Charlie,
I did have SSH remote access enabled so I could manage the server from out of the office, but I checked the logs and there was no SSH access on the compromised account before, during or after the FTP issue. I have since turned that off

When I was digging through the zip files of what was there, one of the hacking programs contained a text database of thousands of username/password combinations. These would likely be used by the script to try and hack into other systems. It would be useful to analyze that list and be sure to not use any combinations found on there.
The FTP logs show they came in at 8:40am, 8:42am and then again at 9:02am. The files were deposited during the second login, so I suspect they were trying things out to make sure they could get back in later. My main concern is that there were no "failed" attempts to log in - they got it right the first time which leads me to believe they knew in advance that the UN/PW would work. They must have fished it out earlier, though when I went through the old logs looking for hits from that IP, there weren't any. I could see, however, other IPs logging in with that username throughout June, mostly from Japan. I suspect it is one of these Japanese IPs that actually cracked the account and then distributed the information to others through an IRC network or otherwise. It seems also that there were no other files deposited there at any other time in the last 6 weeks.
I traced the IP of the offender to an ISP in Stockdale, California. I called their toll-free abuse hotline and spent 1/2hr on the phone with their tech support guys informing them of what occurred. I explained that I wasn't complaining about the fact that they got in - since this is my fault, really - only about the nature of the files they left behind. I told them that if I was savvy enough to trace things back to them, other users would be too and others may not have been so forgiving of it, especially if these tools had been used to hack computers or send spam. (BTW, the spam that the script was built to generate was designed specifically to fool users into downloading some sort of virus infected executable file from a site in Romania under the guise of receiving an online postcard from a family member!)
I realize that this could have been a lot worse, and that horrible feeling in the pit of my stomach will hopefully translate into good things - being more conscious of vulnerabilities and perhaps, through this posting, making others more aware.
It does raise a good issue though - relative rookies or non-expert sys admins like myself are more easily caught off guard like this. How can we, as a community, work together in sharing knowledge from those who have the experience and expertise to prevent this sort of thing? This forum is obviously a great step forward (within reason.)
Thanks,