Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:Worm/Rbot.109.568
Date discovered:13/12/2012
Type:Worm
In the wild:No
Reported Infections:Low
Distribution Potential:Medium
Damage Potential:Medium
Static file:Yes
File size:109.568 Bytes
MD5 checksum:80487bab38bcd08c3762764ce19d4d54
VDF version:7.11.53.216

 General Method of propagation:
   • Local network


Aliases:
   •  Kaspersky: Backdoor.Win32.Rbot.abe
   •  VirusBuster: Worm.RBot.CJC
   •  Bitdefender: Backdoor.Rbot.ABE


Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Drops a malicious file
   • Registry modification
   • Makes use of software vulnerability
   • Third party control

 Files It copies itself to the following location:
   • %SYSDIR%\%executed file%.pif

 Registry The following registry keys are added in order to run the processes after reboot:

– HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "MS-DOS Security Service"="ms-dos.pif"

– [HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
   • "MS-DOS Security Service"="ms-dos.pif"

– [HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices]
   • "MS-DOS Security Service"="ms-dos.pif"

– [HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices]
   • "MS-DOS Security Service"="ms-dos.pif"



The following registry keys are added:

– [HKLM\SYSTEM\CurrentControlSet\Control\Lsa]
   • "MS-DOS Security Service"="ms-dos.pif"

– [HKLM\SOFTWARE\Microsoft\Ole]
   • "MS-DOS Security Service"="ms-dos.pif"

– [HKCU\SYSTEM\CurrentControlSet\Control\Lsa]
   • "MS-DOS Security Service"="ms-dos.pif"
   •

– [HKCU\Software\Microsoft\OLE]
   • "MS-DOS Security Service"="ms-dos.pif"

 Network Infection In order to ensure its propagation the malware attemps to connect to other machines as described below.

It drops copies of itself to the following network shares:
   • admin$
   • admin$\system32
   • ipc$


Exploit:
It makes use of the following Exploits:
– MS03-026 (Buffer Overrun in RPC Interface)
– MS04-007 (ASN.1 Vulnerability)
– MS05-039 (Vulnerability in Plug and Play)


Infection process:
Creates an FTP script on the compromised machine in order to download the malware to the remote location.

 IRC To deliver system information and to provide remote control it connects to the following IRC Server:

Server: **********.security.system32.biz
Port: 4654, 4564, 65529, 65528
Server password: gringle
Channel: #dzz#
Nickname: %eight-digit random character string%
Password: shabby123



– This malware has the ability to collect and send information such as:
    • CPU speed
    • Current user
    • Free disk space
    • Free memory
    • Information about the network
    • Platform ID
    • Size of memory
    • Username


– Furthermore it has the ability to perform actions such as:
    • Disable DCOM
    • Disable network shares
    • disconnect from IRC server
    • Download file
    • Edit registry
    • Enable DCOM
    • Enable network shares
    • Execute file
    • Join IRC channel
    • Kill process
    • Leave IRC channel
    • Open remote shell
    • Perform network scan
    • Restart system
    • Shut down system
    • Start spreading routine
    • Upload file

 File details Programming language:
The malware program was written in MS Visual C++.

Description inserted by Catalin Jora on Tuesday, September 6, 2005
Description updated by Catalin Jora on Wednesday, September 7, 2005

Back . . . .