Text 124, 2287 rader
Skriven 2006-06-25 16:59:00 av KURT WISMER (1:123/140)
Ärende: News, June 25 2006
==========================
[cut-n-paste from sophos.com]
Name W32/Bagle-KG
Type
* Worm
How it spreads
* Email attachments
Affected operating systems
* Windows
Side effects
* Sends itself to email addresses found on the infected computer
* Forges the sender's email address
* Uses its own emailing engine
* Downloads code from the internet
Aliases
* W32.Beagle.FD@mm
* Email-Worm.Win32.Bagle.gk
Prevalence (1-5) 2
Description
W32/Bagle-KG is a mass-mailing worm for the Windows platform.
W32/Bagle-KG includes functionality to access the internet and
communicate with a remote server via HTTP.
When W32/Bagle-KG is installed it attempts to mail a zipped file of
the W32/Bagle-KF worm.
Advanced
W32/Bagle-KG is a mass-mailing worm for the Windows platform.
W32/Bagle-KG includes functionality to access the internet and
communicate with a remote server via HTTP.
When W32/Bagle-KG is installed the worm attempts to email an
attachment of a zipped file containing the W32/Bagle-KF worm.
W32/Bagle-KG may create the file C:\WINDOWS\elist.xpt. This file can
be deleted.
Registry entries may also be created under:
HKCU\Software\FirstRun648
Name Troj/Bancos-API
Type
* Spyware Trojan
Affected operating systems
* Windows
Side effects
* Steals information
Prevalence (1-5) 2
Description
Troj/Bancos-API is a Trojan for the Windows platform.
Advanced
Troj/Bancos-API is a Trojan for the Windows platform.
The Troj/Bancos-API is registered as a COM object, creating registry
entries under:
HKCR\CLSID\(1E6CE4CD-161B-4847-B8BF-E2EF72299D69)
HKCR\Interface\(4EFDDEB1-BF39-4F20-B90C-747B99B6EB84)
HKCR\TypeLib\(14A5F3E7-B235-4D98-9264-5C67D2657BC4)
HKCR\ib.CBrowserHelper\
Name Troj/Dloadr-AHR
Type
* Trojan
Affected operating systems
* Windows
Side effects
* Downloads code from the internet
Prevalence (1-5) 2
Description
Troj/Dloadr-AHR is a Trojan for the Windows platform.
Troj/Dloadr-AHR attempts to download further malicious code
Advanced
Troj/Dloadr-AHR is a Trojan for the Windows platform.
Troj/Dloadr-AHR attempts to download further malicious code.
The Trojan creates the following registry entry:
HKCU\Software\Microsoft\Windows
L
L
Name W32/Sixem-A
Type
* Worm
How it spreads
* Email attachments
* Web downloads
Affected operating systems
* Windows
Side effects
* Sends itself to email addresses found on the infected computer
* Uses its own emailing engine
* Downloads code from the internet
* Reduces system security
Prevalence (1-5) 2
Description
W32/Sixem-A is an email worm for the Windows platform.
The worm harvests email addresses from files on the infected computer
and sends itself as an email attachment. Email sent by the worm has
the following characteristics:
Sender (randomly chosen from):
hotnews@cnn.com
kellyjast@hotmail.com
lindasal@gmail.com
mr.robs@yahoo.com
newsreader@hotmail.com
todaynews@cnn.com
Subject line (randomly chosen from):
Soccer fans killed five teens
Crazy soccer fans
Please reply me Tomas
My tricks for you
Naked World Cup game set
My sister whores, shit i dont know
Message text (randomly chosen from):
Soccer fans killed five teens, watch what they make on photos. Please
report on this all who know.
Crazy soccer fans killed two teens, watch what they make on photos.
Please report on this all who know.
Halo Markus, i sent my nude pics. Please reply me with you nude
photos ;). Best regard You Sweet Kitty
I wait you photos from New York. I sent my pics where i naked for
you. Please reply me. Linda Salivan
Nudists are organising their own tribute to the world cup, by staging
their own nude soccer game, though it is not clear how the teams will
tell each other apart. Good photos ;)
Emily Carr was an artist known for her prudery, but now the Portrait
Gallery of Canada has acquired a nude self-portrait. View photos.
Attached file (randomly chosen from):
soccer_fans.jpg.exe
soccer_pics.jpg.exe
kelly_nude_imgs.jpg.exe
linda_bigtit.gif.exe
soccer_nudist.bmp.exe
emily_selfphoto.jpg.exe
Advanced
W32/Sixem-A is an email worm for the Windows platform.
The worm harvests email addresses from files on the infected computer
and sends itself as an email attachment. Email sent by the worm has
the following characteristics:
Sender (randomly chosen from):
hotnews@cnn.com
kellyjast@hotmail.com
lindasal@gmail.com
mr.robs@yahoo.com
newsreader@hotmail.com
todaynews@cnn.com
Subject line (randomly chosen from):
Soccer fans killed five teens
Crazy soccer fans
Please reply me Tomas
My tricks for you
Naked World Cup game set
My sister whores, shit i dont know
Message text (randomly chosen from):
Soccer fans killed five teens, watch what they make on photos. Please
report on this all who know.
Crazy soccer fans killed two teens, watch what they make on photos.
Please report on this all who know.
Halo Markus, i sent my nude pics. Please reply me with you nude
photos ;). Best regard You Sweet Kitty
I wait you photos from New York. I sent my pics where i naked for
you. Please reply me. Linda Salivan
Nudists are organising their own tribute to the world cup, by staging
their own nude soccer game, though it is not clear how the teams will
tell each other apart. Good photos ;)
Emily Carr was an artist known for her prudery, but now the Portrait
Gallery of Canada has acquired a nude self-portrait. View photos.
