The Web    www.100share.com    Google
 
7/19: Rbot-DX Spreads to Remote Shares
 

7/19: Rbot-DX Spreads to Remote Shares
July 19, 2004

W32/Rbot-DX is a worm that attempts to spread to remote network shares. It also contains backdoor Trojan functionality, allowing unauthorized remote access to the infected computer via IRC channels while running in the background as a service process.

W32/Rbot-DX spreads to network shares with weak passwords as a result of the backdoor Trojan element receiving the appropriate command from a remote user.

W32/Rbot-DX copies itself to the Windows system folder as WUAMGRD.EXE and creates entries at the following locations in the registry so as to run itself on system startup, resetting the entries every minute:

HKCU\Software\Microsoft\Windows\CurrentVersion\Run\
Microsoft Updete = wuamgrd.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
Microsoft Updete = wuamgrd.exe
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices\
Microsoft Updete = wuamgrd.exe

W32/Rbot-DX may set the following registry entries: HKLM\SOFTWARE\Microsoft\Ole\EnableDCOM = "N"
HKLM\SYSTEM\CurrentControlSet\Control\Lsa\restrictanonymous = "1"

W32/Rbot-DX attempts to terminate certain processes relating to anti-virus and security programs including REGEDIT.EXE, MSCONFIG.EXE and NETSTAT.EXE.


 
  • 4/6: Randex-DFJ Worm Attacks Passwords
  • 9/16: Evaman-D Worm Kills Active Processes
  • 'Significant' Security Flaws Uncovered in Many Web Applications
  • 6/28: Rbot-CA Allows Remote Access
  • 1/18: Zar Worm Sends Tsunami Email
  • 2/25: Randex-CST Worm Targets Passwords
  • FTC Publishes Web Site on Fraud Cases
  • 4/4: VBS.Kuullio Worm Sends Emails
  • 12/9: Setclo-A Worm Carries Executable
  • Netsky-P a Year Old and Going Strong
  • Spyware Sneaking into the Enterprise
  • Security Camera Product