TIP: Click on subject to list as thread! ANSI
echo: virus
to: ALL
from: KURT WISMER
date: 2004-06-06 23:46:00
subject: News, June 6 2004

[cut-n-paste from sophos.com]

W32/Agobot-JM

Aliases
Backdoor.Agobot.gen, W32/Gaobot.worm.gen.d, W32.HLLW.Gaobot.gen

Type
Win32 worm

Detection
At the time of writing, Sophos has received just one report of this worm 
from the wild.

Description
W32/Agobot-JM is a member of the W32/Agobot family of network worms and 
backdoor Trojans that exploits a number of known vulnerabilities and is 
also able to function as an IRC bot.

For more information about these Windows vulnerabilities, please refer 
to the following Microsoft Web pages:

Microsoft Security Bulletin MS03-001
Microsoft Security Bulletin MS03-007
Microsoft Security Bulletin MS03-026

When executed W32/Agobot-JM copies itself to the Windows system folder 
with the filename svchostt.exe and sets the following registry entries:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices

W32/Agobot-JM attempts to terminate a number processes, especially those 
related to anti-virus and security software (e.g. SWEEP95.EXE, 
BLACKICE.EXE, ZONEALARM.EXE and REGEDIT.EXE).

W32/Agobot-JM modifies the HOSTS file located at 
Windows system\Drivers\etc\HOSTS.

Selected anti-virus websites are mapped to the loopback address 
127.0.0.1 in an attempt to prevent access to these sites. Typically the 
following mappings will be appended to the HOSTS file:

127.0.0.1 www.symantec.com
127.0.0.1 securityresponse.symantec.com
127.0.0.1 symantec.com
127.0.0.1 www.sophos.com
127.0.0.1 sophos.com
127.0.0.1 www.mcafee.com
127.0.0.1 mcafee.com
127.0.0.1 liveupdate.symantecliveupdate.com
127.0.0.1 www.viruslist.com
127.0.0.1 viruslist.com
127.0.0.1 viruslist.com
127.0.0.1 f-secure.com
127.0.0.1 www.f-secure.com
127.0.0.1 kaspersky.com
127.0.0.1 www.avp.com
127.0.0.1 www.kaspersky.com
127.0.0.1 avp.com
127.0.0.1 www.networkassociates.com
127.0.0.1 networkassociates.com
127.0.0.1 www.ca.com
127.0.0.1 ca.com
127.0.0.1 mast.mcafee.com
127.0.0.1 my-etrust.com
127.0.0.1 www.my-etrust.com
127.0.0.1 download.mcafee.com
127.0.0.1 dispatch.mcafee.com
127.0.0.1 secure.nai.com
127.0.0.1 nai.com
127.0.0.1 www.nai.com
127.0.0.1 update.symantec.com
127.0.0.1 updates.symantec.com
127.0.0.1 us.mcafee.com
127.0.0.1 liveupdate.symantec.com
127.0.0.1 customer.symantec.com
127.0.0.1 rads.mcafee.com
127.0.0.1 trendmicro.com
127.0.0.1 www.trendmicro.com

W32/Agobot-JM can also test the available bandwidth by attempting to GET 
or POST data to the following websites:

yahoo.co.jp
www.nifty.com
www.d1asia.com
www.st.lib.keio.ac.jp
www.lib.nthu.edu.tw
www.above.net
www.level3.com
nitro.ucsc.edu
www.burst.net
www.cogentco.com
www.rit.edu
www.nocster.com
www.verio.com
www.stanford.edu
www.xo.net
de.yahoo.com
www.belwue.de
www.switch.ch
www.1und1.de
verio.fr
www.utwente.nl
www.schlund.net

W32/Agobot-JM may initiate denial-of-service (DoS) and distributed 
denial-of-service (DDoS) synflood/httpflood/fraggle/smurf attacks 
against remote systems.

W32/Agobot-JM steals the Windows Product ID and keys from several 
computer applications or games including:

AOL Instant Messenger
Battlefield 1942
Battlefield 1942: Secret Weapons Of WWII
Battlefield 1942: The Road To Rome
Battlefield 1942: Vietnam
Black and White
Call of Duty
Command and Conquer: Generals
Command and Conquer: Generals: Zero Hour
Command and Conquer: Red Alert2
Command and Conquer: Tiberian Sun
Counter-Strike
FIFA 2002
FIFA 2003
Freedom Force
Global Operations
Gunman Chronicles
Half-Life
Hidden and Dangerous 2
Industry Giant 2
IGI2: Covert Strike
James Bond 007: Nightfire
Medal of Honor: Allied Assault
Medal of Honor: Allied Assault: Breakthrough
Medal of Honor: Allied Assault: Spearhead
Nascar Racing 2002
Nascar Racing 2003
NHL 2002
NHL 2003
Need For Speed: Hot Pursuit 2
Need For Speed: Underground
Neverwinter Nights
Ravenshield
Shogun Total War - Warlord Edition
Soldiers Of Anarchy
Soldier of Fortune II - Double Helix
The Gladiators
Unreal Tournament 2003
Unreal Tournament 2004
Windows Messenger





W32/Korgo-D

Type
Win32 worm

Detection
At the time of writing, Sophos has received just one report of this worm 
from the wild.

