Home / malwarePDF  

Worm:Win32/Vobfus.MD


First posted on 29 November 2012.
Source: Microsoft

Aliases :

Worm:Win32/Vobfus.MD is also known as Worm/Win32.VBNA (AhnLab), WORM_VOBFUS.SMIS (Trend Micro).

Explanation :



Worm:Win32/Vobfus.MD is a worm that spreads via removable drives and downloads additional malware from a remote server. It is a member of the Win32/Vobfus family.

We have observed Worm:Win32/Vobfus.MD attempting to download variants of TrojanDownloader:Win32/Beebone (a trojan that downloads other malware, including variants of the Win32/Acbot family of trojans that spread through social media websites).



Installation

When run, Worm:Win32/Vobfus.MD drops a copy of itself as an executable file (EXE) in the %USERPROFILE% folder using a random file name, for example "zuaixap.exe" or "nuaeku.exe".

Note: %USERPROFILE% refers to a variable location that is determined by the malware by querying the operating system. The default location for the User Profile folder for Windows 2000, XP, and 2003 is "C:\Documents and Settings\<user>" or "C:\Users\<user>". For Windows Vista, 7, and 8, the default location is "C:\Users\<user name>".

Worm:Win32/Vobfus.MD modifies the following registry entry to ensure that its copy runs at each Windows start:

In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "<malware file name>"
With data: "%USERPROFILE%\<malware file name> /<random parameter>"

For example:

In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "peuolig"
With data: "C:\Users\<user name>\peuolig.exe /n"

Spreads via...

Network and removable drives

Worm:Win32/Vobfus.MD copies itself to the root folder of all available network and removable drives with the file name "rcx<random>.tmp", for example "rcx11.tmp".

It then renames this file to any of the following:

  • passwords.exe
  • porn.exe
  • secret.exe
  • sexy.exe
  • subst.exe


It also places an autorun.inf file in the root directory of the targeted drive. Such autorun.inf files contain instructions for the operating system so that when the removable drive is accessed, the malware may be launched automatically.

This is particularly common malware behavior, generally used in order to spread malware from computer to computer.

It should be noted that autorun.inf files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation media.



Payload

Downloads arbitrary files

Worm:Win32/Vobfus.MD attempts to contact the remote server "ns1.helpchecks.net" to receive instructions, including the instruction to download variants of TrojanDownloader:Win32/Beebone.

TrojanDownloader:Win32/Beebone is a family of trojans that download other malware, including variants of the Win32/Acbot family of trojans that spread through social media websites.

Modifies computer settings

Worm:Win32/Vobfus.MD modifies the following registry entry to prevent the display of files that have "SYSTEM" and "HIDDEN" attributes:

In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Sets value: "ShowSuperHidden"
With data: "0"

Worm:Win32/Vobfus.MD also modifies the following registry entry to disable your computer's Automatic Updates feature:

In subkey: HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU
Sets value: "NoAutoUpdate"
With data: "1"

Related encyclopedia entries

TrojanDownloader:Win32/Beebone

Win32/Vobfus

Win32/Acbot



Analysis by Patrick Estavillo

Last update 29 November 2012

 

TOP