[virusinfo] Troj/Zapchas-K

  • From: "Mike" <mikebike@xxxxxxxxx>
  • To: virusinfo@xxxxxxxxxxxxx
  • Date: Mon, 13 Jun 2005 15:18:57 -0700

From; Sophos Alert System:

Name: Troj/Zapchas-K
Aliases: IRC/Flood.mirc, Backdoor.Win32.mIRC-based
Type: Trojan
Date: 13 June 2005

Sophos has issued protection for Troj/Zapchas-K.

At the time of writing, Sophos has received a small number of
reports of this Trojan from the wild.

Customers using EM Library, Enterprise Console, PureMessage or
any of our Sophos small business solutions will be automatically
protected at their next scheduled update.


Information about Troj/Zapchas-K can be found at:
http://www.sophos.com/virusinfo/analyses/trojzapchask.html

Troj/Zapchas-K is a backdoor Trojan which allows a remote intruder to gain 
access and control over the computer via IRC channels. 
Troj/Zapchas-K typically arrives via IRC channels as a DCC Send with the 
filename postcard.gif.exe. 
The backdoor includes functions that allow a remote intruder to upload and 
download files, run programs and steal CD keys. 
When the Trojan is installed the following component files, detected as 
Troj/Zapchas-K, are created in the C:\Windows\System folder: 
svchost.exe
script.ini 
The Troj/Zapchas-K also creates the following files which may be safely deleted 
after the Trojan has been removed: 
mirc.ini
msg.txt
nicks.txt
pri.txt
remote.ini
serv.txt
servers.ini
sup.bat
sup.reg
username.txt 
The following registry entry is created to run svchost.exe on when a user makes
outbound connections using the IRC protocol: 
HKLM\SOFTWARE\CLASSES\irc\Shell\open\command
@
"C:\Windows\System\svchost.exe" -noconnect 
Troj/Zapchas-K may also set the following registry entry in order to run each 
time a user logs on: 
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
GNP Generic Host Process
"C:\Windows\system\svchost.exe" 
 

The Troj/Zapchas-K virus identity file (IDE) includes detection for:


Troj/RuinDl-A
http://www.sophos.com/virusinfo/analyses/trojruindla.html
Troj/Psyme-BX
http://www.sophos.com/virusinfo/analyses/trojpsymebx.html
Troj/Hogil-C
http://www.sophos.com/virusinfo/analyses/trojhogilc.html
Troj/Hogdown-A
http://www.sophos.com/virusinfo/analyses/trojhogdowna.html
W32/Mytob-EP
http://www.sophos.com/virusinfo/analyses/w32mytobep.html
W32//Rbot-AFZ
http://www.sophos.com/virusinfo/analyses/w32rbotafz.html
Troj/Dloader-OR
http://www.sophos.com/virusinfo/analyses/trojdloaderor.html
Troj/Dloader-OS
http://www.sophos.com/virusinfo/analyses/trojdloaderos.html
Dial/Platform-D
http://www.sophos.com/virusinfo/analyses/dialplatformd.html

Customers with 3.xx or lower versions of Sophos Anti-Virus, 
who are not running EM Library, can manually download the IDE
for Troj/Zapchas-K from:

http://www.sophos.com/downloads/ide/zapcha-k.ide

Read about how to use IDE files at
http://www.sophos.com/support/knowledgebase/article/363.html

*********** MIKE"S REPLY SEPARATOR  ***********
Mike ~ It is a good day if I learned something new.
Editor MikesWhatsNews see a sample on my web page
http://www3.telus.net/mikebike
<mikeswhatsnews-request@xxxxxxxxxxxxx?Subject=subscribe>
http://www3.telus.net/mikebike/worm_removal.htm
See my Anti-Virus pages  http://virusinfo.hackfix.org/index
<virusinfo-request@xxxxxxxxxxxxx?Subject=subscribe>
A Technical Support Alliance  and OWTA Charter Member 




Other related posts:

  • » [virusinfo] Troj/Zapchas-K