W32/Rbot-AES

Category: Viruses and Spyware
Type: Win32 worm
Prevalence: No Reports

Download Download our free Virus Removal Tool - Find and remove threats your antivirus missed

W32/Rbot-AES is a worm and IRC backdoor Trojan for the Windows platform.

W32/Rbot-AES spreads to other network computers by exploiting common buffer overflow vulnerabilites, including: LSASS (MS04-011), RPC-DCOM (MS04-012), WebDav (MS03-007), IIS5SSL (MS04-011), MSSQL (MS02-039) and UPNP (MS01-059) and by copying itself to network shares protected by weak passwords.

W32/Rbot-AES runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.

W32/Rbot-AES includes functionality to:

- steal confidential information including CD game keys
- carry out DDoS flooder attacks
- provide a proxy server
- silently download, install and run new software
- capture keystrokes

When first run W32/Rbot-AES moves itself to a hidden, read-only system file <System>\FaLeH.exe.

The following registry entries are created to run FALEH.EXE on startup:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
blah service
FaLeH.exe

HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices
blah service
FaLeH.exe

Registry entries are created under:

HKCU\Software\Microsoft\OLE
blah service
FaLeH.exe

The following patches for the operating system vulnerabilities exploited by W32/Rbot-AES can be obtained from the Microsoft website:

LSASS (MS04-011) security vulnerability

RPC-DCOM (MS04-012) security vulnerability

MSSQL (MS02-039) security vulnerability

IIS5SSL (MS04-011) security vulnerability

UPNP (MS01-059) security vulnerability

WebDav (MS03-007) security vulnerability