Attached file (randomly chosen from):
soccer_fans.jpg.exe
soccer_pics.jpg.exe
kelly_nude_imgs.jpg.exe
linda_bigtit.gif.exe
soccer_nudist.bmp.exe
emily_selfphoto.jpg.exe
When run, the worm copies itself to the Windows system folder as
"msctools.exe" and sets the following registry entries in order to
run each time a user logs on:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Nsdevice
"<Windows system folder>\msctools.exe"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Nsdevice
"<Windows system folder>\msctools.exe"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
Nsdevice
"<Windows system folder>\msctools.exe"
The worm downloads an additional component (also detected as
W32/Sixem-A) to the Windows system folder as "vmonts.exe". The
vmonts.exe file sets the following registry entries:
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
DisableTaskMgr
"0"
HKLM\SOFTWARE\Microsoft\Security Center
FirewallOverride
dword:00000001
HKLM\SOFTWARE\Microsoft\Security Center
FirewallDisableNotify
dword:00000001
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\URL
dnk
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile
EnableFirewall
dword:00000000
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile
EnableFirewall
dword:00000000
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
msverify
"<Windows system folder>\vmonts.exe"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
msverify
"<Windows system folder>\vmonts.exe"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
msverify
"<Windows system folder>\vmonts.exe"
Name W32/Rbot-EGJ
Type
* Worm
How it spreads
* Network shares
Affected operating systems
* Windows
Side effects
* Allows others to access the computer
* Installs itself in the Registry
* Exploits system or software vulnerabilities
Aliases
* Backdoor.Win32.Rbot.gen
* W32/Sdbot.worm.gen.x
Prevalence (1-5) 2
Description
W32/Rbot-EGJ is a worm and IRC backdoor Trojan for the Windows
platform.
W32/Rbot-EGJ spreads:
- to other network computers infected with: Troj/Kuang, Troj/Sub7,
Troj/NetDevil, W32/MyDoom, W32/Bagle and Troj/Optix
- to other network computers by exploiting common buffer overflow
vulnerabilities, including: LSASS (MS04-011), RPC-DCOM (MS04-012),
WKS (MS03-049) (CAN-2003-0812), WebDav (MS03-007), IIS5SSL (ms04-011)
(CAN-2003-0719), UPNP (MS01-059), Veritas (CAN-2004-1172), Dameware
(CAN-2003-1030) and ASN.1 (MS04-007)
- by copying itself to network shares protected by weak passwords
W32/Rbot-EGJ runs continuously in the background, providing a
backdoor server which allows a remote intruder to gain access and
control over the computer via IRC channels.
Advanced
W32/Rbot-EGJ is a worm and IRC backdoor Trojan for the Windows
platform.
W32/Rbot-EGJ spreads:
- to other network computers infected with: Troj/Kuang, Troj/Sub7,
Troj/NetDevil, W32/MyDoom, W32/Bagle and Troj/Optix
- to other network computers by exploiting common buffer overflow
vulnerabilities, including: LSASS (MS04-011), RPC-DCOM (MS04-012),
WKS (MS03-049) (CAN-2003-0812), WebDav (MS03-007), IIS5SSL (ms04-011)
(CAN-2003-0719), UPNP (MS01-059), Veritas (CAN-2004-1172), Dameware
(CAN-2003-1030) and ASN.1 (MS04-007)
- by copying itself to network shares protected by weak passwords
W32/Rbot-EGJ runs continuously in the background, providing a
backdoor server which allows a remote intruder to gain access and
control over the computer via IRC channels.
When first run W32/Rbot-EGJ copies itself to <System>\zwdomsgemw.exe.
The following registry entries are created to run zwdomsgemw.exe on
startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows Recylinder Check
zwdomsgemw.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
Windows Recylinder Check
zwdomsgemw.exe
Registry entries are set as follows:
HKCU\Software\Microsoft\OLE
Windows Recylinder Check
zwdomsgemw.exe
HKLM\SOFTWARE\Microsoft\Ole
EnableDCOM
N
HKLM\SYSTEM\CurrentControlSet\Control\Lsa
restrictanonymous
1
Name W32/Mytob-IT
Type
* Worm
How it spreads
* Email messages
Affected operating systems
* Windows
Side effects
* Turns off anti-virus applications
* Allows others to access the computer
* Uses its own emailing engine
* Installs itself in the Registry
Aliases
* Win32/Mytob.UB
Prevalence (1-5) 2
Description
W32/Mytob-IT is a mass-mailing worm with IRC backdoor Trojan
functionality.
W32/Mytob-IT runs continuously in the background, providing a
backdoor server which allows a remote intruder to gain access and
control over the computer via IRC channels.
The worm may download further malicious code.
W32/Mytob-IT spreads by sending emails with the following
characteristics:
From: abuse@<harvested domain>
Subject line: "Account Alert" or a randomly generated string.
Message text:
Dear Valued Member,
According to our terms of services, you will have to confirm your
e-mail by the following link, or your account will be suspended
within 24 hours for security reasons.
<spoofed link pointing to a copy of the worm>
After following the instructions in the sheet, your account will not
be interrupted and will continue as normal.
Thank you for your attention to this request. We apologize for any
inconvenience.
Sincerely, <Harvested domain> Abuse Department
Advanced
W32/Mytob-IT is a mass-mailing worm with IRC backdoor Trojan
functionality.
W32/Mytob-IT runs continuously in the background, providing a
backdoor server which allows a remote intruder to gain access and
control over the computer via IRC channels.
The worm may download further malicious code.
W32/Mytob-IT spreads by sending emails with the following
characteristics:
From: abuse@<harvested domain>
Subject line: "Account Alert" or a randomly generated string.
Message text:
Dear Valued Member,
According to our terms of services, you will have to confirm your
e-mail by the following link, or your account will be suspended
within 24 hours for security reasons.
<spoofed link pointing to a copy of the worm>
After following the instructions in the sheet, your account will not
be interrupted and will continue as normal.
Thank you for your attention to this request. We apologize for any
inconvenience.
Sincerely, <Harvested domain> Abuse Department
The worm creates the following registry entries in an attempt to run
itself on startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Microsoft Task Manager
scvhost.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
Microsoft Task Manager
scvhost.exe
The following registry entry is set:
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System
DisableTaskMgr
4
Name W32/Bagle-KL
Type
* Worm
How it spreads
* Email attachments
Affected operating systems
* Windows
Side effects
* Sends itself to email addresses found on the infected computer
* Downloads code from the internet
* Installs itself in the Registry
Aliases
* Email-Worm.Win32.Bagle.al
Prevalence (1-5) 2
Description
W32/Bagle-KL is an email worm for the Windows platform.
