Hello All,
I'm having a devil of a time with what appears to be a Trojan or worm running rampant on our network. The particulars are as follow:
1. An executable entitled "TASKMNGR.EXE" resides in the System32 directory.
2. An entry for RunDll32 is placed in " HKEY_LOCAL_MACHINE\SOFTWARE\Microso
ft\Windows\CurrentVersion\Run" which
points to the aforementioned executable.
3. The executable itself seems to be a bastardized copy of the mIRC client version 5.7.
4. Each time an infected machine boots, this executable spawns a command process which runs secedit.exe and apparently grants itself administrative rights on the local computer. It does, however, produce a telltale sign by placing a very small mIRC icon in the upper right of the screen for a few seconds.
5. It would appear to have the ability to copy itself to any attached network drives.
One of the infected machines on our network began transferring large amounts of data to an unknown location at approximately 2:30am local time. It held a steady transfer rate of 1.3mb/sec for almost 7 hours before I was able to trace the source. I have searched SARC, several newsgroups and numerous web resources for any information on this application to no avail. I suspect that it arrived through one of many chat clients (AIM, ICQ, Yahoo!, MSM, etc.) that I have repeated told users to not install. Does anyone have any information on this?
Thanks to all who respond,
the whytless physh
I'm having a devil of a time with what appears to be a Trojan or worm running rampant on our network. The particulars are as follow:
1. An executable entitled "TASKMNGR.EXE" resides in the System32 directory.
2. An entry for RunDll32 is placed in " HKEY_LOCAL_MACHINE\SOFTWARE\Microso
ft\Windows\CurrentVersion\Run" which
points to the aforementioned executable.
3. The executable itself seems to be a bastardized copy of the mIRC client version 5.7.
4. Each time an infected machine boots, this executable spawns a command process which runs secedit.exe and apparently grants itself administrative rights on the local computer. It does, however, produce a telltale sign by placing a very small mIRC icon in the upper right of the screen for a few seconds.
5. It would appear to have the ability to copy itself to any attached network drives.
One of the infected machines on our network began transferring large amounts of data to an unknown location at approximately 2:30am local time. It held a steady transfer rate of 1.3mb/sec for almost 7 hours before I was able to trace the source. I have searched SARC, several newsgroups and numerous web resources for any information on this application to no avail. I suspect that it arrived through one of many chat clients (AIM, ICQ, Yahoo!, MSM, etc.) that I have repeated told users to not install. Does anyone have any information on this?
Thanks to all who respond,
the whytless physh