From; Sophos Alert System: Name: W32/Agobot-FZ Aliases: Backdoor.Agobot.kt, W32/Gaobot.worm.gen.j Type: Win32 worm Date: 13 April 2004 A virus identity (IDE) file which provides protection is available now from the Sophos website, and will be incorporated into the May 2004 (3.81) release of Sophos Anti-Virus. Enterprise Manager and PureMessage customers will be automatically protected at their next scheduled update. Sophos has received several reports of this worm from the wild. Information about W32/Agobot-FZ can be found at: http://www.sophos.com/virusinfo/analyses/w32agobotfz.html ThisDescription W32/Agobot-FZ is an IRC backdoor Trojan and network worm. W32/Agobot-FZ is capable of spreading to computers on the local network protected by weak passwords. When first run W32/Agobot-FZ copies itself to the Windows system folder as msdtc32.exe and creates the following registry entries to run itself on startup: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Video Device Loader = msdtc32.exe HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\ Video Device Loader = msdtcc32.exe Each time W32/Agobot-FZ is run it attempts to connect to a remote IRC server and join a specific channel. W32/Agobot-FZ then runs continuously in the background, allowing a remote intruder to access and control the computer via IRC channels. W32/Agobot-FZ attempts to terminate and disable various anti-virus and security-related programs. Recovery Please follow the instructions for removing worms. Check your administrator passwords and review network security. You will also need to edit the following registry entries, if they are present. Please read the warning about editing the registry. At the taskbar, click Start|Run. Type 'Regedit' and press Return. The registry editor opens. Before you edit the registry, you should make a backup. On the 'Registry' menu, click 'Export Registry File'. In the 'Export range' panel, click 'All', then save your registry as Backup. Locate the HKEY_LOCAL_MACHINE entries: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ Video Device Loader = msdtc32.exe HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\ Video Device Loader = msdtcc32.exe and delete them if they exist. Close the registry editor. IDE file also includes detection for: Troj/Tofger-I http://www.sophos.com/virusinfo/analyses/trojtofgeri.html Troj/Swizzor-B http://www.sophos.com/virusinfo/analyses/trojswizzorb.html W32/Agobot-FW http://www.sophos.com/virusinfo/analyses/w32agobotfw.html Troj/Banker-B http://www.sophos.com/virusinfo/analyses/trojbankerb.html Troj/Delf-EY http://www.sophos.com/virusinfo/analyses/trojdelfey.html Troj/DownLdr-EY http://www.sophos.com/virusinfo/analyses/trojdownldrey.html Troj/Webber-F http://www.sophos.com/virusinfo/analyses/trojwebberf.html Troj/Webber-G http://www.sophos.com/virusinfo/analyses/trojwebberg.html W32/Agobot-GB http://www.sophos.com/virusinfo/analyses/w32agobotgb.html Download the IDE file from: http://www.sophos.com/downloads/ide/agobotfz.ide Download all the IDE files available for the current version of Sophos Anti-Virus in a single compressed file. The file is available in two formats: Zip file: http://www.sophos.com/downloads/ide/ides.zip Self-extracting file: http://www.sophos.com/downloads/ide/ides.exe Read about how to use IDE files at http://www.sophos.com/downloads/ide/using.html --------------------------------------------------------------------- Mike ~ It is a good day if I learned something new. Editor MikesWhatsNews see a sample on my web page http://www3.telus.net/mikebike <mikeswhatsnews-request@xxxxxxxxxxxxx?Subject=subscribe> http://www3.telus.net/mikebike/worm_removal.htm See my Anti-Virus pages http://virusinfo.hackfix.org/index <virusinfo-request@xxxxxxxxxxxxx?Subject=subscribe> A Technical Support Alliance and OWTA Charter Member