Nope. It is incorrectly identified as sdbot.o. It has none of the hooks.
Here is the full story on it:
No it is not old. Also, I didn't mention that it has jumped from machine to
machine on my clients LAN. I have them pulled off the corporate WAN for the
moment.
I was setting up a workstation for a client (Win 2k SP4). I had already
installed all the security patches including the MS Sasser fix. My client
then opened up a file of her network drive and it said it was infected with
the old sdbot.gen.O virus. (McAfee Corporate) It then kept saying that
C:/Winnt/system32/SMSC.EXE was infected with the sdbot. I then tried
running stinger, NAV, etc and it didn't recognize the file as a virus. I
managed to delete the file in safe mode and since it was an old virus, I
didn't worry about it too much. However, I did notice it didn't have any of
the hooks for sdbot.
I then got a call from my client about 2 hours later that their workstation
was unusable and extremely slow on the network. I gave him the reboot and
let me know later spiel. However, I had a bad guy instinct that something
bad was happening. I drove back my client site and checked his machine and
sure enough it had the SMSC.EXE virus. The program had disabled McAfee and
wouldn't even allow you run the registry editor. It would start and then
immediately close and this was with an admin account.
I looked up and found a lot of similar worms but none matched. I finally
uploaded the file to the free checker on Kerbersky website. It identified
it as the backdoor.forbot.gen which there is ZERO information for. The date
was listed as being 6-24-04 and the number of instances was 91,000.
I used Kerbersky in safe mode to remove the virus and reboot. The SMSC.EXE
was gone from the active processes but when I checked the registry, it had
reinstalled all the hooks I had removed. I removed them manually and
rebooted. The machine in question appeared to be ok.
I do not know if I removed the virus or fixed the symptoms.