General discussion

VIRUS ALERTS - October 7, 2004

W32/Forbot-AY

Aliases Backdoor.Win32.Wootbot.gen
W32/Gaobot.worm.gen.g
WORM_WOOTBOT.GEN

Type Worm

W32/Forbot-AY is a worm which attempts to spread to remote network shares. It also contains backdoor Trojan functionality, allowing unauthorised remote access to the infected computer via IRC channels while running in the background as a service process.
W32/Forbot-AY attempts to spread to network machines using various exploits including the LSASS vulnerability (see MS04-011). The worm may also spread via IRC channels.
W32/Forbot-AY may act as a proxy, delete network shares and steal keys for various software products

http://www.sophos.com/virusinfo/analyses/w32forbotay.html

Discussion is locked
Follow
Reply to: VIRUS ALERTS - October 7, 2004
PLEASE NOTE: Do not post advertisements, offensive materials, profanity, or personal attacks. Please remember to be considerate of other members. If you are new to the CNET Forums, please read our CNET Forums FAQ. All submitted content is subject to our Terms of Use.
Reporting: VIRUS ALERTS - October 7, 2004
This post has been flagged and will be reviewed by our staff. Thank you for helping us maintain CNET's great community.
Sorry, there was a problem flagging this post. Please try again now or at a later time.
If you believe this post is offensive or violates the CNET Forums' Usage policies, you can report it below (this will not automatically remove the post). Once reported, our moderators will be notified and the post will be reviewed.
Comments
- Collapse -
Troj/Dloader-EI
- Collapse -
Troj/Dloader-EN
- Collapse -
Troj/LdPinch-X
- Collapse -
Troj/Delf-GS

Type Trojan

Troj/Delf-GS is a backdoor Trojan.
Troj/Delf-GS copies itself to the Windows System folder using one of several possible filenames and creates a registry entry in order to run on system startup.
Troj/Delf-GS displays the following bogus error message upon execution :
"Incompativel com essa versao do Windows"
Troj/Delf-GS can log key strokes and other sensitive information and email this to the intruder's email address.

http://www.sophos.com/virusinfo/analyses/trojdelfgs.html

- Collapse -
Troj/Banker-DQ
- Collapse -
Troj/Nethief-F
- Collapse -
Troj/Tofger-AF
- Collapse -
Troj/Agent-W
- Collapse -
W32/Rbot-LX

Aliases Backdoor.Win32.Rbot.gen
W32/Sdbot.worm.gen.j

Type Worm

W32/Rbot-LX is a worm which attempts to spread to remote network shares. It also contains backdoor Trojan functionality, allowing unauthorised remote access to the infected computer via IRC channels while running in the background as a service process. The worm may also spread via IRC channels.
W32/Rbot-LX may use various exploits, including RPC-DCOM and LSASS.
W32/Rbot-LX may attempt to terminate various anti-virus and security products.
W32/Rbot-LX may open a remote command shell, delete network shares, capture webcam images, log keypresses, participate in DDOS attacks and steal keys for various
software products.

http://www.sophos.com/virusinfo/analyses/w32rbotlx.html

- Collapse -
W32/Rbot-LY
- Collapse -
Troj/Banker-DR
- Collapse -
Troj/Webdor-H

Aliases Backdoor.Win32.Webdor.h &
BackDoor-CJS

Type Trojan

Troj/Webdor-H is a backdoor Trojan which allows remote access and control over the computer.
The Troj/Webdor-H code is injected into other active processes, including system processes.

http://www.sophos.com/virusinfo/analyses/trojwebdorh.html

- Collapse -
Troj/Madtol-B

Aliases TrojanDropper.Win32.Delf.eq
BackDoor-CJS

Type Trojan

Troj/Madtol-B is a Trojan dropper which extracts code stored within its resource section and injects it directly into other active processes, including system processes such as Explorer.

http://www.sophos.com/virusinfo/analyses/trojmadtolb.html

- Collapse -
Troj/ByteVeri-J
- Collapse -
W32/Rbot-MA

Aliases Backdoor.Win32.Rbot.gen

Type Worm

W32/Rbot-MA is a network worm and backdoor for the Windows platform.
The worm spreads to network shares and computers with unpatched operating system vulnerabilities.
The backdoor component connects to a predefined IRC server and waits for commands from a remote attacker.
Patches for the operating system vulnerabilities exploited by W32/Rbot-MA can be obtained from Microsoft at:
http://www.microsoft.com/technet/security/bulletin/ms04-012.mspx
http://www.microsoft.com/technet/security/bulletin/ms04-011.mspx
Sophos anti-virus products since version 3.85 have been capable of detecting this worm as W32/Rbot-Fam without requiring an update.

http://www.sophos.com/virusinfo/analyses/w32rbotma.html

- Collapse -
W32/Rbot-MB

Aliases Backdoor.Win32.Rbot.gen

Type Worm

W32/Rbot-MB is a network worm and backdoor Trojan for the Windows platform.
W32/Rbot-MB allows a malicious user remote access to an infected computer.
In order to run automatically when Windows starts up W32/Rbot-MB creates the following registry entries:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\
Sygate Personal Firewall Start = services32.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
Sygate Personal Firewall Start = services32.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\
Sygate Personal Firewall Start = services32.exe

http://www.sophos.com/virusinfo/analyses/w32rbotmb.html

- Collapse -
Dial/Carped-D
- Collapse -
Troj/Ranck-AI

Aliases Generic

Type Trojan

Troj/Ranck-AI is a proxy Trojan that allows a remote intruder to route HTTP traffic through the computer.
Sophos Anti-Virus version 3.85 and above detects this Trojan as Troj/Ranck-Gen without requiring an update.

http://www.sophos.com/virusinfo/analyses/trojranckai.html

- Collapse -
Troj/Agent-AY
- Collapse -
W32/Darby-G
- Collapse -
W32/Rbot-LZ
- Collapse -
Troj/Ariel-A
- Collapse -
Troj/Istbar-R
- Collapse -
Troj/Banker-AA
- Collapse -
Troj/Midaddle-C
- Collapse -
AVERT Low-Profiled Threat Notice: QHosts-18 UPDATE

Justification
QHosts-18 has been updated from Low to Low-Profiled due to Media Attention at http://www.pcworld.com/news/article/0,aid,118098,00.asp. QHosts-18 is referred to as Downloader.Lunii within the article.

Read About It
Information about QHosts-18 is located on VIL at: http://vil.nai.com/vil/content/v_128704.htm

Detection
QHosts-18 was first discovered on 10/06/2004 and detection was added to the 4397 dat files (Release Date: 10/06/2004).

If you suspect you have QHosts-18, please submit a sample to http://www.webimmune.net.

- Collapse -
AVERT Low-Profiled Threat Notice: W32/Noomy.a@MM UPDATE

CNET Forums