TIP: Click on subject to list as thread! ANSI
echo: virus_info
to: ALL
from: KURT WISMER
date: 2004-06-26 13:06:00
subject: News, June 26 2004

[cut-n-paste from sophos.com]

JS/Scob-A

Aliases
JS/Exploit-DialogArg.b trojan, Trojan.JS.Scob.a

Type
Trojan

Detection
At the time of writing, Sophos has received just one report of this 
Trojan from the wild.

Description
JS/Scob-A is a Java script trojan that is reported to be appended to 
HTML files on IIS machines.

JS/Scob-A downloads a file from a Russian website, this website is no 
longer accessible.





W32/NetskyP-Dam

Aliases
WORM_NETSKY.DAM

Type
Win32 worm

Detection
Sophos has received several reports of this worm from the wild.

Description
Sophos Anti-Virus detects as W32/NetskyP-Dam damaged, non-working 
samples of W32/Netsky-P.





W32/Korgo-R

Type
Win32 worm

Detection
At the time of writing, Sophos has received just one report of this worm 
from the wild.

Description
W32/Korgo-R is a network worm using the LSASS exploit to propagate 
(MS04-011). When executed the worm copies itself to the Windows system 
folder using a randomly generate name and creates the following registry 
entry so that the worm starts when a user logs on:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\
Windows Update = \.exe

During infection the worm will also use the temporary registry value
HKLM\Software\Microsoft\Wireless\Client = 1ID = 

W32/Korgo-R scans random IP addresses attempting to exploit them, and
sending the results to a remote PHP script. Infected machines run a
basic web server on ports TCP/2000-8191 and will serve the worms content
upon connection.

W32/Korgo-R includes a backdoor component which can be used to upload 
and run files on the infected computer.





W32/Sdbot-JB

Aliases
W32.Randex.gen, WORM_SDBOT.CT

Type
Win32 worm

Detection
At the time of writing, Sophos has received just one report of this worm 
from the wild.

Description
W32/Sdbot-JB is a worm which attempts to spread to remote network shares. 
It also contains backdoor Trojan functionality, allowing unauthorised 
remote access to the infected computer via IRC channels while running in 
the background as a service process.

W32/Sdbot-JB copies itself to the Windows system folder as WINUPDATE.EXE
and creates entries in the registry at the following locations so as to 
run itself on system startup:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce

W32/Sdbot-JB attempts to spread to network shares with weak passwords.

W32/Sdbot-JB also sits in the background as a service process waiting 
for commands from a remote user.





W32/Korgo-M

Aliases
Worm.Win32.Padobot.k, W32/Korgo.worm.t, Win32/Korgo.S, W32.Korgo.N

Type
Win32 worm

Detection
At the time of writing, Sophos has received just one report of this worm 
from the wild.

Description
W32/Korgo-M is a network worm which uses the LSASS exploit to propagate. 
When executed the worm copies itself to the Windows system folder using 
a randomly generated name and creates the following registry entry so 
that the worm starts when a user logs on:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\
Windows Update = \.exe

During infection the worm will also use the registry value
HKLM\Software\Microsoft\Wireless\ID = 

W32/Korgo-M deletes the file FTPUPD.EXE, if it exists. The worm also 
attempts to terminate processes such as SysTray, WinUpdate and 
avserve.exe and deletes the corresponding entries in the registry, if 
they exist at the following location:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run

W32/Korgo-M scans random IP addresses attempting to exploit them, the 
results of the scans being transmitted to one of several IRC servers and 
channels.





W32/Agobot-KC

Aliases
Backdoor.Agobot.gen, W32/Gaobot.worm.gen.f, W32.HLLW.Gaobot.gen

Type
Win32 worm

Detection
At the time of writing, Sophos has received just one report of this worm 
from the wild.

Description
W32/Agobot-KC is a backdoor worm which spreads to computers protected
by weak passwords.

When first run W32/Agobot-KC moves itself to the Windows system folder
as wmmon32.exe and creates the following registry entries to run itself 
on startup:

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
WSSAConfiguration= "wmmon32.exe"

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\
WSSAConfiguration= "wmmon32.exe"

Each time the worm is run it attempts to connect to a remote IRC server
and join a specific channel. The worm then runs continuously in the
background, allowing a remote intruder to access and control the 
computer via IRC channels.

W32/Agobot-KC attempts to terminate and disable various anti-virus and
security-related programs. The worm also modifies the HOSTS file in the
Drivers\etc subfolder of the Windows system folder, preventing access to
many anti-virus web sites.

Additionally, the worm may attempt to delete local network shares, and 
to steal registration keys for software products installed on the user's
computer.





W32/Korgo-P

Aliases
Worm.Win32.Padobot.g

Type
Win32 worm

Detection
At the time of writing, Sophos has received just one report of this worm 
from the wild.

Description
W32/Korgo-P is a network worm that uses the LSASS exploit to propagate
(see Microsoft Security Bulletin MS04-011 for more details).

W32/Korgo-P copies itself to the Windows system folder with a randomly-
generated filename between 5 and 8 characters long and creates the 
following registry entry so as to run itself on system startup:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update

W32/Korgo-P attempts to send itself to random IP addresses by HTTP with
the filename X.EXE.

W32/Korgo-P sends encrypted reports to a number of remote websites and
may be instructed to download and run further files from them to a 
random 6-letter filename in the Windows system folder.

W32/Korgo-P attempts to delete the file FTPUPD.EXE. The worm also tries
to terminate certain process including SysTray, WinUpdate and Disk
Defragmenter, also deleting the corresponding entries in the registry at 
the following location in order to prevent them from running on system 
startup:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run

W32/Korgo-P sets the following registry entry temporarily during 
infection:

HKLM\Software\Microsoft\Wireless\Client = 1

W32/Korgo-P sets the following registry entry to a random string:

HKLM\SOFTWARE\Microsoft\Wireless\ID





W32/Rbot-BL

Aliases
W32/Sdbot.worm.gen.g

Type
Win32 worm

Detection
At the time of writing, Sophos has received just one report of this worm 
from the wild.

Description
W32/Rbot-BL is a worm which attempts to spread to remote network shares. 
It also contains backdoor Trojan functionality, allowing unauthorised 
remote access to the infected computer via IRC channels while running in 
the background as a service process.

W32/Rbot-BL spreads to network shares with weak passwords as a result of
the backdoor Trojan element receiving the appropriate command from a 
remote user.

W32/Rbot-BL copies itself to the Windows system folder as WUAMGRD.EXE
and creates entries at the following locations in the registry so as to 
run itself on system startup, trying to reset them every minute:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices
HKCU\Software\Microsoft\Windows\CurrentVersion\Run

W32/Rbot-BL sets the following registry entries, trying to reset them 
every 2 minutes.

HKLM\SOFTWARE\Microsoft\Ole\EnableDCOM = "N"
HKLM\SYSTEM\CurrentControlSet\Control\Lsa\restrictanonymous = "1"

W32/Rbot-BL tries to delete the C$, D$, E$, IPC$ and ADMIN$ network 
shares on the host computer every 2 minutes.

W32/Rbot-BL attempts to terminate certain processes related to 
anti-virus and security programs including REGEDIT.EXE, MSCONFIG.EXE and 
NETSTAT.EXE.

 
--- MultiMail/Win32 v0.43
* Origin: Try Our Web Based QWK: DOCSPLACE.ORG (1:123/140)
SEEN-BY: 633/267 270
@PATH: 123/140 500 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.