From; Sophos Alert System: Name: W32/Agobot-XX Type: Win32 worm Date: 28 May 2004 A virus identity (IDE) file which provides protection is available now from the Sophos website, and will be incorporated into the July 2004 (3.83) release of Sophos Anti-Virus. Customers using Enterprise Manager, PureMessage and any of the Sophos small business solutions will be automatically protected at their next scheduled update. At the time of writing, Sophos has received just one report of this worm from the wild. Information about W32/Agobot-XX can be found at: http://www.sophos.com/virusinfo/analyses/w32agobotxx.html Description W32/Agobot-XX is capable of spreading to computers on the local network protected by weak passwords. When first run W32/Agobot-XX copies itself to the Windows system folder as dmrss.exe and creates the following registry entries to run itself on startup: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run DSService = dmrss.exe HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices DSService = dmrss.exe Each time W32/Agobot-XX is run it attempts to connect to a remote IRC server and join a specific channel. W32/Agobot-XX then runs continuously in the background, allowing a remote intruder to access and control the computer via IRC channels. W32/Agobot-XX attempts to terminate and disable various anti-virus and security-related programs. This worm will search for shared folders on the internet with weak passwords and copy itself into them. A text file named HOSTS may also be dropped into C:\<Windows System32>\drivers\etc which may contain a list of anti-virus and other security-related websites each bound to the IP loopback address of 127.0.0.1 which would effectively prevent access to these sites. For example: 127.0.0.1 www.symantec.com 127.0.0.1 securityresponse.symantec.com 127.0.0.1 symantec.com 127.0.0.1 www.sophos.com 127.0.0.1 sophos.com 127.0.0.1 www.mcafee.com 127.0.0.1 mcafee.com 127.0.0.1 liveupdate.symantecliveupdate.com 127.0.0.1 www.viruslist.com 127.0.0.1 viruslist.com 127.0.0.1 viruslist.com 127.0.0.1 f-secure.com 127.0.0.1 www.f-secure.com 127.0.0.1 kaspersky.com 127.0.0.1 www.avp.com 127.0.0.1 www.kaspersky.com 127.0.0.1 avp.com 127.0.0.1 www.networkassociates.com 127.0.0.1 networkassociates.com 127.0.0.1 www.ca.com 127.0.0.1 ca.com 127.0.0.1 mast.mcafee.com 127.0.0.1 my-etrust.com 127.0.0.1 www.my-etrust.com 127.0.0.1 download.mcafee.com 127.0.0.1 dispatch.mcafee.com 127.0.0.1 secure.nai.com 127.0.0.1 nai.com 127.0.0.1 www.nai.com 127.0.0.1 update.symantec.com 127.0.0.1 updates.symantec.com 127.0.0.1 us.mcafee.com 127.0.0.1 liveupdate.symantec.com 127.0.0.1 customer.symantec.com 127.0.0.1 rads.mcafee.com 127.0.0.1 trendmicro.com 127.0.0.1 www.trendmicro.com Recovery Please follow the instructions for removing worms This IDE file also includes detection for: Troj/Startpa-BD http://www.sophos.com/virusinfo/analyses/trojstartpabd.html W32/SdBot-IT http://www.sophos.com/virusinfo/analyses/w32sdbotit.html Dial/Scom-B http://www.sophos.com/virusinfo/analyses/dialscomb.html Dial/WMX-A http://www.sophos.com/virusinfo/analyses/dialwmxa.html JS/Relink-A http://www.sophos.com/virusinfo/analyses/jsrelinka.html Troj/Psyme-W http://www.sophos.com/virusinfo/analyses/trojpsymew.html Troj/Dloader-S http://www.sophos.com/virusinfo/analyses/trojdloaders.html Download the IDE file from: http://www.sophos.com/downloads/ide/agobotxx.ide Download all the IDE files available for the current version of Sophos Anti-Virus in a single compressed file. The file is available in two formats: Zip file: http://www.sophos.com/downloads/ide/ides.zip Self-extracting file: http://www.sophos.com/downloads/ide/ides.exe Read about how to use IDE files at http://www.sophos.com/downloads/ide/using.html *********** MIKE"S REPLY SEPARATOR *********** Mike ~ It is a good day if I learned something new. Editor MikesWhatsNews see a sample on my web page http://www3.telus.net/mikebike <mikeswhatsnews-request@xxxxxxxxxxxxx?Subject=subscribe> http://www3.telus.net/mikebike/worm_removal.htm See my Anti-Virus pages http://virusinfo.hackfix.org/index <virusinfo-request@xxxxxxxxxxxxx?Subject=subscribe> A Technical Support Alliance and OWTA Charter Member