[virusinfo] W32/Sdbot-YW

  • From: "Mike" <mikebike@xxxxxxxxx>
  • To: virusinfo@xxxxxxxxxxxxx
  • Date: Sat, 18 Jun 2005 14:12:07 -0700

From; Sophos Alert System:

Name: W32/Sdbot-YW
Aliases: W32.Randex, Backdoor.Win32.SdBot.bh, W32/Sdbot.worm.gen.j,
BKDR_NICSHIZ.A
Type: Win32 worm
Date: 18 June 2005

Sophos has issued protection for W32/Sdbot-YW.

At the time of writing, Sophos has received a small number of
reports of this worm from the wild.

Customers using EM Library, Enterprise Console, PureMessage or
any of our Sophos small business solutions will be automatically
protected at their next scheduled update.


Note: The IDE issued for W32/Sdbot-YW at 20:59 (GMT) on
31 May 2005 also contained detection for W32/Kelvir-AB,
W32/Rbot-ADV, Troj/Clecker-A, Troj/Agent-DS, 
Troj/Duller-B, Troj/Dloader-OB, W32/Agobot-SU,
W32/Oscabot-I and Troj/Agent-DT.

This IDE has now been updated to enhance detection
of W32/Sdbot-YW.

Information about W32/Sdbot-YW can be found at:
http://www.sophos.com/virusinfo/analyses/w32sdbotyw.html

W32/Sdbot-YW is a worm and IRC backdoor Trojan for the Windows platform. 
W32/Sdbot-YW allows unauthorized remote access to the infected computer via the 
IRC network. The worm joins a preconfigured IRC channel and waits for 
instructions from a remote intruder. The worm can be instructed to download 
updates and run arbitrary files, participate in DDoS attacks and spread to 
remote network shares. 
When first run the worm copies itself to <SYSTEM>\hmusvc32.exe or 
<SYSTEM>\hmvsvc32.exe. 
The following registry entries are created to run W32/Sdbot-YW on startup: 
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
HMV PowerSource
<worm filename> 
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HMV PowerSource
<worm filename> 
where <worm filename> is either hmusvc32.exe or hmvsvc32.exe 

The W32/Sdbot-YW virus identity file (IDE) includes detection for:


W32/Kelvir-AB
http://www.sophos.com/virusinfo/analyses/w32kelvirab.html
W32/Rbot-ADV
http://www.sophos.com/virusinfo/analyses/w32rbotadv.html
Troj/Clecker-A
http://www.sophos.com/virusinfo/analyses/trojcleckera.html
Troj/Agent-DS
http://www.sophos.com/virusinfo/analyses/trojagentds.html
Troj/Duller-B
http://www.sophos.com/virusinfo/analyses/trojdullerb.html
Troj/Dloader-OB
http://www.sophos.com/virusinfo/analyses/trojdloaderob.html
W32/Agobot-SU
http://www.sophos.com/virusinfo/analyses/w32agobotsu.html
W32/Oscabot-I
http://www.sophos.com/virusinfo/analyses/w32oscaboti.html
Troj/Agent-DT
http://www.sophos.com/virusinfo/analyses/trojagentdt.html

Customers with 3.xx or lower versions of Sophos Anti-Virus, 
who are not running EM Library, can manually download the IDE
for W32/Sdbot-YW from:

http://www.sophos.com/downloads/ide/sdbot-yw.ide

Read about how to use IDE files at
http://www.sophos.com/support/knowledgebase/article/363.html

*********** MIKE"S REPLY SEPARATOR  ***********
Mike ~ It is a good day if I learned something new.
Editor MikesWhatsNews see a sample on my web page
http://www3.telus.net/mikebike
<mikeswhatsnews-request@xxxxxxxxxxxxx?Subject=subscribe>
http://www3.telus.net/mikebike/worm_removal.htm
See my Anti-Virus pages  http://virusinfo.hackfix.org/index
<virusinfo-request@xxxxxxxxxxxxx?Subject=subscribe>
A Technical Support Alliance  and OWTA Charter Member 



Other related posts: