From; Sophos Alert System: Name: W32/Mytob-BI Aliases: Net-Worm.Win32.Mytob.bi Type: Win32 worm Date: 17 June 2005 Sophos has issued protection for W32/Mytob-BI. At the time of writing, Sophos has received a small number of reports of this worm from the wild. Customers using EM Library, Enterprise Console, PureMessage or any of our Sophos small business solutions will be automatically protected at their next scheduled update. Note: The IDE issued for W32/Mytob-BI at 13 June 2005 10:32:27 (GMT) also contained detection for W32/Mytob-BG, Troj/Zlob-E, Troj/ZlobDrop-D, Troj/BankAsh-H, Troj/KillAv-AK and Troj/Lors-A This IDE has now been updated to enhance detection of W32/Mytob-BI. Information about W32/Mytob-BI can be found at: http://www.sophos.com/virusinfo/analyses/w32mytobbi.html W32/Mytob-BI is a mass-mailing worm and IRC backdoor Trojan for the Windows platform. W32/Mytob-BI runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels. When first run W32/Mytob-BI copies itself to the Windows system folder as winsys33.exe and creates the following registry entries: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices WINDOWS SYSTEM winsys33.exe HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WINDOWS SYSTEM winsys33.exe W32/Mytob-BI also disables the Windows XP firewall by changing the following default registry entry from: HKLM\System\CurrentControlSet\Services\SharedAccess Start 3 to: HKLM\System\CurrentControlSet\Services\SharedAccess Start 4 W32/Mytob-BI also includes functionality to silently download, install and run new software. Registry changes may also be made under the following registry entry: HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3\Current Level W32/Mytob-BI modifies the HOSTS file, changing the URL-to-IP mappings for selected websites, therefore preventing normal access to these sites. The new HOSTS file will typically contain the following: 127.0.0.1 www.symantec.com 127.0.0.1 securityresponse.symantec.com 127.0.0.1 symantec.com 127.0.0.1 www.sophos.com 127.0.0.1 sophos.com 127.0.0.1 www.mcafee.com 127.0.0.1 mcafee.com 127.0.0.1 liveupdate.symantecliveupdate.com 127.0.0.1 www.viruslist.com 127.0.0.1 viruslist.com 127.0.0.1 viruslist.com 127.0.0.1 f-secure.com 127.0.0.1 www.f-secure.com 127.0.0.1 kaspersky.com 127.0.0.1 kaspersky-labs.com 127.0.0.1 www.avp.com 127.0.0.1 www.kaspersky.com 127.0.0.1 avp.com 127.0.0.1 www.networkassociates.com 127.0.0.1 networkassociates.com 127.0.0.1 www.ca.com 127.0.0.1 ca.com 127.0.0.1 mast.mcafee.com 127.0.0.1 my-etrust.com 127.0.0.1 www.my-etrust.com 127.0.0.1 download.mcafee.com 127.0.0.1 dispatch.mcafee.com 127.0.0.1 secure.nai.com 127.0.0.1 nai.com 127.0.0.1 www.nai.com 127.0.0.1 update.symantec.com 127.0.0.1 updates.symantec.com 127.0.0.1 us.mcafee.com 127.0.0.1 liveupdate.symantec.com 127.0.0.1 customer.symantec.com 127.0.0.1 rads.mcafee.com 127.0.0.1 trendmicro.com 127.0.0.1 pandasoftware.com 127.0.0.1 www.pandasoftware.com 127.0.0.1 www.trendmicro.com 127.0.0.1 www.grisoft.com 127.0.0.1 www.microsoft.com 127.0.0.1 microsoft.com 127.0.0.1 www.virustotal.com 127.0.0.1 virustotal.com 127.0.0.1 www.amazon.com 127.0.0.1 www.amazon.co.uk 127.0.0.1 www.amazon.ca 127.0.0.1 www.amazon.fr 127.0.0.1 www.paypal.com 127.0.0.1 paypal.com 127.0.0.1 moneybookers.com 127.0.0.1 www.moneybookers.com 127.0.0.1 www.ebay.com 127.0.0.1 ebay.com W32/Mytob-BI is capable of spreading through email. Email sent by W32/Mytob-BI has the following properties: Subject lines: Your Account is Suspended *DETECTED* Online User Violation Your Account is Suspended For Security Reasons Warning Message: Your services near to be closed. Important Notification Members Support Security measures Email Account Suspension Notice of account limitation Message texts: 'Dear <company name> Member, We have temporarily suspended your email account <Email address>. This might be due to either of the following reasons: 1. A recent change in your personal information (i.e. change of address). 2. Submiting invalid information during the initial sign up process. 3. An innability to accurately verify your selected option of subscription due to an internal error within our processors. See the details to reactivate your <company name> account. Sincerely,The <company name> Support Team +++ Attachment: No Virus (Clean) +++ <company name> Antivirus - <web address>' 'Dear <company name> Member, Your e-mail account was used to send a huge amount of unsolicited spam messages during the recent week. If you could please take 5-10 minutes out of your online experience and confirm the attached document so you will not run into any future problems with the online service. If you choose to ignore our request, you leave us no choice but to cancel your membership. Virtually yours, The <company name> Support Team +++ Attachment: No Virus found +++ <company name> Antivirus - <web address>' 'Dear user <username>, You have successfully updated the password of your <company name> account. If you did not authorize this change or if you need assistance with your account, please contact <company name> customer service at: <Email address> Thank you for using <company name>!The <company name> Support Team +++ Attachment: No Virus (Clean) +++ <company name> Antivirus - <web address>' 'Dear user <username>, It has come to our attention that your <company name> User Profile ( x ) records are out of date. For further details see the attached document. Thank you for using <company name>! The <company name> Support Team +++ Attachment: No Virus (Clean) +++ <company name> Antivirus - <web address>' The attached file consists of any of the following base names followed by the extention ZIP: important-details account-details email-details account-info document readme account-report updated-password email-password new-password password approved-password account-password accepted-password <random characters> The worm may create double extensions where the first extension is DOC, TXT or HTM and the final extension is PIF, SCR, EXE or ZIP. W32/Mytob-BI harvests email addresses from files on the infected computer and from the Windows address book. The W32/Mytob-BI virus identity file (IDE) includes detection for: W32/Mytob-BG http://www.sophos.com/virusinfo/analyses/w32mytobbg.html Troj/Zlob-E http://www.sophos.com/virusinfo/analyses/trojzlobe.html Troj/ZlobDrop-D http://www.sophos.com/virusinfo/analyses/trojzlobdropd.html Troj/BankAsh-H http://www.sophos.com/virusinfo/analyses/trojbankashh.html Troj/KillAv-AK http://www.sophos.com/virusinfo/analyses/trojkillavak.html Troj/Lors-A http://www.sophos.com/virusinfo/analyses/trojlorsa.html Customers with 3.xx or lower versions of Sophos Anti-Virus, who are not running EM Library, can manually download the IDE for W32/Mytob-BI from: http://www.sophos.com/downloads/ide/mytob-bi.ide Read about how to use IDE files at http://www.sophos.com/support/knowledgebase/article/363.html *********** MIKE"S REPLY SEPARATOR *********** Mike ~ It is a good day if I learned something new. Editor MikesWhatsNews see a sample on my web page http://www3.telus.net/mikebike <mikeswhatsnews-request@xxxxxxxxxxxxx?Subject=subscribe> http://www3.telus.net/mikebike/worm_removal.htm See my Anti-Virus pages http://virusinfo.hackfix.org/index <virusinfo-request@xxxxxxxxxxxxx?Subject=subscribe> A Technical Support Alliance and OWTA Charter Member