collapse -
Troj/Small-AK
by Marianna Schmudlach / June 9, 2004 1:18 AM PDT

Type
Trojan

Description
Troj/Small-AK is a Trojan downloader.
Troj/Small-AK creates the following registry entry so that the Trojan is run when a user logs on to Windows:

HKLM\Software\Microsoft\Windows\CurrentVersion\
Run\WinTime = <System>\WinTime.exe


http://www.sophos.com/virusinfo/analyses/trojsmallak.html

Collapse -
W32/Sdbot-IX
by Marianna Schmudlach / June 9, 2004 1:20 AM PDT

Type
Win32 worm

Description
W32/Sdbot-IX is a worm which attempts to spread to remote network shares. It
also contains backdoor Trojan functionality, allowing unauthorised remote
access to the infected computer via IRC channels while running in the
background as a service process.
W32/Sdbot-IX drops two files to the folder C:\WinNT\system32. One is dropped
as GQGQET.EXE and is also detected as W32/Sdbot-IX, the other is dropped as
SDWD.EXE and is detected as Troj/Ranck-T.


More: http://www.sophos.com/virusinfo/analyses/w32sdbotix.html

Collapse -
Troj/Ranck-W
by Marianna Schmudlach / June 9, 2004 1:22 AM PDT

Aliases
Proxy-FBSR.gen

Type
Trojan

Description
Troj/Ranck-W is a proxy Trojan that allows a remote intruder to route HTTP
traffic through the computer.
Troj/Ranck-W sets an entry in the registry at the following location so as to
run itself on system startup:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Msn Home

Troj/Ranck-W runs continuously in the background listening on a port.

http://www.sophos.com/virusinfo/analyses/trojranckw.html

Collapse -
Troj/Spooner-B
by Marianna Schmudlach / June 9, 2004 1:24 AM PDT

Type
Trojan

Description
Troj/Spooner-B will create links to a search engine on certain words and phrases that appear on the HTML being displayed by Internet Explorer.
The links are generated in memory and no files including the cached HTML documents are actually modified by the Trojan.


More: http://www.sophos.com/virusinfo/analyses/trojspoonerb.html

Collapse -
Troj/StartPa-BK
by Marianna Schmudlach / June 9, 2004 1:26 AM PDT

Type
Trojan

Description
Troj/StartPa-BK changes a number of Microsoft Internet Explorer settings and modifies the HOSTS file located at %SYSTEM%\drivers\etc\hosts, mapping
several URLs to the localhost.
Troj/StartPa-BK changes the start page for Internet Explorer by setting the registry entries:

HKLM\Software\Microsoft\Internet Explorer\Main\
Start Page = http://213.159.117.132/redir.php

HKCU\Software\Microsoft\Internet Explorer\Main\
Start Page = http://213.159.117.132/redir.php

http://www.sophos.com/virusinfo/analyses/trojstartpabk.html

Collapse -
W32/Agobot-JP
by Marianna Schmudlach / June 9, 2004 1:28 AM PDT

Aliases
Backdoor.Agobot.gen, W32/Gaobot.worm.gen.d virus, W32.HLLW.Gaobot.gen, WORM_AGOBOT.IY

Type
Win32 worm

Description
W32/Agobot-JP is a backdoor Trojan and worm which spreads to computers
protected by weak passwords.
When first run, W32/Agobot-JP moves itself to the Windows system folder as
windns32.exe and creates the following registry entries to run itself on
startup:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
Windows TaskManager Service

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\
Windows TaskManager Service


More: http://www.sophos.com/virusinfo/analyses/w32agobotjp.html

Collapse -
Troj/Tofger-Y
by Marianna Schmudlach / June 9, 2004 1:29 AM PDT
Collapse -
W32/Agobot-JQ
by Marianna Schmudlach / June 9, 2004 1:31 AM PDT

Aliases
Gaobot, Phatbot, Agobot3

Type
Win32 worm

Description
W32/Agobot-JQ is a worm that spreads via unpatched machines affected by
RPC/DCOM vulnerabilities.
In order to run automatically when Windows starts up the worm copies itself to
the file lrbz32.exe in the Windows system folder and adds the following registry entries:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\
LRBZ Utility 32 = lrbz32.exe

HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices\
LRBZ Utility 32 = lrbz32.exe


More: http://www.sophos.com/virusinfo/analyses/w32agobotjq.html

Collapse -
Troj/DLoader-T
by Marianna Schmudlach / June 9, 2004 1:33 AM PDT

Aliases
TrojanDownloader.Win32.VB.db

Type
Trojan

Description
Troj/DLoader-T is a malicious ActiveX object. When triggered, it will attempt to
download file from internet, and setup autorun registry key in
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

It also attempt to connects to a website to report the existance of the malicious
software.

http://www.sophos.com/virusinfo/analyses/trojdloadert.html

Collapse -
W95/Orko-A
by Marianna Schmudlach / June 9, 2004 1:35 AM PDT

Aliases
Win32.Koru

Type
Windows 95 executable file virus

Description
W95/Orko-A is an appending virus which attempts to infect Windows EXE (PE) files in the current directory. When an infected file is started, the viral component is executed first and then control is transfered back to the host which runs as normal.

http://www.sophos.com/virusinfo/analyses/w95orkoa.html

Collapse -
W32/Rbot-AC
by Marianna Schmudlach / June 9, 2004 1:37 AM PDT

Aliases
Backdoor.Rbot.gen

Type
Win32 worm

Description
W32/Rbot-AC is a worm which attempts to spread to remote network shares. It
also contains backdoor Trojan functionality, allowing unauthorised remote
access to the infected computer via IRC channels while running in the
background as a service process.
W32/Rbot-AC spreads to network shares with weak passwords as a result of the
backdoor Trojan element receiving the appropriate command from a remote user.

More: http://www.sophos.com/virusinfo/analyses/w32rbotac.html

Collapse -
Troj/Lamedon-G
by Marianna Schmudlach / June 9, 2004 1:39 AM PDT

Aliases
Downloader.IZ, StartPage.ES

Type
Trojan

Troj/Lamedon-G downloads and executes files from URLs specified by the
author.
Troj/Lamedon-G downloads files to the Windows folder with the following
filenames:

secure.html
securea.html
secureb.html
reg32.exe
test
dl.exe
dl.html
dlm.exe
dlm.html
toffel32.exe
consol32.exe
mstaskss.exe
mssys.exe

The Trojan then executes dl.exe, dlm.exe, toffel32.exe, consol32.exe,
mstaskss.exe and mssys.exe.

More: http://www.sophos.com/virusinfo/analyses/trojlamedong.html

Collapse -
Troj/Lamedon-H
by Marianna Schmudlach / June 9, 2004 1:41 AM PDT

Aliases
StartPage.CJ, StartPage.ES

Type
Trojan

Description
Troj/Lamedon-H is a downloading Trojan.
Troj/Lamedon-H downloads a file from a preconfigured URL to the Windows
folder with the name reg33.exe. (At time of writing, this URL was unavailable.)
The Trojan then creates the following registry entry so that the downloaded file is run on startup:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\
Reg32 = <windows>\reg33.exe


More: http://www.sophos.com/virusinfo/analyses/trojlamedonh.html

Collapse -
W32/Bagle-Zip
by Marianna Schmudlach / June 9, 2004 1:43 AM PDT

Aliases
Win32/Bagle.gen.zip

Type
Win32 worm

Description
Sophos Anti-Virus detects as W32/Bagle-Zip the password-protected archive files created by W32/Bagle-F, W32/Bagle-G, W32/Bagle-H, W32/Bagle-I, W32/Bagle-J, W32/Bagle-K (ZIP archives), W32/Bagle-N, W32/Bagle-O (ZIP and RAR archives), W32/Bagle-W and W32/Bagle-AA.

http://www.sophos.com/virusinfo/analyses/w32baglezip.html

Collapse -
Trojan.Gletta.A
by Marianna Schmudlach / June 9, 2004 1:45 AM PDT

Discovered on: June 09, 2004
Last Updated on: June 09, 2004 07:44:55 AM

Trojan.Gletta.A is a trojan that steals internet banking passwords. It logs keystrokes in certain web pages and sends the log to an external email account.

Trojan.Gletta.A is known to be distributed by web pages that link to .CHM files in order to exploit the Microsoft Internet Explorer ITS Protocol Zone Bypass Vulnerability (BID 9658).




Type: Trojan Horse
Infection Length: 33,792 bytes, 17920 bytes

http://securityresponse.symantec.com/avcenter/venc/data/trojan.gletta.a.html

Collapse -
WORM_RBOT.AF
by Marianna Schmudlach / June 9, 2004 1:48 AM PDT

Virus type: Worm

Destructive: No

Description:


This worm spreads through network shares. It uses NetBEUI functions to gather available lists of user names and passwords. It uses these user names and passwords to drop a copy of itself in available network shares.

It drops a copy of itself in the Windows system folder using the file name WSERV32.EXE.

This worm also uses a certain list of user names and passwords aside from those that it is able to gather. It also generates random IP addresses and attempts to drop a copy of itself in default folders of target addresses.

More: http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_RBOT.AF

Collapse -
Troj/Dedler-A
by Marianna Schmudlach / June 9, 2004 1:52 AM PDT

Type
Trojan

Description
Troj/Dedler-A is a downloader Trojan which attempts to download executable files from a remote location and run them.
When first run Troj/Dedler-A copies itself to the Windows System32 folder as SMRSS.EXE and adds its pathname to one of the following new registry entries
to run SMRSS.EXE automatically on startup:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ActiveXUpdate

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\MicrosoftOEM

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\SoundControl

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\OfficeGuardUI

http://www.sophos.com/virusinfo/analyses/trojdedlera.html

Collapse -
WM97/Adrine-A
by Marianna Schmudlach / June 9, 2004 1:54 AM PDT

Type
Word 97 macro virus

Description
WM97/Adrine-A is a complex word virus. As well as infecting Normal.dot
it will create infected templates in the Word Startup folder and Word Template
folder called "Root.dot" and "debug.dot" respectively. WM97/Adrine-A will change the office details to:
Username = "AnDReNaLinE (HaEZa_tSu)"
Initials = "BL"
Useraddress = "BaNdUnG , InDoNesiaN"

http://www.sophos.com/virusinfo/analyses/wm97adrinea.html

Collapse -
W32/Rbot-AB
by Marianna Schmudlach / June 9, 2004 1:56 AM PDT

Type
Win32 worm

Description
W32/Rbot-AB is a worm which attempts to spread to remote network shares. It
also contains backdoor Trojan functionality, allowing unauthorised remote access to the infected computer via IRC channels while running in the background as a service process.
W32/Rbot-AB spreads to network shares with weak passwords as a result of the
backdoor Trojan element receiving the appropriate command from a remote user.

More: http://www.sophos.com/virusinfo/analyses/w32rbotab.html

Collapse -
Troj/Agent-AI
by Marianna Schmudlach / June 9, 2004 1:58 AM PDT

Type
Trojan

Description
Troj/Agent-AI will create the following four files in the windows System directory
so it can install itself:
Latterpy.dll,LayerInstall.exe, layerpop.ini and Sporder.dll.

Troj/Agent-AI may attempt to delete all of these files with the exception of Latterypy.dll which is used by the backdoor trojan.

Troj/Agent-AI will create numerous registry entries under the following key:

HKLM\SYSTEM\ControlSet001\Services\WS2IFSL\

and modify entries under the following key

HKLM\SYSTEM\CurrentControlSet\Services\WinSock\Parameters\
Protocol_Catalog9

http://www.sophos.com/virusinfo/analyses/trojagentai.html

Collapse -
X97M.Crex
by Marianna Schmudlach / June 9, 2004 1:23 PM PDT

Discovered on: June 09, 2004
Last Updated on: June 09, 2004 04:07:07 PM

X97M.Crex is a macro virus that infects Microsoft Excel 97 (and later) spreadsheets. If the system date is greater than January 2, 2004, it will attempt to remove the component, "universelle."



