The Worm received a High security risk assessment from McAfee when it was initially discovered on the 17 August 2005 due to prevalence. The next day the virus was downgraded to a Medium security risk due a decline in the rapid infections, but still warns that this is a serious threat to unpatched systems.
The W32IRCBot can scan systems looking for any that are unpatched and creates a buffer overflow that allows the attacker to write files to windows using the TFTP (Trivial File Transfer Protocol) using port 8594. The Worm writes a file to the Windows directory (C:\Windows\System32\ on Win XP) with the file name of as WINTBP.EXE along with the registry key …
… that tells the system to launch the Worm on Windows startup. Since this Worm is an IRCBot, once the virus has infected a system it attempts to contact it’s server and wait for further instructions.
* Learn more about web bots here…
A tell tale sign of infection is your system rebooting for no apparent reason and possible system performance degradation. If you do become infected you can remove the virus with the Mcafee Stinger, a downloadable virus removal tool—get it here…
To avoid infection altogether you may want to make sure that your Windows exploit (MS05-039) is patched by performing a Windows update. Along with this, of course, you should confirm that you have the latest Dat files or updates from your anti-virus vendor, which will help the application spot and hopefully remove the virus from your system. One more line of defense if you run a firewall is to shut down the port the virus attempts to enter from, Port 8594—this should essentially “lock the door” to any attempts to infect your system.
Stay safe out there,
~ Chad Stelnicki