W32/Bagle-KL harvests email addresses from the infected computer and
sends itself in an email to one address as if from another address.
The emails sent have the following characteristics:
The subject line is one of the following:
Ales
Alice
Alyce
Andrew
Androw
Androwe
Ann
Anna
Anne
Annes
Anthonie
Anthony
Anthonye
Avice
Avis
Bennet
Bennett
Christean
Christian
Constance
Cybil
Daniel
Danyell
Dorithie
Dorothee
Dorothy
Edmond
Edmonde
Edmund
Edward
Edwarde
Elizabeth
Elizabethe
Ellen
Ellyn
Emanual
Emanuel
Emanuell
Ester
Frances
Francis
Fraunces
Gabriell
Geoffraie
George
Grace
Harry
Harrye
Henrie
Henry
Henrye
Hughe
Humphrey
Humphrie
Isabel
Isabell
James
Jane
Jeames
Jeffrey
Jeffrye
Joane
Johen
John
Josias
Judeth
Judith
Judithe
Katherine
Katheryne
Leonard
Leonarde
Margaret
Margarett
Margerie
Margerye
Margret
Margrett
Marie
Martha
Mary
Marye
Michael
Mychaell
Nathaniel
Nathaniell
Nathanyell
Nicholas
Nicholaus
Nycholas
Peter
Ralph
Rebecka
Richard
Richarde
Robert
Roberte
Roger
Rose
Rycharde
Samuell
Sara
Sidney
Sindony
Stephen
Susan
Susanna
Suzanna
Sybell
Sybyll
Syndony
Thomas
Valentyne
William
Winifred
Wynefrede
Wynefreed
Wynnefreede
The message body starting one of the following, or a blank line:
To the beloved
I love you
The message body then continues with one of the following:
The password is <image file>
Password -- <image file>
Use password <image file> to open archive.
Password is <image file>
Zip password: <image file>
archive password: <image file>
Password - <image file>
Password: <image file>
The image file displays a 5 digit password.
Advanced
W32/Bagle-KL is an email worm for the Windows platform.
W32/Bagle-KL harvests email addresses from the infected computer and
sends itself in an email to one address as if from another address.
The emails sent have the following characteristics:
The subject line is one of the following:
Ales
Alice
Alyce
Andrew
Androw
Androwe
Ann
Anna
Anne
Annes
Anthonie
Anthony
Anthonye
Avice
Avis
Bennet
Bennett
Christean
Christian
Constance
Cybil
Daniel
Danyell
Dorithie
Dorothee
Dorothy
Edmond
Edmonde
Edmund
Edward
Edwarde
Elizabeth
Elizabethe
Ellen
Ellyn
Emanual
Emanuel
Emanuell
Ester
Frances
Francis
Fraunces
Gabriell
Geoffraie
George
Grace
Harry
Harrye
Henrie
Henry
Henrye
Hughe
Humphrey
Humphrie
Isabel
Isabell
James
Jane
Jeames
Jeffrey
Jeffrye
Joane
Johen
John
Josias
Judeth
Judith
Judithe
Katherine
Katheryne
Leonard
Leonarde
Margaret
Margarett
Margerie
Margerye
Margret
Margrett
Marie
Martha
Mary
Marye
Michael
Mychaell
Nathaniel
Nathaniell
Nathanyell
Nicholas
Nicholaus
Nycholas
Peter
Ralph
Rebecka
Richard
Richarde
Robert
Roberte
Roger
Rose
Rycharde
Samuell
Sara
Sidney
Sindony
Stephen
Susan
Susanna
Suzanna
Sybell
Sybyll
Syndony
Thomas
Valentyne
William
Winifred
Wynefrede
Wynefreed
Wynnefreede
The message body starting one of the following, or a blank line:
To the beloved
I love you
The message body then continues with one of the following:
The password is <image file>
Password -- <image file>
Use password <image file> to open archive.
Password is <image file>
Zip password: <image file>
archive password: <image file>
Password - <image file>
Password: <image file>
The image file displays a 5 digit password.
Emails sent by W32/Bagle-KL invite the user to open the Zip file
using a password
Emails sent by W32/Bagle-KL invite the user to open the Zip file
using a password.
The main attachment is a file with a ZIP extension and a filename
picked from one of the same list as the subject line, though it will
not necessarily be the same name as in the subject line. This zip is
encrypted with the password given in the image file, and when
unzipped will be detected as W32/Bagle-KL.
W32/Bagle-KL copies itself to the file \hidn\hidn.exe and drops the
file \hidn\m_hook.sys, also detected as W32/Bagle-KL, which it uses
to stealth itself from certain processes.
The first time it is run, W32/Bagle-KL drops the clean file
C:\error.gif and opens it. This is an image of the word "Error".
W32/Bagle-KL drops the file C:\temp.zip which contains an encrypted
zip of itself.
W32/Bagle-KL attempts to download a file from a number of remote
websites to \re_file.exe and then execute it.
W32/Bagle-KL attempts to terminate and disable a number of services
related to security and anti-virus applications.
W32/Bagle-KL attempts to delete the following registry entry in order
to disrupt booting into Safe Mode:
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot
W32/Bagle-KL creates the following registry entry the first time it
is run:
HKCU\Software\FirstRuxzx
FirstRun
1
Name W32/Bagle-KM
Type
* Worm
How it spreads
* Email attachments
Affected operating systems
* Windows
Side effects
* Turns off anti-virus applications
* Sends itself to email addresses found on the infected computer
* Modifies data on the computer
* Drops more malware
* Uses its own emailing engine
* Downloads code from the internet
* Reduces system security
* Installs itself in the Registry
* Leaves non-infected files on computer
Aliases
* Email-Worm.Win32.Bagle.fy
Prevalence (1-5) 2
Description
W32/Bagle-KM is an email worm for the Windows platform.
W32/Bagle-KM harvests email addresses from the infected computer and
sends itself in an email to one address as if from another address.
