Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:Worm/IrcBot.mob
Date discovered:15/06/2010
Type:Worm
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low
Damage Potential:Medium
Static file:Yes
File size:106.497 Bytes
MD5 checksum:2f62dbeb5c53122d70f144f66b0d129e
IVDF version:7.10.08.89 - Tuesday, June 15, 2010

 General Aliases:
   •  Sophos: Mal/VBInject-D
   •  Bitdefender: Trojan.Generic.4023153
   •  Panda: W32/P2PWorm.MI


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Third party control
   • Drops malicious files
   • Registry modification

 Files It copies itself to the following location:
   • %TEMPDIR%\Winlogen.exe



The following file is created:

%TEMPDIR%\google_cache11113.tmp



It tries to executes the following files:

– Filename:
   • "%TEMPDIR%\Winlogen.exe"


– Filename:
   • %TEMPDIR%\Winlogen.exe

 Registry The following registry keys are added in order to run the processes after reboot:

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "Windows Firewall"="%TEMPDIR%\Winlogen.exe"

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "Windows Firewall"="%TEMPDIR%\Winlogen.exe"

 IRC To deliver system information and to provide remote control it connects to the following IRC Servers:

Server: swv2.bot**********.info
Port: 3211
Channel: #sWv2#
Nickname: {NEW}[USA][XP-SP3]%number%

Server: swv2.psy**********.cz
Port: 3211
Channel: #sWv2#
Nickname: {NEW}[USA][XP-SP3]%number%

 File details Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Petre Galan on Wednesday, August 25, 2010
Description updated by Petre Galan on Wednesday, August 25, 2010

Back . . . .