Description
W32/Korgo-D is a variant of the W32/Korgo-C network worm and backdoor 
that propagates by using the LSASS exploit.

For details see Microsoft Security Bulletin MS04-011.

When executed W32/Korgo-D copies itself to the Windows system folder 
with the random filename and sets the registry entry:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\System Restore 
Service

with the path to the copy to make sure the worm runs at the restart.

W32/Korgo-D marks the infection by setting the registry entry:

HKLM\SOFTWARE\Microsoft\Wireless\

W32/Korgo-D scans random IP addresses attempting to exploit them, the 
results of the scans being transmitted to a specific irc servers from 
the following list:

'K{at}1irc.kar.net'
'gaspode.zanet.org.za'
'lia.zanet.net'
'irc.tsk.ru'
'london.uk.eu.undernet.org'
'washington.dc.us.undernet.org'
'los-angeles.ca.us.undernet.org'
'brussels.be.eu.undernet.org'
'caen.fr.eu.undernet.org'
'flanders.be.eu.undernet.org'
'graz.at.eu.undernet.org'
'gaz-prom.ru'
'moscow-advokat.ru'

As a part of payload W32/Korgo-D attempts to delete ftpupd.exe file and 
the registry entries that have the following values

'avserve2.exe'
'avserve.exe'
'WinUpdate'
'SysTray'
'Bot Loader'
'System Service Manager'
'Windows Security Manager





W32/Rbot-Y

Aliases
Backdoor.Rbot.b, W32.Spybot.Worm

Type
Win32 worm

Detection
At the time of writing, Sophos has received just one report of this worm 
from the wild.

Description
W32/Rbot-Y is a worm which attempts to spread to remote network shares. 
It also contains backdoor Trojan functionality, allowing unauthorised 
remote access to the infected computer via IRC channels while running in 
the background as a service process.

W32/Rbot-Y spreads to network shares with weak passwords as a result of 
the backdoor Trojan element receiving the appropriate command from a 
remote user.

W32/Rbot-Y copies itself to the Windows system folder as PIDSERV.EXE and
creates registry entries PROCESS SESSION MANAGER under the following
keys so as to run itself on system startup:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices
HKCU\Software\Microsoft\Windows\CurrentVersion\Run

W32/Rbot-Y may set the following registry entries:

HKLM\SOFTWARE\Microsoft\Ole\EnableDCOM = "N"
HKLM\SYSTEM\CurrentControlSet\Control\Lsa\restrictanonymous = "1"

W32/Rbot-Y may try to delete the C$, D$, E$, IPC$ and ADMIN$ network 
shares on the host computer.





W32/Dumaru-AK

Aliases
TrojanDropper.Win32.Mudrop.h, Worm.Win32.Plexus.a, W32.Explet.A{at}mm, 
W32/Plexus{at}MM virus, I-Worm.Plexus.a

Type
Win32 worm

Detection
At the time of writing, Sophos has received just one report of this worm 
from the wild.

Description
W32/Dumaru-AK consists of a dropper and a number of dropped files.

The dropper copies itself to the filename UPU.EXE in the Windows system 
folder. The dropper also drops the files SETUPEX.EXE to the same folder 
and SVCHOST.EXE to the Windows folder, running them both.

The dropper may display one of the following fake error messages:

CRC checksum failed.
Pace method not implemented.
Could not initialize installation. File size expected=26523, size 
returned=26344 File is corrupted.

SETUPEX.EXE runs as a service process, copying itself to SWCHOST.EXE and 
SVOHOST.EXE in the Windows system folder. It sets the following registry 
entry so as to run the SWCHOST.EXE copy on system startup:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\load32

SETUPEX.EXE sets an entry in the BOOT section of SYSTEM.INI with the key 
name SHELL in order to run the SWCHOST.EXE copy on system startup.

SETUPEX.EXE copies itself as SVCHOST.EXE to the folder found in the 
following registry entry:

HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell 
Folders\Startup

and writes loopback values to the HOSTS file to block access to various 
anti-virus websites.

SETUPEX.EXE sets the following registry entries:

HKCU\Software\SARS\SocksPort
HKLM\System\CurrentControlSet\Services\SharedAccess\Start = 3
HKCU\Software\Microsoft\Internet Explorer\Main\AllowWindowReuse = 0

SETUPEX.EXE logs key strokes and window titles to a file in the Windows 
folder called PRNTK.LOG and logs info about certain files to RUNDLLN.SYS 
in the Windows folder.

SETUPEX.EXE drops PRNTSVR.DLL in the Windows folder. PRNTSVR.DLL is a 
backdoor program detected by Sophos Anti-Virus as Troj/Dumaru-B.

The SVCHOST.EXE file dropped by the dropper is an email and network 
share worm which also spreads by exploting RPC and LSASS vulnerabilities.

The email sent by the worm has characteristics chosen from the following 
lists.