Type: Macro
Infection Length: 1,552 bytes


http://securityresponse.symantec.com/avcenter/venc/data/x97m.crex.html

Collapse -
Backdoor.Berbew.E
by Marianna Schmudlach / June 9, 2004 1:26 PM PDT

Discovered on: June 09, 2004
Last Updated on: June 09, 2004 02:47:38 PM

Backdoor.Berbew.E is a backdoor Trojan horse that gives an attacker access to your computer. The Trojan opens TCP ports 23232 and 32121, by default.

This Trojan is packed with MPPEC.




Type: Trojan Horse
Infection Length: 65,747 bytes, 6,145 bytes

http://securityresponse.symantec.com/avcenter/venc/data/backdoor.berbew.e.html

Collapse -
W32.Tubty.A@mm
by Marianna Schmudlach / June 9, 2004 1:28 PM PDT

Discovered on: June 08, 2004
Last Updated on: June 09, 2004 09:50:46 AM

W32.Tubty.A@mm is a mass-mailing worm that uses its own SMTP engine to send itself to all the contacts in the Windows Address Book. The email hast he subject: "MESSAGE_ID:" and the attachment is "photos.exe."



Type: Worm
Infection Length: 7,170 bytes

When W32.Tubty.A@mm runs, it does the following:


Retrieves email addresses from the Windows email address book.


Uses its own SMTP engine to send itself to all the email addresses that it finds.

The email has the following characteristics:

From: ballfruit@mail.ru

Subject: MESSAGE_ID:<zzz>

Attachment: photos.exe

Message: Hello, I'm sorry about last night. I was acting stubborn and impatient and I regret it. Sometimes I say things without thinking and it comes out wrong. I never mean to hurt you, I hope you know that. There's one thing you should know about me- It's always beenballfruit@mail.ru


Downloads and runs a file from a predefined Web site. The downloaded file is a password stealer.

http://securityresponse.symantec.com/avcenter/venc/data/w32.tubty.a@mm.html

Collapse -
W32.Gaobot.AQS
by Marianna Schmudlach / June 9, 2004 1:31 PM PDT

Discovered on: June 07, 2004
Last Updated on: June 09, 2004 05:20:58 PM

W32.Gaobot.AQS is a worm that spreads through open network shares and several Windows vulnerabilities including:


The DCOM RPC Vulnerability (described in Microsoft Security Bulletin MS03-026) using TCP port 135.
The WebDav Vulnerability (described in Microsoft Security Bulletin MS03-007) using TCP port 80.
Exploits the Microsoft Windows Local Security Authority Service Remote Buffer Overflow (described in Microsoft Security Bulletin MS04-011).

W32.Gaobot.AQS can act as a backdoor server program and attack other systems. It attempts to stop the processes of many antivirus and security programs.



Type: Worm
Infection Length: 91,815 bytes

http://securityresponse.symantec.com/avcenter/venc/data/w32.gaobot.aqs.html

Collapse -
VBS_PUB.A
by Marianna Schmudlach / June 9, 2004 1:33 PM PDT

Virus type: VBScript

Destructive: No

Description:


This malicious Visual Basic (VB) script spreads via email. It does this by gathering email addresses and sending a copy of itself using Messaging Application Program Interface.

It also propagates via network shares by locating all available mapped drives in the system and dropping copies of itself on these drives.

This malware also has the ability to infect files with certain extension names.

It runs on Windows 95, 98, ME, NT, 2000, and XP.

http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=VBS_PUB.A

Popular Forums
icon
Computer Newbies 10,686 discussions
icon
Computer Help 54,365 discussions
icon
Laptops 21,181 discussions
icon
Networking & Wireless 16,313 discussions
icon
Phones 17,137 discussions
icon
Security 31,287 discussions
icon
TVs & Home Theaters 22,101 discussions
icon
Windows 7 8,164 discussions
icon
Windows 10 2,657 discussions

GIVEAWAY

Turn up the volume with our Apple Byte sweeps!

Two lucky winners will take home the coveted smart speaker that lets Siri help you around your connected house. This sweepstake ends Feb. 25, 2018.