The emails sent have the following characteristics:
The subject line is one of the following:
Ales
Alice
Alyce
Andrew
Androw
Androwe
Ann
Anna
Anne
Annes
Anthonie
Anthony
Anthonye
Avice
Avis
Bennet
Bennett
Christean
Christian
Constance
Cybil
Daniel
Danyell
Dorithie
Dorothee
Dorothy
Edmond
Edmonde
Edmund
Edward
Edwarde
Elizabeth
Elizabethe
Ellen
Ellyn
Emanual
Emanuel
Emanuell
Ester
Frances
Francis
Fraunces
Gabriell
Geoffraie
George
Grace
Harry
Harrye
Henrie
Henry
Henrye
Hughe
Humphrey
Humphrie
Isabel
Isabell
James
Jane
Jeames
Jeffrey
Jeffrye
Joane
Johen
John
Josias
Judeth
Judith
Judithe
Katherine
Katheryne
Leonard
Leonarde
Margaret
Margarett
Margerie
Margerye
Margret
Margrett
Marie
Martha
Mary
Marye
Michael
Mychaell
Nathaniel
Nathaniell
Nathanyell
Nicholas
Nicholaus
Nycholas
Peter
Ralph
Rebecka
Richard
Richarde
Robert
Roberte
Roger
Rose
Rycharde
Samuell
Sara
Sidney
Sindony
Stephen
Susan
Susanna
Suzanna
Sybell
Sybyll
Syndony
Thomas
Valentyne
William
Winifred
Wynefrede
Wynefreed
Wynnefreede
The message text starting one of the following, or a blank line:
To the beloved
I love you
The message text then continues with one of the following:
The password is <image file>
Password -- <image file>
Use password <image file> to open archive.
Password is <image file>
Zip password: <image file>
archive password: <image file>
Password - <image file>
Password: <image file>
The image file displays a 5 digit password.
The main attachment is a file with a ZIP extension and a filename
picked from one of the same list as the subject line, though it will
not necessarily be the same name as in the subject line. This zip is
encrypted with the password given in the image file, and when
unzipped will be detected as W32/Bagle-KM. This zip is encrypted with
the password given in the image file, and when unzipped will be
detected as W32/Bagle-KM.
Advanced
W32/Bagle-KM is an email worm for the Windows platform.
W32/Bagle-KM harvests email addresses from the infected computer and
sends itself in an email to one address as if from another address.
The emails sent have the following characteristics:
The subject line is one of the following:
Ales
Alice
Alyce
Andrew
Androw
Androwe
Ann
Anna
Anne
Annes
Anthonie
Anthony
Anthonye
Avice
Avis
Bennet
Bennett
Christean
Christian
Constance
Cybil
Daniel
Danyell
Dorithie
Dorothee
Dorothy
Edmond
Edmonde
Edmund
Edward
Edwarde
Elizabeth
Elizabethe
Ellen
Ellyn
Emanual
Emanuel
Emanuell
Ester
Frances
Francis
Fraunces
Gabriell
Geoffraie
George
Grace
Harry
Harrye
Henrie
Henry
Henrye
Hughe
Humphrey
Humphrie
Isabel
Isabell
James
Jane
Jeames
Jeffrey
Jeffrye
Joane
Johen
John
Josias
Judeth
Judith
Judithe
Katherine
Katheryne
Leonard
Leonarde
Margaret
Margarett
Margerie
Margerye
Margret
Margrett
Marie
Martha
Mary
Marye
Michael
Mychaell
Nathaniel
Nathaniell
Nathanyell
Nicholas
Nicholaus
Nycholas
Peter
Ralph
Rebecka
Richard
Richarde
Robert
Roberte
Roger
Rose
Rycharde
Samuell
Sara
Sidney
Sindony
Stephen
Susan
Susanna
Suzanna
Sybell
Sybyll
Syndony
Thomas
Valentyne
William
Winifred
Wynefrede
Wynefreed
Wynnefreede
The message text starting one of the following, or a blank line:
To the beloved
I love you
The message text then continues with one of the following:
The password is <image file>
Password -- <image file>
Use password <image file> to open archive.
Password is <image file>
Zip password: <image file>
archive password: <image file>
Password - <image file>
Password: <image file>
The image file displays a 5 digit password.
The main attachment is a file with a ZIP extension and a filename
picked from one of the same list as the subject line, though it will
not necessarily be the same name as in the subject line. This zip is
encrypted with the password given in the image file, and when
unzipped will be detected as W32/Bagle-KM. This zip is encrypted with
the password given in the image file, and when unzipped will be
detected as W32/Bagle-KM.
W32/Bagle-KM copies itself to the file <Application
Data>\hidn\hidn.exe and drops the file <Application
Data>\hidn\m_hook.sys, detected as W32/Bagle-KL, which it uses to
stealth itself from certain processes.
The first time it is run, W32/Bagle-KM drops the clean file
C:\error.gif and opens it. This is an image of the word "Error".
W32/Bagle-KM drops the file C:\temp.zip which contains an encrypted
zip of itself.
W32/Bagle-KM attempts to download a file from a number of remote
websites to <Windows system folder>\re_file.exe and then execute it.
W32/Bagle-KM attempts to terminate and disable a number of services
related to security and anti-virus applications.
W32/Bagle-KM attempts to delete the following registry entry in order
to disrupt booting into Safe Mode:
HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot
Name W32/Rbot-EHK
Type
* Spyware Worm
How it spreads
* Network shares
Affected operating systems
* Windows
Side effects
* Allows others to access the computer
* Steals information
* Downloads code from the internet
* Records keystrokes
* Installs itself in the Registry
* Exploits system or software vulnerabilities
Aliases
* Backdoor.Win32.Rbot.bbt
* W32/Gaobot.worm.gen.t
* WORM_AGOBOT.AQN
Prevalence (1-5) 2
Description
W32/Rbot-EHK is a worm with backdoor functionality For the Windows
platform.
W32/Rbot-EHK attempts to steal confidential information and send it
to a remote location via HTTP or email.
