This is what came up when I goggled the PCK/NSPack packer shown in the Antivir hit:
3 - Mytob.PJ. It installs BOT and it controls the PC via IRC
_____________________________________________________________
http://www.vsantivirus.com/mytob-pj.htm
Name: Mytob.PJ Names NOD32: Win32/Mytob.PJ
Type: Worm of Internet Alias: Mytob.PJ,
Backdoor.Win32.PcClient.GV, Email Worm.Mydoom.22, I-Worm/Mytob.AHE,
Net-Worm.Win32.Mytob.bi, Trojan-Downloader.Win32.Agent.mg,
W32/MyTob.DJ!net, W32/Mytob.gen, W32/Mytob.gen@MM, W32/Mytob-DJ,
Win32.Worm.Mytob.X.Gen, Win32/Mytob.PJ, Worm.Mytob.bi, Worm/Mytob.ND
Date: 20/feb/06 Platform: Windows So large 32-bit:
34.676 bytes (NSPACK) Worm that propagates massively by
electronic mail. It uses the functionalities of a troyano of
type BOT to control the PC infected via IRC. A BOT is a program
robot that acts as a user and is prepared to respond or to act
automatically executing certain commandos. Also it modifies
file HOSTS to avoid that the user can accede to certain pages and
sites of certain updates of antivirus, and is able to finalize certain
tasks related to several applications of security. When it is
executed, it creates the following file in the folder of the system:
c:\windows\system32\winsvc32.exe NOTE:
"c:\windows\system32" can vary according to the installed
operating system (with that name by defect in Windows XP and Windows
Server 2003, like "c:\winnt\system32" in Windows NT and 2000 and
"c:\windows\system" in Windows 9x and ME). The worm modifies
the following branches of the registry to ensure its automatic
completion in each new resumption the infected equipment:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WINDOWS
SYSTEM = c:\windows\system32\winsvc32.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices WINDOWS
SYSTEM = c:\windows\system32\winsvc32.exe Modifica the values of the
following entrance in the registry, to change the configuration of the
zone of security of Internet:
HKEY_CURRENT_USER\Software\Microsoft
\Windows\CurrentVersion\InternetSettings\Zones\3 In Windows XP with
SP2, also modifies the following entrance to lower the level of
security in the infected equipment (political of the fire-resistant
ones): HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess
Start = "4" the worm propagates by electronic mail being sent like
associate to all the found directions of email in different archives
from the infected machine. For it, it obtains electronic
directions of the notebook of Windows and all the archives of the
following folders: C:\WINDOWS\Temporary Internet You case out \
C:\Documents and Settings\[usuario ] \Configuración local\Archivos
temporary of Internet \ c:\windows\system32 \ Also looks for
directions in archives with the following extensions, all the local
units of the C to and inclusively: adb asp cgi dbx htm html jsp
php sht tbb txt wab xml the worm avoids to be sent to those directions
whose name contains some of the following chains: -. _ -._!@
edu gov mil abuses accoun acketst admin anyone arin. avp Berkeley
borlan bsd bugs certific contact example feste Fido foo. fsf. gnu
gold-certs google gov. help hotmail IANA ibm.com icrosof icrosoft IETF
info inpris isc.o isi.e kernel linux listserv math mit.e mozilla msn.
mydomai nobody nodomai noone not nothing ntivi page bulging PGP
postmaster privacy sendmail rating RFC-ED ripe. root ruslis samples
secur service site soft somebody someone sopho Spam spm submit support
syma tanford.e the.bat UNIX Usenet utgers.ed to webmaster www you your
the worm uses its own motor smtp to send the messages