Home / malware Worm:Win32/IRCbot.B
First posted on 17 September 2010.
Source: SecurityHomeAliases :
Worm:Win32/IRCbot.B is also known as W32/VB.CXJ (Authentium (Command)), IM-Worm.Win32.Yahos.cb (Kaspersky), Worm.Yahos.AS (VirusBuster), Worm/VB.BDDA (AVG), Worm/Yahos.CB (Avira), Win32.HLLW.Oscar.12 (Dr.Web), IM-Worm.Win32.Yahos (Ikarus), W32/Gaobot.OXI.worm (Panda), W32.IRCBot (Symantec), WORM_YIMBOT.A (Trend Micro).
Explanation :
Worm:Win32/IRCbot.B is a worm that may spread to other computers by sending a link to itself to a user's contact on Yahoo! Messenger and Skype. It allows backdoor access and control of the computer, as well as stops the Windows Update service.
Top
Worm:Win32/IRCbot.B is a worm that may spread to other computers by sending a link to itself to a user's contact on Yahoo! Messenger and Skype. It allows backdoor access and control of the computer, as well as stops the Windows Update service. Installation Worm:Win32/IRCbot.B may drop a copy of itself as the following:%windir%\jusched.exe It creates the following registry modifications so that its copy automatically executes everytime Windows starts: In subkeys: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Terminal Server\Install\Software\Microsoft\Windows\CurrentVersion\Run\ Sets value: "Java developer Script Browse" With data: "%windir%\jusched.exe" Worm:Win32/IRCbot.B may create the following mutex:"Micro Upe" It may bypass the Windows Firewall by adding the following registry entry: In subkey: HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List Sets value: "<currently running malware file>" With data: "<currently running malware file>:*:enabled:java developer script browse" Spreads via... Instant messaging and communication programs Worm:Win32/IRCbot.B may attempt to spread to other computers by sending a link to a hosted copy to a user's contacts in Yahoo! Messenger or Skype. It performs its spreading routine as part of its backdoor functionalities. Payload Allows backdoor access and control Worm:Win32/IRCbot.B attempts to connect to the remote IRC server 142.45.184.0 on port 1234 to wait for commands. Some of these commands include the following:propagate via Yahoo! Messenger or Skype inject IFrames into visited webpages urge users to complete a survey to access web content Stops services Worm:Win32/IRCbot.B may attempt to stop the Windows Update service by running the following commands: net stop wuauserv sc config wuauserv start= disabled Drops other files Worm:Win32/IRCbot.B may drop the following files in the Windows folder; these files are not malicious:mdll.dl wintybrd.png wintybrdf.jpg Download arbitrary files Worm:Win32/IRCbot.B attempts to connect to 142.45.183.251 to download arbitrary files. As of this writing, the server is unavailable. Additional information Worm:Win32/IRCbot.B opens the browser to the following URL in an attempt to distract the user while it performs its malicious routines: http://browseusers.myspace.com/Browse/Browse.aspx
Analysis by Andrei Florin SaygoLast update 17 September 2010