The information that W32/Rbot-EHK attempts to gather includes:
- keypresses (with the aid of a dropped keylogger DLL)
- computer details
- drive and volume information
- hostname and IP address
- information (including passwords and usernames) relating to
selected applications installed on the computer, including: Miranda
ICQ, mirabilis ICQ, The Bat!, Trillian, Windows Commander and Total
Commander
- passwords and confidential information stored by the system in
'Protected Storage'
- POP3 and IMAP server information, usernames and passwords
- FTP usernames and passwords
- RAS dial-up settings
W32/Rbot-EHK provides a backdoor server on a pre-configured port (the
default is 2050). A remote intruder will be able to connect to this
port and receive command shell access.
Advanced
W32/Rbot-EHK is a worm with backdoor functionality For the Windows
platform.
W32/Rbot-EHK attempts to steal confidential information and send it
to a remote location via HTTP or email.
The information that W32/Rbot-EHK attempts to gather includes:
- keypresses (with the aid of a dropped keylogger DLL)
- computer details
- drive and volume information
- hostname and IP address
- information (including passwords and usernames) relating to
selected applications installed on the computer, including: Miranda
ICQ, mirabilis ICQ, The Bat!, Trillian, Windows Commander and Total
Commander
- passwords and confidential information stored by the system in
'Protected Storage'
- POP3 and IMAP server information, usernames and passwords
- FTP usernames and passwords
- RAS dial-up settings
W32/Rbot-EHK provides a backdoor server on a pre-configured port (the
default is 2050). A remote intruder will be able to connect to this
port and receive command shell access.
W32/Rbot-EHK can arrive as a result of web browsing. Certain web
pages may exploit vulnerabilities associated with Microsoft Internet
Explorer to silently download and install/run the worm without user
interaction.
W32/Rbot-EHK runs continuously in the background, providing a
backdoor server which allows a remote intruder to gain access and
control over the computer via IRC channels.
W32/Rbot-EHK includes functionality to steal confidential information.
When first run W32/Rbot-EHK copies itself to <Windows system
folder>\gamo.exe.
The following registry entries are created to run gamo.exe on startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows ASN4 Services
gamo.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
Windows ASN4 Services
gamo.exe
Registry entries are set as follows:
HKLM\SOFTWARE\Microsoft\Ole
EnableDCOM
N
HKLM\SYSTEM\CurrentControlSet\Control\Lsa
restrictanonymous
1
Name Troj/ConHook-K
Type
* Trojan
Affected operating systems
* Windows
Side effects
* Downloads code from the internet
* Installs itself in the Registry
Aliases
* Trojan-Downloader.Win32.ConHook.aa
Prevalence (1-5) 2
Description
Troj/ConHook-K is a Trojan for the Windows platform.
Advanced
Troj/ConHook-K is a Trojan for the Windows platform.
The following registry entries are created to run code exported by
the Trojan on startup:
HKLM\SOFTWARE\Microsoft\Windows
NT\CurrentVersion\Winlogon\Notify\atlS32
The Trojan is registered as a COM and Browser Help Object, creating
the following registry entries to run itself on startup:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
<Trojan filename>
RunDll32.exe "<path to Trojan executable>,Setup"
HKCR\CLSID\(4b1d0751-cb48-4265-a975-878be45145c6)\InprocServer32
(default)
<path to Trojan executable>
Name W32/Akbot-AA
Type
* Worm
How it spreads
* Network shares
Affected operating systems
* Windows
Side effects
* Allows others to access the computer
* Downloads code from the internet
* Installs itself in the Registry
* Used in DOS attacks
Aliases
* Backdoor.Win32.Agent.vc
* BKDR_AGENT.RO
Prevalence (1-5) 2
Description
W32/Akbot-AA is a worm and IRC backdoor for the Windows platform.
The worm attempts to spread by copying itself to remote network
shares or by exploiting common buffer overflow vulnerabilities,
including: LSASS
(http://www.microsoft.com/technet/security/bulletin/ms04-011.mspx)
and ASN.1
(http://www.microsoft.com/technet/security/bulletin/ms04-007.mspx).
W32/Akbot-AA connects to an IRC channel and listens for backdoor
commands from a remote attacker. Backdoor functionality of the worm
includes the ability to download further code and to carry out
denial-of-service attacks.
Advanced
W32/Akbot-AA is a worm and IRC backdoor for the Windows platform.
The worm attempts to spread by copying itself to remote network
shares or by exploiting common buffer overflow vulnerabilities,
including: LSASS
(http://www.microsoft.com/technet/security/bulletin/ms04-011.mspx)
and ASN.1
(http://www.microsoft.com/technet/security/bulletin/ms04-007.mspx).
W32/Akbot-AA connects to an IRC channel and listens for backdoor
commands from a remote attacker. Backdoor functionality of the worm
includes the ability to download further code and to carry out
denial-of-service attacks.
When first run W32/Akbot-AA copies itself to <Windows system
folder>\fstsvc.dll.
The following registry entry is created to run code exported by
fstsvc.dll on
startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
fstsvc
rundll32.exe <Windows system folder>\fstsvc.dll,start
Name W32/Mytob-II
Type
* Worm
How it spreads
* Email messages
Affected operating systems
* Windows
Side effects
* Allows others to access the computer
* Forges the sender's email address
* Uses its own emailing engine
Aliases
* Net-Worm.Win32.Mytob.eo
* Win32/Mytob.TY
* W32.Mytob.QA@mm
Prevalence (1-5) 2
Description
W32/Mytob-II is a mass-mailing worm and IRC backdoor Trojan for the
Windows platform.
Messages sent by the worm will have the following characteristics.
Subject title chosen from:
Account alert
<random characters>
Message text:
'Dear Valued Member,
According to our terms of services, you will have to confirm your
e-mail by the following link, or your account will be suspended
within 24 hours for security reasons.
<link to worm currently detected by Sophos as W32/Mytob-IF>
After following the instructions in the sheet, your account will not
be interrupted and will continue as normal.
Thanks for your attention to this request. We apologize for any
inconvenience.
Sincerely <random name> Department'
Advanced
W32/Mytob-II is a mass-mailing worm and IRC backdoor Trojan for the
Windows platform.
W32/Mytob-II runs continuously in the background, providing a
backdoor server which allows a remote intruder to gain access and
control over the computer via IRC channels.
The following registry entries are created to run scvhost.exe on
startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
Microsoft Task Manager
\scvhost.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Microsoft Task Manager
\scvhost.exe
Messages sent by the worm will have the following characteristics.
Subject title chosen from:
Account alert
<random characters>
Message text:
'Dear Valued Member,
According to our terms of services, you will have to confirm your
e-mail by the following link, or your account will be suspended
within 24 hours for security reasons.
<link to worm currently detected by Sophos as W32/Mytob-IF>
After following the instructions in the sheet, your account will not
be interrupted and will continue as normal.
Thanks for your attention to this request. We apologize for any
inconvenience.
Sincerely <random name> Department'
Name W32/Mytob-IF
Type
* Worm
How it spreads
* Email messages
Affected operating systems
* Windows
Side effects
* Allows others to access the computer
* Sends itself to email addresses found on the infected computer
* Downloads code from the internet
* Installs itself in the Registry
Prevalence (1-5) 2
Description
W32/Mytob-IF is a worm and IRC backdoor Trojan for the Windows
platform.
The worm connects to an IRC channel and listens for commands from a
remote attacker. The worm may download further malicious code.
W32/Mytob-IF spreads by sending emails with the following
characteristics:
From: abuse@<harvested domain>
Subject line: "Account Alert" or a randomly generated string.
Message text:
Dear Valued Member,
According to our terms of services, you will have to confirm your
e-mail by the following link, or your account will be suspended
within 24 hours for security reasons.
<spoofed link pointing to a copy of the worm>
After following the instructions in the sheet, your account will not
be interrupted and will continue as normal.
Thanks for your attention to this request. We apologize for any
inconvenience.
Sincerely, <Harvested domain> Abuse Department
Advanced
W32/Mytob-IF is a worm and IRC backdoor Trojan for the Windows
platform.
The worm connects to an IRC channel and listens for commands from a
remote attacker. The worm may download further malicious code.
W32/Mytob-IF spreads by sending emails with the following
characteristics:
From: abuse@<harvested domain>
Subject line: "Account Alert" or a randomly generated string.
Message text:
Dear Valued Member,
According to our terms of services, you will have to confirm your
e-mail by the following link, or your account will be suspended
within 24 hours for security reasons.
<spoofed link pointing to a copy of the worm>
After following the instructions in the sheet, your account will not
be interrupted and will continue as normal.
Thanks for your attention to this request. We apologize for any
inconvenience.
Sincerely, <Harvested domain> Abuse Department
When first run W32/Mytob-IF will copy itself to the Windows system
folder as lspool.exe and to the <temp> folder as temp.exe
The worm creates the following registry entries in an attempt to run
itself on startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Local Spooler
lspool.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
Local Spooler
lspool.exe
Name W32/Bagle-KN
Type
* Worm
How it spreads
* Email attachments
Affected operating systems
* Windows
Side effects
* Turns off anti-virus applications
* Forges the sender's email address
* Downloads code from the internet
* Installs itself in the Registry
* Leaves non-infected files on computer
Prevalence (1-5) 2
Description
W32/Bagle-KN is a mass-mailing worm and downloader Trojan for the
Windows platform.
Emails sent by the worm have the following characteristics:
The sender's email address is spoofed.
Message text chosen from:
To the beloved
I love you
And appended with any of the following strings:
archive password: <link to imagefile containing password>
The password is <link to imagefile containing password>
Password -- <link to imagefile containing password>
Use password <link to imagefile containing password> to open archive.
Password is <link to imagefile containing password>
Zip password: <link to imagefile containing password>
archive password: <link to imagefile containing password>
Password - <link to imagefile containing password>
Password: <link to imagefile containing password>
The email comes with 2 file attachments:
<random characters>.GIF
<random name>.ZIP
The file <random characters>.GIF contains a GIF image which contains
the password to unzip the ZIP file.
The file <random name>.ZIP when unzipped contains 2 files:
<random characters>\<random characters>.dll - this file may be safely
deleted
<random characters>.exe - detected as W32/Bagle-KN
Advanced
W32/Bagle-KN is a mass-mailing worm and downloader Trojan for the
Windows platform.
When run W32/Bagle-KN creates the file <User>\Application
Data\hidn\m_hook.sys. This file is also detected as W32/Bagle-KN and
includes functionality to terminate anti-virus and system-related
processes and to hide processes.
The file m_hook.sys is registered as a new system driver service
named "m_hook", with a display name of "Empty" and a startup type of
automatic, so that it is started automatically during system startup.
Registry entries are created under:
HKLM\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_M_HOOK\
HKLM\SYSTEM\CurrentControlSet\Services\m_hook\
The following registry entry is also set:
HKCU\Software\FirstRuxzx
FirstRun
1
W32/Bagle-KN also creates the file C:\error.gif. This is a GIF file
which is also subsequently run and can be safely deleted.
Emails sent by the worm have the following characteristics:
The sender's email address is spoofed.
Message text chosen from:
To the beloved
I love you
And appended with any of the following strings:
archive password: <link to imagefile containing password>
The password is <link to imagefile containing password>
Password -- <link to imagefile containing password>
Use password <link to imagefile containing password> to open archive.
Password is <link to imagefile containing password>
Zip password: <link to imagefile containing password>
archive password: <link to imagefile containing password>
Password - <link to imagefile containing password>
Password: <link to imagefile containing password>
The email comes with 2 file attachments:
<random characters>.GIF
<random name>.ZIP
The file <random characters>.GIF contains a GIF image which contains
the password to unzip the ZIP file.
The file <random name>.ZIP when unzipped contains 2 files:
<random characters>\<random characters>.dll - this file may be safely
deleted
<random characters>.exe - detected as W32/Bagle-KN
W32/Bagle-KN may also copy itself to <User>\Application
Data\hidn\hidn1.exe and sets the following registry entry to run
hidn1.exe on startup:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
drv_st_key
<path to worm executable>
Name Troj/Zlob-OX
Type
* Trojan
Affected operating systems
* Windows
Side effects
* Installs itself in the Registry
Aliases
* Trojan-Downloader.Win32.Zlob.uo
* Puper
Prevalence (1-5) 2
Description
Troj/Zlob-OX is a Trojan for the Windows platform.
Advanced
Troj/Zlob-OX is a Trojan for the Windows platform.
When Troj/Zlob-OX is installed the following file is created:
<System>\stdole3.tlb
(This file is not malicious and can be deleted.)
The following registry entry is created to run Troj/Zlob-OX on startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\explorer\run
kernel32.dll
<pathname of the Trojan executable>
Name W32/Rbot-EMH
Type
* Worm
How it spreads
* Network shares
Affected operating systems
* Windows
Side effects
* Allows others to access the computer
* Installs itself in the Registry
* Exploits system or software vulnerabilities
Aliases
* clickspringinsta_HmWhs26R.html
Prevalence (1-5) 2
Description
W32/Rbot-EMH is a worm and IRC backdoor for the Windows platform.
W32/Rbot-EMH spreads:
to other network computers infected with: Troj/Kuang, Troj/Sub7,
Troj/NetDevil, W32/MyDoom, W32/Bagle and Troj/Optix to other network
computers by exploiting common buffer overflow vulnerabilities,
including: LSASS
(http://www.microsoft.com/technet/security/bulletin/ms04-011.mspx),
RPC-DCOM
(http://www.microsoft.com/technet/security/bulletin/ms04-012.mspx),
WKS
(http://www.microsoft.com/technet/security/bulletin/ms03-049.mspx)
(CAN-2003-0812), WebDav
(http://www.microsoft.com/technet/security/bulletin/ms03-007.mspx),
IIS5SSL
(http://www.microsoft.com/technet/security/bulletin/ms04-011.mspx)
(CAN-2003-0719), UPNP
(http://www.microsoft.com/technet/security/bulletin/ms01-059.mspx),
Veritas (CAN-2004-1172), Dameware (CAN-2003-1030) and ASN.1
(http://www.microsoft.com/technet/security/bulletin/ms04-007.mspx) by
copying itself to network shares protected by weak passwords
W32/Rbot-EMH runs continuously in the background, providing a
backdoor server which allows a remote intruder to gain access and
control over the computer via IRC channels.
Advanced
W32/Rbot-EMH is a worm and IRC backdoor for the Windows platform.
W32/Rbot-EMH spreads:
to other network computers infected with: Troj/Kuang, Troj/Sub7,
Troj/NetDevil, W32/MyDoom, W32/Bagle and Troj/Optix
to other network computers by exploiting common buffer overflow
vulnerabilities, including: LSASS
(http://www.microsoft.com/technet/security/bulletin/ms04-011.mspx),
RPC-DCOM
(http://www.microsoft.com/technet/security/bulletin/ms04-012.mspx),
WKS
(http://www.microsoft.com/technet/security/bulletin/ms03-049.mspx)
(CAN-2003-0812), WebDav
(http://www.microsoft.com/technet/security/bulletin/ms03-007.mspx),
IIS5SSL
(http://www.microsoft.com/technet/security/bulletin/ms04-011.mspx)
(CAN-2003-0719), UPNP
(http://www.microsoft.com/technet/security/bulletin/ms01-059.mspx),
Veritas (CAN-2004-1172), Dameware (CAN-2003-1030) and ASN.1
(http://www.microsoft.com/technet/security/bulletin/ms04-007.mspx)
by copying itself to network shares protected by weak passwords
W32/Rbot-EMH runs continuously in the background, providing a
backdoor server which allows a remote intruder to gain access and
control over the computer via IRC channels.
When first run W32/Rbot-EMH copies itself to a randomly named file in
the Windows system folder.
The following registry entries are created to run to copy on startup:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows Recycler
<random name>
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
Windows Recycler
<random name>
Registry entries are set as follows:
HKCU\Software\Microsoft\OLE
Windows Recycler
<random name>
HKLM\SOFTWARE\Microsoft\Ole
EnableDCOM
N
HKLM\SYSTEM\CurrentControlSet\Control\Lsa
restrictanonymous
1
Name Troj/Dloadr-YD
Type
* Trojan
Affected operating systems
* Windows
Side effects
* Downloads code from the internet
* Installs itself in the Registry
Prevalence (1-5) 2
Description
Troj/Dloadr-YD is a Trojan for the Windows platform.
Advanced
Troj/Dloadr-YD is a Trojan for the Windows platform.
When first run Troj/Dloadr-YD copies itself to:
<User>\Local Settings\Application Data\<random filename>
<System>\<random filename>
The following registry entries are created to run Troj/Dloadr-YD on
startup:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
<random filename>
<User>\Local Settings\Application Data\<random filename>
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
<System>\<random filename>
Name W32/Sdbot-BZD
Type
* Spyware Worm
How it spreads
* Network shares
Affected operating systems
* Windows
Side effects
* Allows others to access the computer
* Modifies data on the computer
* Steals information
* Downloads code from the internet
* Reduces system security
* Records keystrokes
* Installs itself in the Registry
* Exploits system or software vulnerabilities
* Used in DOS attacks
* Downloads updates
* Monitors system activity
* Scans network for weak passwords
Aliases
* Backdoor.Win32.SdBot.iz
Prevalence (1-5) 2
Description
W32/Sdbot-BZD is a worm for the Windows platform.
The worm spreads to network shares protected by weak passwords.
The worm contains a backdoor component that connects to an IRC server
and awaits commands from remote attackers.
Advanced
W32/Sdbot-BZD is a worm for the Windows platform.
The worm spreads to network shares protected by weak passwords.
When run, the worm copies itself to the Windows system folder as
iop.exe and sets the following registry entries in order to run each
time a user logs on:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
ioco
"<Windows system folder>\iop.exe"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ioco
"<Windows system folder>\iop.exe"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
ioco
"<Windows system folder>\iop.exe"
W32/Sdbot-BZD modifies the HOSTS file (typically located in <Windows
system folder>\drivers\etc) redirecting requests for security related
websites to alternate locations.
