W32/Rbot-OM

Category: Viruses and Spyware
Type: Win32 worm
Prevalence: Small Number of Reports

Download Download our free Virus Removal Tool - Find and remove threats your antivirus missed

W32/Rbot-OM is a worm with backdoor Trojan functionality.

W32/Rbot-OM is capable of spreading to computers on the local network protected by weak passwords after receiving the appropriate backdoor command.

W32/Rbot-OM may also spread by exploiting the following vulnerabilities:

LSASS (MS04-011)
DCOM (MS04-012)
Microsoft SQL servers with weak passwords.

W32/Rbot-OM may attempt to spread with a filename of bling.exe.

When first run, W32/Rbot-OM moves itself to the Windows system folder as memstat.exe. In order to run each time Windows is started, W32/Rbot-OM creates the following registry entries:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\
Microsoft Update Machine = "memstat.exe"

HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices\
Microsoft Update Machine = "memstat.exe"

HKCU\Software\Microsoft\Windows\CurrentVersion\Run\
Microsoft Update Machine = "memstat.exe"

The worm runs continuously in the background providing backdoor access to the infected computer.

The backdoor component of W32/Rbot-OM can be used to:

Initiate distributed denial-of-service (DDoS) attacks using ICMP, SYN, UDP,
PING, ACK and TCP flooding.
Redirect TCP and SOCKS4 traffic.
Provide a remote login shell.
Download, upload, delete and execute files.
Set up an HTTP, TFTP and FTP file server.
Steal passwords (including PayPal account information).
Log key presses.
Capture screenshots.
Capture webcam pictures and videos.
List and kill processes.
Stop, start and pause services.
Open and close vulnerabilities.
Port scan for vulnerabilities on other remote computers.
Send emails as specified by the remote user.
Flush the DNS and ARP caches.
Shut down and reboot the computer.
Add and delete network shares and users.
Sniff network traffic for passwords.

W32/Rbot-OM may be used to steal registration and key details from several computer games and applications including:

Counter-Strike
The Gladiators
Gunman Chronicles
Half-Life
Industry Giant 2
Legends of Might and Magic
Soldiers Of Anarchy
Microsoft Windows Product ID
Unreal Tournament 2003
Unreal Tournament 2004
IGI 2: Covert Strike
Freedom Force
Battlefield 1942
Battlefield 1942 (Road To Rome)
Battlefield 1942 (Secret Weapons of WWII)
Battlefield Vietnam
Black and White
Command and Conquer: Generals (Zero Hour)
James Bond 007: Nightfire
Command and Conquer: Generals
Global Operations
Medal of Honor: Allied Assault
Medal of Honor: Allied Assault: Breakthrough
Medal of Honor: Allied Assault: Spearhead
Need For Speed Hot Pursuit 2
Need For Speed: Underground
Shogun: Total War: Warlord Edition
FIFA 2002
FIFA 2003
NHL 2002
NHL 2003
Nascar Racing 2002
Nascar Racing 2003
Rainbow Six III RavenShield
Command and Conquer: Tiberian Sun
Command and Conquer: Red Alert
Command and Conquer: Red Alert 2
Chrome
NOX
Hidden & Dangerous 2
Soldier of Fortune II - Double Helix
Neverwinter Nights
Neverwinter Nights (Shadows of Undrentide)
Neverwinter Nights (Hordes of the Underdark)

W32/Rbot-OM may alter the following registry entries in order to enable/disable DCOM and open/close restrictions on IPC$ shares:

HKLM\Software\Microsoft\Ole\
EnableDCOM

HKLM\System\CurrentControlSet\Control\Lsa\
restrictanonymous

HKLM\System\ControlSet<NUMBER>\Control\Lsa\
restrictanonymous

W32/Rbot-OM may add and delete network shares and users on the infected computer.