[virusinfo] W32/Spybot-TA

  • From: "Mike" <mikebike@xxxxxxxxx>
  • To: virusinfo@xxxxxxxxxxxxx
  • Date: Fri, 14 May 2004 06:46:35 -0700


From; Sophos Alert System:

Name: W32/Spybot-TA
Type: Win32 worm
Date: 14 May 2004

A virus identity (IDE) file which provides protection is
available now from the Sophos website, and will be incorporated
into the June 2004 (3.82) release of Sophos Anti-Virus.

Customers using Enterprise Manager, PureMessage and any of the
Sophos small business solutions will be automatically protected
at their next scheduled update.


At the time of writing, Sophos has received just one report of
this worm from the wild.


Information about W32/Spybot-TA can be found at:
http://www.sophos.com/virusinfo/analyses/w32spybotta.html
Description 
W32/Spybot-TA is a peer-to-peer (P2P) worm with backdoor Trojan
functionality. 
W32/Spybot-TA attempts to move itself to AUTOSCRLL.EXE in the Windows System
folder and creates entries in the registry at the following locations to run
itself on system restart: 

HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce\
Auto Scroll Loader = AUTOSCRLL.EXE 

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
Auto Scroll Loader = AUTOSCRLL.EXE 

W32/Spybot-TA copies itself to a folder called KAZAABACKUPFILES in the
Windows System folder with the following filenames: 

AVP_Crack.exe
AquaNox2 Crack.exe
Battlefield1942_bloodpatch.exe
C&C Generals_crack.exe
FIFA2003 crack.exe
NBA2003_crack.exe
Porn.exe
UT2003_bloodpatch.exe
Unreal2_bloodpatch.exe
zoneallarm_pro_crack.exe 

W32/Spybot-TA then sets the following registry entry to enable sharing of
these
files with KaZaA: 

HKCU\Software\Kazaa\LocalContent\
Dir0 = 012345:C:\<Windows System>\kazaabackupfiles\ 

W32/Spybot-TA also attempts to copy itself to the startup folder of attached
network drives and can be used to record the keystrokes on the compromised
machine, effectively acting as a keylogger. This worm can also be used to
initiate SYNFlood attacks. 

W32/Spybot-TA remains resident, running in the background as a service
process and listening for commands from remote users via IRC channels. 

W32/Spybot-TA attempts to terminate various monitoring programs including
the
following: 

'NETSTAT.EXE'
'TASKMGR.EXE'
'MSCONFIG.EXE'
'REGEDIT.EXE'. 
 
 
Recovery 
Please follow the instructions for removing worms 

This IDE file also includes detection for:

Troj/Sepuc-A
http://www.sophos.com/virusinfo/analyses/trojsepuca.html
Troj/Small-IJ
http://www.sophos.com/virusinfo/analyses/trojsmallij.html
Troj/StartPa-BN
http://www.sophos.com/virusinfo/analyses/trojstartpabn.html
Troj/AdClick-F
http://www.sophos.com/virusinfo/analyses/trojadclickf.html
W32/Agobot-QB
http://www.sophos.com/virusinfo/analyses/w32agobotqb.html
W32/Agobot-YX
http://www.sophos.com/virusinfo/analyses/w32agobotyx.html
Troj/Krepper-J
http://www.sophos.com/virusinfo/analyses/trojkrepperj.html
Troj/StartPa-AI
http://www.sophos.com/virusinfo/analyses/trojstartpaai.html
W32/Sdbot-II
http://www.sophos.com/virusinfo/analyses/w32sdbotii.html

Download the IDE file from:
http://www.sophos.com/downloads/ide/spybotta.ide

Download all the IDE files available for the current version of 
Sophos Anti-Virus in a single compressed file. The file is
available in two formats:

Zip file:
http://www.sophos.com/downloads/ide/ides.zip

Self-extracting file:
http://www.sophos.com/downloads/ide/ides.exe

Read about how to use IDE files at
http://www.sophos.com/downloads/ide/using.html


*********** MIKE"S REPLY SEPARATOR  ***********
Mike ~ It is a good day if I learned something new.
Editor MikesWhatsNews see a sample on my web page
http://www3.telus.net/mikebike
<mikeswhatsnews-request@xxxxxxxxxxxxx?Subject=subscribe>
http://www3.telus.net/mikebike/worm_removal.htm
See my Anti-Virus pages  http://virusinfo.hackfix.org/index
<virusinfo-request@xxxxxxxxxxxxx?Subject=subscribe>
A Technical Support Alliance  and OWTA Charter Member 



Other related posts:

  • » [virusinfo] W32/Spybot-TA