TIP: Click on subject to list as thread! ANSI
echo: virus
to: ALL
from: KURT WISMER
date: 2004-01-17 17:52:00
subject: News

[cut-n-paste from sophos.com]

Troj/Divix-A

Aliases
Worm.Win32.Randon.o, Backdoor.Trojan, IRC/Flood.bat

Type
Trojan

Detection
At the time of writing, Sophos has received just one report of this 
Trojan from the wild.

Description
Troj/Divix-A is a mIRC Trojan that can be used to gain unauthorised 
access to a victim's computer.

The operation of this Trojan will depend on two other Trojans detected 
by Sophos Anti-Virus as Troj/Saye-A and Troj/DoSDelf-A.

The Trojan also requires the use of several clean utilities including a 
mIRC client application and a tool to hide windows on the victim's 
desktop.





Troj/Weasyw-A

Aliases
Trojan.Win32.StartPage.aw, TrojanDownloader.Win32.VB.al

Type
Trojan

Detection
Sophos has received several reports of this Trojan from the wild.

Description
Troj/Weasyw-A is a multi-component backdoor Trojan which allows 
unauthorised remote access to the computer.

One component (possibly called PAYLOADE.EXE) of the Trojan downloads and 
executes the next component of the Trojan as a file called EASYWWW.EXE 
to the Windows folder.

The Trojan adds the following entry to the registry to run itself on 
system restart:
HKLM\Software\Microsoft\Windows\CurrentVersion\Run\easywww
= C:\<path to Trojan>

Troj/Weasyw-A downloads a text file containing backdoor commands from 
the URL: www.easywww.info/data.asp?rnd=

This file is saved as 31331333.CHK in the Windows folder. Depending on 
the contents of the file the Trojan may download and execute EXE files 
(possibly to update itself) and change the Microsoft Internet Explorer 
settings in the registry so that the default start and search pages are 
directed to URLs defined within the text file.

Troj/Weasyw-A may also download and execute App/DCToolBar-A as the file 
REDIRECT?.EXE where ? may be a random number.





W32/SdBot-DC

Aliases
Backdoor.SdBot.dc, W32/Spybot.worm.gen virus, Win32/SpyBot.QD worm, 
W32.Randex.AZ, WORM_SPYBOT.AX

Type
Win32 worm

Detection
At the time of writing, Sophos has received just one report of this worm 
from the wild.

Description
W32/SdBot-DC is an internet worm and an IRC backdoor Trojan. 
W32/SdBot-DC copies itself into the Windows system folder as 
EXECDLL32.EXE and creates the following registry entries:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\
System Executable DLL Library

HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices\
System Executable DLL Library

W32/SdBot-DC attempts to run as a service process.

W32/SdBot-DC scans networks for shares protected by weak passwords and 
attempts to copy itself over to those shares. The worm also logs onto a 
predefined IRC server and waits for backdoor commands.





Troj/Mmdload-A

Type
Trojan

Detection
Sophos has received several reports of this Trojan from the wild.

Description
Troj/Mmdload-A attempts to download a copy of W32/Mimail-N to the file
c:\tmp.exe and then execute that file.

See the description of W32/Mimail-N for more details.





W32/Rirc-A

Aliases
W32/Rirc.worm, Backdoor.Rirc

Type
Win32 worm

Detection
At the time of writing, Sophos has received just one report of this worm 
from the wild.

Description
W32/Rirc-A is a worm which spreads by copying itself to network shares 
protected by weak passwords at random IP addresses.

When first run, W32/Rirc-A copies itself to the Windows System folder 
and appends its pathname to the shell= line in the [Boot] section of 
\System.ini, so that it is run automatically each time Windows 
is started. For example:

[Boot]
shell=Explorer.exe \

On versions of Windows NT, 2000 and XP the worm also appends its 
pathname to the following registry entry to run itself on startup:

HKLM\Sofware\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell

The new value of this registry entry will typically be

"Explorer.exe \".

Each time the worm runs it tries to connect to random IP addresses on 
port 139. If successful the worm tries to copy itself as Setup.exe to 
the following startup folders of shares:

\Documents and Settings\All Users\Start Menu\Programs\Startup\
\WINDOWS\Start Menu\Programs\Startup\
\WINNT\Profiles\All Users\Start Menu\Programs\Startup\

The worm attempts to logon to the Administrator account of remote 
computers using a list of 'weak' passwords and if the schedule service 
is active on the remote computer the worm schedules a new job to run the 
worm.

The worm also attempts to connect to a remote IRC server and join a 
specific channel. The worm then sends status information to this 
channel.





Troj/Inor-B

Aliases
TrojanDropper.VBS.Inor.e, VBS/Aproxd.A.dropper

Type
Trojan

Detection
At the time of writing, Sophos has received just one report of this 
Trojan from the wild.

Description
Troj/Inor-B is a malicious web page that drops and runs an executable 
program on the local file system.

When a page containing Troj/Inor-B is visited, a malicious VBScript runs 
and drops an executable file onto the local hard drive.





W32/Randex-Y

Aliases
WORM_RANDEX.GEN, Backdoor.IRCBot.gen

Type
Win32 worm

Detection
At the time of writing Sophos has received just one report of this worm 
from the wild.

Description
W32/Randex-Y is a network worm with backdoor capabilities which allows a 
remote intruder to access and control the computer via IRC channels.

W32/Randex-Y chooses IP addresses at random and tries to connect to the 
IPC$ share using simple passwords. If the connection is successful the 
worm copies itself to the following remote locations:

\ADMIN$\system32\msnv32.exe
\C$\WINNT\system32\msnv32.exe

W32/Randex-Y then schedules a job to execute the remotely created files.

Each time the worm is run it tries to connect to a remote IRC server and 
join a specific channel. The worm then runs in the background as a 
server process listening for commands to execute.

When first run the worm copies itself to the Windows system folder as 
IRBMe.exe and adds the following registry entries to point to this copy 
of the worm to ensure it is run at system startup:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\IRBMe Sucks!!
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices\IRBMe Sucks!!

W32/Randex-Y may also create the file remove.bat in the Windows temp 
folder. This file is not malicious and can simply be deleted.

 
--- MultiMail/Win32 v0.43
* Origin: Try Our Web Based QWK: DOCSPLACE.ORG (1:123/140)
SEEN-BY: 633/267 270
@PATH: 123/140 500 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.