W32/Rbot-WT

Category: Viruses and Spyware
Type: Win32 worm
Prevalence: No Reports

Download Download our free Virus Removal Tool - Find and remove threats your antivirus missed

W32/Rbot-WT is a worm which attempts to spread to remote network shares. It also contains backdoor Trojan functionality, allowing unauthorised remote access to the infected computer via IRC channels while running in the background as a service process.

W32/Rbot-WT spreads using a variety of techniques including exploiting weak passwords on computers and SQL servers, exploiting operating system vulnerabilities (including DCOM-RPC, LSASS).

W32/Rbot-WT spreads to network shares with weak passwords as a result of the backdoor Trojan element receiving the appropriate command from a remote user.

W32/Rbot-WT moves itself to the Windows system folder as DYNITORA.EXE and creates entries in the registry at the following locations to run on Windows startup:

HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Dynamic Dns Binary
dynitora.exe

HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices
Dynamic Dns Binary
dynitora.exe

HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Dynamic Dns Binary
dynitora.exe

W32/Rbot-WT will also set the following registry entries:

HKLM\SOFTWARE\Microsoft\Ole
EnableDCOM
N

HKLM\SYSTEM\CurrentControlSet\Control\Lsa
restrictanonymous
1

Patches for the operating system vulnerabilities exploited by W32/Rbot-WT can be obtained from Microsoft at:

http://www.microsoft.com/technet/security/bulletin/ms04-012.mspx
http://www.microsoft.com/technet/security/bulletin/ms04-011.mspx