[virusinfo] W32/Rbot-AAJ

  • From: "Mike" <mikebike@xxxxxxxxx>
  • To: virusinfo@xxxxxxxxxxxxx
  • Date: Tue, 12 Apr 2005 08:40:34 -0700

From; Sophos Alert System:

Name: W32/Rbot-AAJ
Aliases: Backdoor.Win32.Rbot.gen
Type: Win32 worm
Date: 12 April 2005

A virus identity (IDE) file which provides protection is
available now from the Sophos website, and will be incorporated
into the June 2005 (3.94) release of Sophos Anti-Virus.

Customers using EM Library, PureMessage or any of our Sophos
small business solutions will be automatically protected at
their next scheduled update.

At the time of writing, Sophos has received a small number of
reports of this worm from the wild.


Information about W32/Rbot-AAJ can be found at:
http://www.sophos.com/virusinfo/analyses/w32rbotaaj.html

W32/Rbot-AAJ is a worm with backdoor Trojan functionality. 
W32/Rbot-AAJ is capable of spreading to computers on the local network 
protected by weak passwords after receiving the appropriate backdoor command. 
W32/Rbot-AAJ will attempt to spread by exploiting the following 
vulnerabilities: 
DCOM (MS04-012)
LSASS (MS04-011)
Microsoft SQL servers with weak passwords 
When first run, W32/Rbot-AAJ moves itself to the Windows system folder as 
WINTSK32DLL.EXE. In order to run automatically each time a user logs in, 
W32/Rbot-AAJ will set the following registry entries: 
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
wintsk32dll
wintsk32dll.exe 
HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices
wintsk32dll
wintsk32dll.exe 
W32/Rbot-AAJ will also set the following registry entry: 
HKCU\Software\Microsoft\OLE
wintsk32dll
wintsk32dll.exe 
The worm runs continuously in the background, providing backdoor access to the 
infected computer over IRC channels. 
W32/Rbot-AAJ may modify the following registry entries in order to 
enable/disable DCOM and open/close restrictions on IPC$ shares: 
HKLM\SOFTWARE\Microsoft\Ole\EnableDCOM 
HKLM\SYSTEM\CurrentControlSet\Control\Lsa\restrictanonymous 

This IDE file also includes detection for:

Troj/Dropper-AT
http://www.sophos.com/virusinfo/analyses/trojdropperat.html
Troj/SCKeyLog-C
http://www.sophos.com/virusinfo/analyses/trojsckeylogc.html
Troj/Small-EF
http://www.sophos.com/virusinfo/analyses/trojsmallef.html
Troj/Dloader-LI
http://www.sophos.com/virusinfo/analyses/trojdloaderli.html
Troj/Bancos-CC
http://www.sophos.com/virusinfo/analyses/trojbancoscc.html
Troj/Psyme-BQ
http://www.sophos.com/virusinfo/analyses/trojpsymebq.html
Troj/Dloader-LH
http://www.sophos.com/virusinfo/analyses/trojdloaderlh.html
Troj/Ablank-R
http://www.sophos.com/virusinfo/analyses/trojablankr.html
Troj/LegMir-AC
http://www.sophos.com/virusinfo/analyses/trojlegmirac.html
Troj/Multidr-DF
http://www.sophos.com/virusinfo/analyses/trojmultidrdf.html
Troj/Multidr-DG
http://www.sophos.com/virusinfo/analyses/trojmultidrdg.html
W32/Rbot-AAH
http://www.sophos.com/virusinfo/analyses/w32rbotaah.html
W32/Rbot-AAI
http://www.sophos.com/virusinfo/analyses/w32rbotaai.html

Download the IDE file from:
http://www.sophos.com/downloads/ide/rbot-aaj.ide

Download all the IDE files available for the current version of 
Sophos Anti-Virus in a single compressed file. The file is
available in two formats:

Zip file:
http://www.sophos.com/downloads/ide/ides.zip

Self-extracting file:
http://www.sophos.com/downloads/ide/ides.exe

Read about how to use IDE files at
http://www.sophos.com/downloads/ide/using.html


*********** MIKE"S REPLY SEPARATOR  ***********
Mike ~ It is a good day if I learned something new.
Editor MikesWhatsNews see a sample on my web page
http://www3.telus.net/mikebike
<mikeswhatsnews-request@xxxxxxxxxxxxx?Subject=subscribe>
http://www3.telus.net/mikebike/worm_removal.htm
See my Anti-Virus pages  http://virusinfo.hackfix.org/index
<virusinfo-request@xxxxxxxxxxxxx?Subject=subscribe>
A Technical Support Alliance  and OWTA Charter Member 





Other related posts:

  • » [virusinfo] W32/Rbot-AAJ