Home / malware Backdoor:Win32/VBbot.V
First posted on 18 January 2010.
Source: SecurityHomeAliases :
There are no other names known for Backdoor:Win32/VBbot.V.
Explanation :
Backdoor:Win32/VBbot.V is a backdoor trojan that allows unauthorized access and control of an affected computer.
Top
Backdoor:Win32/VBbot.V is a backdoor trojan that allows unauthorized access and control of an affected computer. InstallationWhen executed, Backdoor:Win32/VBbot.V adds itself to the Windows firewall authorized applications list by setting the following registry entry: Sets value:"<malware file name>"With data: "<malware file name>:*:Enabled:Adobe Update Manager" To subkey: HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\ListNote: <malware file name> is the malware's file name at the time of execution. Hence the file name is variable. The malware also sets the following registry entries to ensure that it executes as each Windows start:Adds value: "Adobe Update Manager"
With data: "<malware file name>"
To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run Adds value: "Adobe Update Manager"
With data: "<malware file name>"
To subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run The malware may also set the following registry entries: Sets value: "Userinit"
With data: "C:\WINDOWS\system32\userinit.exe,<malware file name>" To subkey: HKLM\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon
Sets value: "Userinit"
With data: "C:\WINDOWS\system32\userinit.exe,<malware file name>"
To subkey: HKCU\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Payload Allows backdoor access and controlBackdoor:Win32/VBbot.V allows unauthorized access and control of the affected computer. The malware may connect to one of the following hosts on a specified port, contained in a list carried in its code: google.homeunix.com:80
tyuqwer.dyndns.org:80
ymail.ath.cx:8585
voanews.ath.cx:8585 Once connected the malware can then accept commands from a remote attacker to perform specific actions, including but not limited to the following:Download files to the infected machine Download and execute arbitrary files Upload specific files from the infected machine
Analysis by Ray RobertsLast update 18 January 2010