[virusinfo] W32/Agobot-JA

  • From: "Mike" <mikebike@xxxxxxxxx>
  • To: virusinfo@xxxxxxxxxxxxx
  • Date: Mon, 24 May 2004 12:01:01 -0700


From; Sophos Alert System:

Name: W32/Agobot-JA
Aliases: Backdoor.Agobot.mw, W32/Gaobot.worm.gen.e, Win32/Agobot.3.T,
W32.HLLW.Gaobot.gen, WORM_AGOBOT.MW
Type: Win32 worm
Date: 24 May 2004

A virus identity (IDE) file which provides protection is
available now from the Sophos website, and will be incorporated
into the July 2004 (3.83) release of Sophos Anti-Virus.

Customers using Enterprise Manager, PureMessage and any of the
Sophos small business solutions will be automatically protected
at their next scheduled update.


At the time of writing, Sophos has received just one report of
this worm from the wild.


Information about W32/Agobot-JA can be found at:
http://www.sophos.com/virusinfo/analyses/w32agobotja.html
Description 
W32/Agobot-JA is a backdoor Trojan and worm which spreads to computers
protected by weak passwords and to computers infected with variants of
W32/MyDoom. 
When first run, W32/Agobot-JA moves itself to the Windows system folder as
lmss.exe and creates the following registry entries to run itself on
startup: 

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Login
= lmss.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\Windows Login
= lmss.exe 

W32/Agobot-JA also sets itself up as a windows service, with the service
name "Windows Login". 

The Trojan hides all files whose filenames begin with "sound". 

Each time the Trojan is run it attempts to connect to a remote IRC server
and join a specific channel. 

The Trojan then runs continuously in the background, allowing a remote
intruder to access and control the computer via IRC channels. 

The Trojan attempts to terminate and disable various anti-virus and
security- related programs and modifies the HOSTS file, mapping selected
anti-virus websites to the loopback address 127.0.0.1 in an attempt to
prevent access to these sites. The HOSTS file is located at
%WINDOWS%\System32\Drivers\etc\HOSTS. 
 
 
Recovery 
Please follow the instructions for removing worms 

This IDE file also includes detection for:

W32/Rbot-Q
http://www.sophos.com/virusinfo/analyses/w32rbotq.html
W32/Rbot-R
http://www.sophos.com/virusinfo/analyses/w32rbotr.html
W32/Spybot-H
http://www.sophos.com/virusinfo/analyses/w32spyboth.html
W32/Spybot-BW
http://www.sophos.com/virusinfo/analyses/w32spybotbw.html
W32/Agobot-IZ
http://www.sophos.com/virusinfo/analyses/w32agobotiz.html
W32/Sdbot-MD
http://www.sophos.com/virusinfo/analyses/w32sdbotmd.html
Troj/StartPa-HD
http://www.sophos.com/virusinfo/analyses/trojstartpahd.html
W32/Sdbot-Br
http://www.sophos.com/virusinfo/analyses/w32sdbotbr.html

Download the IDE file from:
http://www.sophos.com/downloads/ide/agobotja.ide

Download all the IDE files available for the current version of 
Sophos Anti-Virus in a single compressed file. The file is
available in two formats:

Zip file:
http://www.sophos.com/downloads/ide/ides.zip

Self-extracting file:
http://www.sophos.com/downloads/ide/ides.exe

Read about how to use IDE files at
http://www.sophos.com/downloads/ide/using.html

*********** MIKE"S REPLY SEPARATOR  ***********
Mike ~ It is a good day if I learned something new.
Editor MikesWhatsNews see a sample on my web page
http://www3.telus.net/mikebike
<mikeswhatsnews-request@xxxxxxxxxxxxx?Subject=subscribe>
http://www3.telus.net/mikebike/worm_removal.htm
See my Anti-Virus pages  http://virusinfo.hackfix.org/index
<virusinfo-request@xxxxxxxxxxxxx?Subject=subscribe>
A Technical Support Alliance  and OWTA Charter Member 



Other related posts:

  • » [virusinfo] W32/Agobot-JA