From; Sophos Alert System: Name: Troj/Legmir-K Type: Trojan Date: 22 April 2004 A virus identity (IDE) file which provides protection is available now from the Sophos website, and will be incorporated into the June 2004 (3.82) release of Sophos Anti-Virus. Customers using Enterprise Manager, PureMessage and any of the Sophos small business solutions will be automatically protected at their next scheduled update. At the time of writing, Sophos has received just one report of this Trojan from the wild. Information about Troj/Legmir-K can be found at: http://www.sophos.com/virusinfo/analyses/trojlegmirk.html Description Troj/LegMir-K is a password-stealing Trojan. In order to run automatically when Windows starts up the Trojan copies itself to the file intrenat.exe in the Windows folder and adds the following registry entries: HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ Intrenat = C:\WINDOWS\intrenat.exe HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices\ Intrenat = C:\WINDOWS\intrenat.exe Troj/LegMir-K also creates the file exp1orer.dll in the Windows folder. This file is already detected as Troj/LegMir-E. To avoid detection, Troj/LegMir-K attempts to terminate the following processes: EGHOST.EXE MAILMON.EXE KAVPFW.EXE RAVTIMER.EXE RAVMON.EXE CCENTER.EXE NAVAPW32.EXE Troj/LegMir-K stores stolen passwords in the HKCR section of the registry and sends them to the author via email. The destination email address and the exact location in the registry can both be configured by the author. Recovery Please follow the instructions for removing Trojans. Change any passwords that may have become compromised. You will also need to edit the following registry entries, if they are present. Please read the warning about editing the registry. At the taskbar, click Start|Run. Type 'Regedit' and press Return. The registry editor opens. Before you edit the registry, you should make a backup. On the 'Registry' menu, click 'Export Registry File'. In the 'Export range' panel, click 'All', then save your registry as Backup. Locate the HKEY_LOCAL_MACHINE entries: HKLM\Software\Microsoft\Windows\CurrentVersion\Run\ Intrenat = C:\WINDOWS\intrenat.exe HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices\ Intrenat = C:\WINDOWS\intrenat.exe and delete them if they exist. Close the registry editor. This IDE file also includes detection for: W32/Agobot-LO http://www.sophos.com/virusinfo/analyses/w32agobotlo.html W32/Sdbot-HO http://www.sophos.com/virusinfo/analyses/w32sdbotho.html Troj/Padodor-A http://www.sophos.com/virusinfo/analyses/trojpadodora.html W32/Agobot-GL http://www.sophos.com/virusinfo/analyses/w32agobotgl.html Troj/Agent-AA http://www.sophos.com/virusinfo/analyses/trojagentaa.html W32/Agobot-GN http://www.sophos.com/virusinfo/analyses/w32agobotgn.html W32/Agobot-KR http://www.sophos.com/virusinfo/analyses/w32agobotkr.html W32/Rbot-F http://www.sophos.com/virusinfo/analyses/w32rbotf.html W32/Sdbot-HP http://www.sophos.com/virusinfo/analyses/w32sdbothp.html Troj/Banker-R http://www.sophos.com/virusinfo/analyses/trojbankerr.html Download the IDE file from: http://www.sophos.com/downloads/ide/legmir-k.ide Download all the IDE files available for the current version of Sophos Anti-Virus in a single compressed file. The file is available in two formats: Zip file: http://www.sophos.com/downloads/ide/ides.zip Self-extracting file: http://www.sophos.com/downloads/ide/ides.exe Read about how to use IDE files at http://www.sophos.com/downloads/ide/using.html --------------------------------------------------------------------- Mike ~ It is a good day if I learned something new. Editor MikesWhatsNews see a sample on my web page http://www3.telus.net/mikebike <mikeswhatsnews-request@xxxxxxxxxxxxx?Subject=subscribe> http://www3.telus.net/mikebike/worm_removal.htm See my Anti-Virus pages http://virusinfo.hackfix.org/index <virusinfo-request@xxxxxxxxxxxxx?Subject=subscribe> A Technical Support Alliance and OWTA Charter Member