Aliases: W32.Adult, W32.Check.Worm, check trojan, Generic VB.c (McAfee), Win32.HLLW.Tzet (Doctor Web), Troj/Flood-DP (Sophos), Backdoor:Win32/mIRC-based (RAV), WORM_TZET.A (Trend Micro), Worm/Tzet (H+BEDV), Worm/Randon (Grisoft), Backdoor.Tzet.A (SOFTWIN), Worm.Tzet.A (ClamAV), W32/Tzet.A.worm (Panda), IRC/Cloner.AR (Eset)
Variants: N/A

Classification: Malware
Category: Computer Worm

Status: active
Spreading: Low
Geographical info:  Low
Removal: Easy
Platform: W32
Discovered: 28 Mar 2001
Damage:  Low

Characteristics: W32.Check.Mirc is collectively known as a worm written in Visual Basic. This worm is considered as a malicious parasite, a backdoor worm, which usually uses mIRC as its podium for connecting with the anonymous hacker.

More details about W32.Check.Mirc

This worm can easily infect a system because it usually uses mIRC as its podium for connecting with the anonymous hacker. mIRC is a chat program used by many; however, it is also a platform for this virus to penetrate a system. It allegedly hacks various classified messages and their passwords. This virus has three properties. One is that it sends out logs by FTP or email. It also logs keystrokes and this automatically connects itself to the Internet. The worm constantly searches for the mirc chat program. When unable to find in its default installation path, the worm automatically transforms the Autoexec.bat file. This file is from the boot sector of Windows. When it is removed and the computer is restarted, the Windows file Kernel32.dll is deleted. It is only able to do damage if the Operating System is Windows 95/98/Me, and it is installed in the default location. Other windows platform like Windows XP and or Vista are not susceptible to this virus.

This worm also masks itself as an Adult Checker. This means it poses to filter and/or safeguard from porn and or adult sites. However, when the adultcheck window is closed, the worm creates random numbe. These numbers find out if one of the several payloads will be triggered. A payload is a computer program delivered by the part of a data stream representing the user information and user overhead. It is not damaging to the system, and can do things such as swapping the mouse buttons or disabling the keyboard. These processes and autos stay resident in background.