[virusinfo] W32/Agobot-SE

  • From: "Mike" <mikebike@xxxxxxxxx>
  • To: virusinfo@xxxxxxxxxxxxx
  • Date: Mon, 20 Jun 2005 12:19:00 -0700

From; Sophos Alert System:

Name: W32/Agobot-SE
Aliases: Backdoor.Win32.Agobot.ace
Type: Win32 worm
Date: 20 June 2005

Sophos has issued protection for W32/Agobot-SE.

At the time of writing, Sophos has received a small number of
reports of this worm from the wild.

Customers using EM Library, Enterprise Console, PureMessage or
any of our Sophos small business solutions will be automatically
protected at their next scheduled update.


Note: The IDE issued for W32/Agobot-SE at 10 May 2005 21:16:33
(GMT)  also contained detection for Troj/StartPA-GB,
W32/Rbot-ABZ, Troj/KillAv-EQ, Troj/Delive-A, Troj/Synflood-G,
Troj/Bancban-CM,  Troj/Bancban-CL and W32/Agobot-SC.  This IDE
has now been updated to enhance detection of W32/Rbot-ABZ.

Information about W32/Agobot-SE can be found at:
http://www.sophos.com/virusinfo/analyses/w32agobotse.html

W32/Agobot-SE is a network worm with backdoor functionality for the Windows 
platform. 
W32/Agobot-SE connects to an IRC channel and listens for commands from a remote 
attacker. The worm may spread to remote network shares with weak passwords. 
The following patches for the operating system vulnerabilities exploited by 
W32/Agobot-SE can be obtained from the Microsoft website: 
MS04-011
MS04-012
MS03-049
MS02-039 
When first run the worm copies itself to the Windows system folder as 
system.exe. The following registry entries are created to run system.exe on 
startup: 
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Windows
system.exe 
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
Windows
system.exe 
Registry entries are also set as follows: 
HKCU\SOFTWARE\Microsoft\Ole
Windows
system.exe 
HKLM\SOFTWARE\Microsoft\Ole
EnableDCOM
N 
HKLM\SYSTEM\CurrentControlSet\Control\Lsa
restrictanonymous
1 

The W32/Agobot-SE virus identity file (IDE) includes detection for:


W32/Rbot-ABZ
http://www.sophos.com/virusinfo/analyses/w32rbotabz.html
Troj/KillAv-EQ
http://www.sophos.com/virusinfo/analyses/trojkillaveq.html
Troj/Delive-A
http://www.sophos.com/virusinfo/analyses/trojdelivea.html
Troj/Synflood-G
http://www.sophos.com/virusinfo/analyses/trojsynfloodg.html
Troj/Bancban-CM
http://www.sophos.com/virusinfo/analyses/trojbancbancm.html
Troj/Bancban-CL
http://www.sophos.com/virusinfo/analyses/trojbancbancl.html
W32/Agobot-SC
http://www.sophos.com/virusinfo/analyses/w32agobotsc.html
Troj/StartPa-GB
http://www.sophos.com/virusinfo/analyses/trojstartpagb.html

Customers with 3.xx or lower versions of Sophos Anti-Virus, 
who are not running EM Library, can manually download the IDE
for W32/Agobot-SE from:

http://www.sophos.com/downloads/ide/agobo-se.ide

Read about how to use IDE files at
http://www.sophos.com/support/knowledgebase/article/363.html


*********** MIKE"S REPLY SEPARATOR  ***********
Mike ~ It is a good day if I learned something new.
Editor MikesWhatsNews see a sample on my web page
http://www3.telus.net/mikebike
<mikeswhatsnews-request@xxxxxxxxxxxxx?Subject=subscribe>
http://www3.telus.net/mikebike/worm_removal.htm
See my Anti-Virus pages  http://virusinfo.hackfix.org/index
<virusinfo-request@xxxxxxxxxxxxx?Subject=subscribe>
A Technical Support Alliance  and OWTA Charter Member 



Other related posts: