Subject: RE: RE: New Worm/Virus April 8th

Sounds exactly like a variant of W32/Agobot-EL (now that I know what it is).
They are almost identical.


New Worm/Virus April 8th

Could it be a variant of:



Subject: RE: RE: New Worm/Virus April 8th

Not as far as I know, no av that I tried recognized it. (Sohpos, Kapersky,
NAI, CA, Symantec)

Mailing-List: contact bugtraq-help

I know that it is bad form to reply to your own post, but here it goes

There is an accompanying file called nwiz.exe in the \Winnt folder.

The worm/virus writes the following to an infected machines hosts file


I also noticed that the fully patched and av protected machines that were

infected had lame administrator passwords (and the account "Administrator"

had not been renamed), which is the most likely point of compromise.

All in all not something to worry about unless you dont have MS03-039 or

use 123456 as your admin password

Subject:New Worm/Virus April 8th

Concerning the new worm type infection spreading around today (6:15am EST)

the file is called ndemon.exe (.99k) and it puts itself into c:\winnt and

c:winnt\system32. Registry entries

HKLM\Software|Microsoft|CurrentVersion\Run and

HKLM\Software|Microsoft|CurrentVersion\RunServices (Think it creates that


At first look:

it then tries to propagate itself via MS ports 135, and 139 VIA known

flaws and password guessing. It also listens for other infected machines

on port 1025 and scans for MS IIS boxes on port 80 (to try known exploits

as well)

The infected machines were win2k SP4 (fully Patched) Running Symantec AV

Just a heads up

Sherman Hand
Manager, Internet Policy Enforcement Team
Surveillance Center
Adelphia Communications