Subject line :
RE: order
For you
Hi, Mike
Good offer.
RE:

Message text :
Hi.
Here is the archive with those information, you asked me.
And don't forget, it is strongly confidencial!!!
Seya, man.
P.S. Don't forget my fee ;)

Hi, my darling :)
Look at my new screensaver. I hope you will enjoy...
Your Liza

My friend gave me this account generator for http://www.pantyola.com I 
wanna share it with you :)
And please do not distribute it. It's private.

Greets! I offer you full base of accounts with passwords of mail server
yahoo.com. Here is archive with small part of it . You can see that all
information is real. If you want to b uy full base, please reply me...

Hi, Nick. In this archive you can find all those things, you asked me.
See you. Steve

Attached file :

release.exe
demo.exe
AGen1.03.exe
AtlantI.exe
SecUNCE.exe

The worm copies itself into the KaZaA transfer folder and available 
shared folders with the following filenames:

AVP5.xcrack.exe
InternetOptimizer1.05b.exe
Shrek_2.exe
UnNukeit9xNTICQ04noimageCrk.exe
YahooDBMails.exe
hx00def.exe
ICQBomber.exe

The worm adds the following registry entry so that it is run each time 
Windows starts:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\NvClipRsv

The worm also modifies the HOSTS files in an attempt to prevent 
anti-virus updates.

The worm listens on port 1250 for incoming connections which may contain 
updated copies of the worm or other files to install on the infected 
computer.





W32/Agobot-SG

Type
Win32 worm

Detection
At the time of writing, Sophos has received just one report of this worm 
from the wild.

Description
W32/Agobot-SG is a backdoor Trojan and network worm which can spread by 
copying itself to network shares with weak passwords and may attempt to
spread using the DCOM RPC and/or RPC locator vulnerabilities.

When first run, the worm/Trojan copies itself to the Windows System 
folder using the filename WMON16.EXE and may create sub-keys of the 
following registry entries, so that it is run automatically each time 
Windows is started:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run

HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices

On NT-based versions of Windows a new service may be created with the 
same name as the new registry sub-keys and with the startup property set 
to automatic, so that the service starts automatically each time Windows 
is started.

W32/Agobot-SG runs continuously in the background as a service process 
and allows unauthorised remote access and control over the computer.

W32/Agobot-SG may also terminate selected processes related to 
anti-virus and security software (e.g. SWEEP95.EXE, BLACKICE.EXE, 
ZONEALARM.EXE and REGEDIT.EXE).





W32/Rbot-X

Type
Win32 worm

Detection
At the time of writing, Sophos has received just one report of this worm 
from the wild.

Description
W32/Rbot-X is an IRC backdoor Trojan and network worm.

When first run W32/Rbot-X copies itself to the Windows system folder as 
MSlti32.exe and creates the following registry entries to run 
MSlti32.exe automatically on startup:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\
Microsoft AUT Update = MSlti32.exe

HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices\
Microsoft AUT Update = MSlti32.exe

HKCU\Software\Microsoft\Windows\CurrentVersion\Run\
Microsoft AUT Update = MSlti32.exe

Each time W32/Rbot-X is run it attempts to connect to a remote IRC 
server and join a specific channel. The worm then runs continuously in 
the background listening on the channel for instructions.

W32/Rbot-X attempts to logon to network shares protected by weak 
passwords by brute force using a list of common passwords and then 
copies itself to the Windows system folder of the remote computer.





Troj/Orifice-G

Aliases
Backdoor.BO2K.n, Orifice2K trojan, BO2K.Trojan Variant

Type
Trojan

Detection
At the time of writing, Sophos has received just one report of this 
Trojan from the wild.

Description
Troj/Orifice-G is a member of the 'Back Orifice 2000' series of backdoor 
Trojans.





W32/Rbot-V

Aliases
Backdoor.Spyboter.bx, W32/Sdbot.worm.gen.i, Win32/Spyboter.BX, 
W32.Randex.gen, WORM_SDBOT.JT

Type
Win32 worm

Detection
At the time of writing, Sophos has received just one report of this worm 
from the wild.

Description
W32/Rbot-V is a worm which attempts to spread to remote network shares. 
It also contains backdoor Trojan functionality, allowing unauthorised 
remote access to the infected computer via IRC channels while running in 
the background as a service process.

W32/Rbot-V spreads to network shares with weak passwords as a result of 
the backdoor Trojan element receiving the appropriate command from a 
remote user.

W32/Rbot-V copies itself to the Windows system folder as mssmgrd.exe and 
creates entries at the following locations in the registry so as to run 
itself on system startup:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Update
= mssmgrd.exe

HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices\Microsoft 
Update = mssmgrd.exe

HKCU\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Update
= mssmgrd.exe

W32/Rbot-V may set the following registry entries:

HKLM\Software\Microsoft\Ole\EnableDCOM = "N"
HKLM\System\CurrentControlSet\Control\Lsa\restrictanonymous = "1"

 
--- MultiMail/Win32 v0.43
* Origin: Try Our Web Based QWK: DOCSPLACE.ORG (1:123/140)
SEEN-BY: 633/267 270
@PATH: 123/140 500 106/2000 633/267

SOURCE: echomail via fidonet.ozzmosis.com

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.