The worm contains a backdoor component that connects to an IRC server
and awaits commands from remote attackers.
W32/Sdbot-BZD modifies the Windows firewall settings by creating the
following registry entry:
HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\
FirewallPolicy\StandardProfile\AuthorizedApplications
List
"%windir%\system32\iop.exe:*:Enabled:@xpsp2res.dll,-22019"
Name W32/Tilebot-FO
Type
* Worm
How it spreads
* Network shares
* Chat programs
Affected operating systems
* Windows
Side effects
* Allows others to access the computer
* Downloads code from the internet
* Reduces system security
* Installs itself in the Registry
* Exploits system or software vulnerabilities
* Used in DOS attacks
Aliases
* Backdoor.Win32.SdBot.aoz
Prevalence (1-5) 2
Description
W32/Tilebot-FO is a worm with backdoor functionality for the Windows
platform.
W32/Tilebot-FO spreads to other network computers by exploiting
common buffer
overflow vulnerabilities, including: WKS (MS03-049) (CAN-2003-0812),
PNP
(MS05-039) and ASN.1 (MS04-007). The worm may also spreads via
network shares
and MSSQL servers protected by weak passwords.
W32/Tilebot-FO runs continuously in the background, providing a
backdoor server
which allows a remote intruder to gain access and control over the
computer via
IRC channels.
W32/Tilebot-FO includes functionality to:
- set up an FTP server
- set up a proxy server
- spread via AOL Instant Messager by sending messages automatically
- change Internet Explorer start page
- set or remove network shares
- port scanning
- packet sniffing
- access the internet and communicate with a remote server via HTTP
- harvest information from clipboard
- take part in Distributed Denial of Service (DDoS) attacks
Advanced
W32/Tilebot-FO is a worm with backdoor functionality for the Windows
platform.
W32/Tilebot-FO spreads to other network computers by exploiting
common buffer
overflow vulnerabilities, including: WKS (MS03-049) (CAN-2003-0812),
PNP
(MS05-039) and ASN.1 (MS04-007). The worm may also spreads via
network shares
and MSSQL servers protected by weak passwords.
W32/Tilebot-FO runs continuously in the background, providing a
backdoor server
which allows a remote intruder to gain access and control over the
computer via
IRC channels.
W32/Tilebot-FO includes functionality to:
- set up an FTP server
- set up a proxy server
- spread via AOL Instant Messager by sending messages automatically
- change Internet Explorer start page
- set or remove network shares
- port scanning
- packet sniffing
- access the internet and communicate with a remote server via HTTP
- harvest information from clipboard
- take part in Distributed Denial of Service (DDoS) attacks
When first run W32/Tilebot-FO copies itself to the Windows system
folder as
netdrvr.exe.
The file netdrvr.exe is registered as a new system driver service
named "NTDRV",
with a display name of "Network DRV" and a startup type of automatic,
so that it
is started automatically during system startup. Registry entries are
created
under:
HKLM\SYSTEM\CurrentControlSet\Services\NTDRV\
W32/Tilebot-FO sets the following registry entries, disabling the
automatic
startup of other software:
HKLM\SYSTEM\CurrentControlSet\Services\Messenger
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\TlntSvr
Start
4
HKLM\SYSTEM\CurrentControlSet\Services\wscsvc
Start
4
Additional registry entries are set as follows:
HKLM\SOFTWARE\Microsoft\Security Center
AntiVirusDisableNotify
1
HKLM\SOFTWARE\Microsoft\Security Center
AntiVirusOverride
1
HKLM\SOFTWARE\Microsoft\Security Center
FirewallDisableNotify
1
HKLM\SOFTWARE\Microsoft\Security Center
FirewallOverride
1
HKLM\SOFTWARE\Microsoft\Security Center
UpdatesDisableNotify
1
HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate
DoNotAllowXPSP2
1
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile
EnableFirewall
0
HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile
EnableFirewall
0
HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters
AutoShareServer
0
HKLM\SYSTEM\CurrentControlSet\Services\lanmanserver\parameters
AutoShareWks
0
HKLM\SYSTEM\CurrentControlSet\Services\lanmanworkstation\parameters
AutoShareServer
0
HKLM\SYSTEM\CurrentControlSet\Services\lanmanworkstation\parameters
AutoShareWks
0
HKLM\SYSTEM\CurrentControlSet\Control\
WaitToKillServiceTimeout
7000
HKLM\SOFTWARE\Microsoft\Ole
EnableDCOM
N
HKLM\SYSTEM\CurrentControlSet\Control\Lsa
restrictanonymous
1
Name W32/Tilebot-FP
Type
* Worm
How it spreads
* Network shares
Affected operating systems
* Windows
Side effects
* Allows others to access the computer
* Installs itself in the Registry
* Exploits system or software vulnerabilities
Aliases
* Backdoor.Win32.SdBot.aad
Prevalence (1-5) 2
Description
W32/Tilebot-FP is a worm and IRC backdoor Trojan for the Windows
platform.
W32/Tilebot-FP spreads to other network computers by exploiting
common buffer overflow vulnerabilities, including: LSASS
(http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx),
RPC-DCOM
(http://www.microsoft.com/technet/security/bulletin/MS04-012.mspx),
WKS
(http://www.microsoft.com/technet/security/bulletin/MS03-049.mspx)
(CAN-2003-0812), PNP
(http://www.microsoft.com/technet/security/bulletin/MS05-039.mspx)
and ASN.1
(http://www.microsoft.com/technet/security/bulletin/MS04-007.mspx)
and by copying itself to network shares protected by weak passwords.
W32/Tilebot-FP runs continuously in the background, providing a
backdoor server which allows a remote intruder to gain access and
control over the computer via IRC channels.
W32/Tilebot-FP includes functionality to access the internet and
communicate with a remote server via HTTP.
Advanced
W32/Tilebot-FP is a worm and IRC backdoor Trojan for the Windows
platform.
W32/Tilebot-FP spreads to other network computers by exploiting
common buff
|