From; Sophos Alert System: Name: Troj/Zapchas-K Aliases: IRC/Flood.mirc, Backdoor.Win32.mIRC-based Type: Trojan Date: 13 June 2005 Sophos has issued protection for Troj/Zapchas-K. At the time of writing, Sophos has received a small number of reports of this Trojan from the wild. Customers using EM Library, Enterprise Console, PureMessage or any of our Sophos small business solutions will be automatically protected at their next scheduled update. Information about Troj/Zapchas-K can be found at: http://www.sophos.com/virusinfo/analyses/trojzapchask.html Troj/Zapchas-K is a backdoor Trojan which allows a remote intruder to gain access and control over the computer via IRC channels. Troj/Zapchas-K typically arrives via IRC channels as a DCC Send with the filename postcard.gif.exe. The backdoor includes functions that allow a remote intruder to upload and download files, run programs and steal CD keys. When the Trojan is installed the following component files, detected as Troj/Zapchas-K, are created in the C:\Windows\System folder: svchost.exe script.ini The Troj/Zapchas-K also creates the following files which may be safely deleted after the Trojan has been removed: mirc.ini msg.txt nicks.txt pri.txt remote.ini serv.txt servers.ini sup.bat sup.reg username.txt The following registry entry is created to run svchost.exe on when a user makes outbound connections using the IRC protocol: HKLM\SOFTWARE\CLASSES\irc\Shell\open\command @ "C:\Windows\System\svchost.exe" -noconnect Troj/Zapchas-K may also set the following registry entry in order to run each time a user logs on: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run GNP Generic Host Process "C:\Windows\system\svchost.exe" The Troj/Zapchas-K virus identity file (IDE) includes detection for: Troj/RuinDl-A http://www.sophos.com/virusinfo/analyses/trojruindla.html Troj/Psyme-BX http://www.sophos.com/virusinfo/analyses/trojpsymebx.html Troj/Hogil-C http://www.sophos.com/virusinfo/analyses/trojhogilc.html Troj/Hogdown-A http://www.sophos.com/virusinfo/analyses/trojhogdowna.html W32/Mytob-EP http://www.sophos.com/virusinfo/analyses/w32mytobep.html W32//Rbot-AFZ http://www.sophos.com/virusinfo/analyses/w32rbotafz.html Troj/Dloader-OR http://www.sophos.com/virusinfo/analyses/trojdloaderor.html Troj/Dloader-OS http://www.sophos.com/virusinfo/analyses/trojdloaderos.html Dial/Platform-D http://www.sophos.com/virusinfo/analyses/dialplatformd.html Customers with 3.xx or lower versions of Sophos Anti-Virus, who are not running EM Library, can manually download the IDE for Troj/Zapchas-K from: http://www.sophos.com/downloads/ide/zapcha-k.ide Read about how to use IDE files at http://www.sophos.com/support/knowledgebase/article/363.html *********** MIKE"S REPLY SEPARATOR *********** Mike ~ It is a good day if I learned something new. Editor MikesWhatsNews see a sample on my web page http://www3.telus.net/mikebike <mikeswhatsnews-request@xxxxxxxxxxxxx?Subject=subscribe> http://www3.telus.net/mikebike/worm_removal.htm See my Anti-Virus pages http://virusinfo.hackfix.org/index <virusinfo-request@xxxxxxxxxxxxx?Subject=subscribe> A Technical Support Alliance and OWTA Charter Member