From; Sophos Alert System: Name: W32/Mytob-AJ Type: Win32 worm Date: 3 June 2005 Sophos has issued protection for W32/Mytob-AJ. At the time of writing, Sophos has received no reports from users affected by this worm. However, we have issued this advisory following enquiries to our support department from customers. Customers using EM Library, Enterprise Console, PureMessage or any of our Sophos small business solutions will be automatically protected at their next scheduled update. Note: The IDE issued for W32/Mytob-AJ at 03:34 GMT on 26 April also contained detection for Troj/SDBot-06, W32/Rbot-ABE, W32/Rbot-ABF, Troj/Vixdl-A, Troj/Dumaru-BE and Troj/Dloader-MS. This IDE has now been updated to enhance detection of Troj/Dumaru-BE. Information about W32/Mytob-AJ can be found at: http://www.sophos.com/virusinfo/analyses/w32mytobaj.html W32/Mytob-AJ is a mass-mailing worm and backdoor Trojan that targets users of Internet Relay Chat programs. When first run the worm copies itself to the Windows system folder as taskgmr.exe and creates the following registry entries so as to run itself on user logon: HKLM\Software\Microsoft\Windows\CurrentVersion\Run Windows Task Manager taskgmr.exe HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices Windows Task Manager taskgmr.exe W32/Mytob-AJ is capable of spreading through various operating system vulnerabilities such as LSASS (MS04-011). The worm also appends the following mappings to the HOSTS file to deny access to anti-virus and security-related websites and also adds in a signature line at the end of the file: 127.0.0.1 www.symantec.com 127.0.0.1 securityresponse.symantec.com 127.0.0.1 symantec.com 127.0.0.1 www.sophos.com 127.0.0.1 sophos.com 127.0.0.1 www.mcafee.com 127.0.0.1 mcafee.com 127.0.0.1 liveupdate.symantecliveupdate.com 127.0.0.1 www.viruslist.com 127.0.0.1 viruslist.com 127.0.0.1 viruslist.com 127.0.0.1 f-secure.com 127.0.0.1 www.f-secure.com 127.0.0.1 kaspersky.com 127.0.0.1 kaspersky-labs.com 127.0.0.1 www.avp.com 127.0.0.1 www.kaspersky.com 127.0.0.1 avp.com 127.0.0.1 www.networkassociates.com 127.0.0.1 networkassociates.com 127.0.0.1 www.ca.com 127.0.0.1 ca.com 127.0.0.1 mast.mcafee.com 127.0.0.1 my-etrust.com 127.0.0.1 www.my-etrust.com 127.0.0.1 download.mcafee.com 127.0.0.1 dispatch.mcafee.com 127.0.0.1 secure.nai.com 127.0.0.1 nai.com 127.0.0.1 www.nai.com 127.0.0.1 update.symantec.com 127.0.0.1 updates.symantec.com 127.0.0.1 us.mcafee.com 127.0.0.1 liveupdate.symantec.com 127.0.0.1 customer.symantec.com 127.0.0.1 rads.mcafee.com 127.0.0.1 trendmicro.com 127.0.0.1 www.trendmicro.com 127.0.0.1 www.grisoft.com 127.0.0.1 www.microsoft.com -=Copyright (C) 2005-2006 HellBot3 Team All Rights Reserved.=- W32/Mytob-AJ harvests email addresses from files found on the infected computer and from the Windows address book. Emails sent by W32/Mytob-AJ have the following characteristics: Subject line: chosen from read it immediately Hello Congratulations! Re: Approved document Re: Your document Re: Administration approved Is that your password? It's you!? Bonjour From: chosen from contact@xxxxxxxxxxxxx postmaster@xxxxxxx support@xxxxxxxxx admin@xxxxxxx contact@xxxxxxx contact@xxxxxxx contact@xxxxxxxxxxxx Message text: chosen from I have attached your informations. The original message was included as an attachment. Your document is attached. The message contains Unicode characters and has been sent as a binary attachment. For more details see the attachment. Attached file: chosen from document details data important information your_doc message body Attached file extension: chosen from pif scr exe cmd bat zip The worm can also spread by mailing itself as a file attachment using the filename isyq.scr. For instances where W32/Mytob-AJ sends itself as a zip archives, the worm may optionally create extensions where the first extension is DOC, TXT or HTM and the final extension is PIF, SCR, EXE or ZIP. The worm also may attempt to access or setup listening ports on ports 15 and 256. The following patches for the operating system vulnerabilities exploited by W32/Mytob-AJ can be obtained from the Microsoft website: MS04-011 The W32/Mytob-AJ virus identity file (IDE) includes detection for: Troj/SDBot-06 http://www.sophos.com/virusinfo/analyses/trojsdbot06.html W32/Rbot-ABE http://www.sophos.com/virusinfo/analyses/w32rbotabe.html W32/Rbot-ABF http://www.sophos.com/virusinfo/analyses/w32rbotabf.html Troj/Vixdl-A http://www.sophos.com/virusinfo/analyses/trojvixdla.html Troj/Dumaru-BE http://www.sophos.com/virusinfo/analyses/trojdumarube.html Troj/Dloader-MS http://www.sophos.com/virusinfo/analyses/trojdloaderms.html Customers with 3.xx or lower versions of Sophos Anti-Virus, who are not running EM Library, can manually download the IDE for W32/Mytob-AJ from: http://www.sophos.com/downloads/ide/mytob-aj.ide Read about how to use IDE files at http://www.sophos.com/support/knowledgebase/article/363.html *********** MIKE"S REPLY SEPARATOR *********** Mike ~ It is a good day if I learned something new. Editor MikesWhatsNews see a sample on my web page http://www3.telus.net/mikebike <mikeswhatsnews-request@xxxxxxxxxxxxx?Subject=subscribe> http://www3.telus.net/mikebike/worm_removal.htm See my Anti-Virus pages http://virusinfo.hackfix.org/index <virusinfo-request@xxxxxxxxxxxxx?Subject=subscribe> A Technical Support Alliance and OWTA Charter Member