W32/Vanebot-F

Category: Viruses and SpywareProtection available since:28 Aug 2006 00:00:00 (GMT)
Type: Win32 wormLast Updated:28 Aug 2006 00:00:00 (GMT)
Prevalence: Small Number of Reports

Download Download our free Virus Removal Tool - Find and remove threats your antivirus missed

W32/Vanebot-F is a Trojan for the Windows platform.

W32/Vanebot-F spreads
- to computers vulnerable to common exploits, including: SRVSVC (MS06-040), Psy
me, PNP (MS05-039) and ASN.1 (MS04-007)
- to MSSQL servers protected by weak passwords
- to network shares
- via MSN Messenger

W32/Vanebot-F runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels. W32/Vanebot-F is a Trojan for the Windows platform.

W32/Vanebot-F spreads
- to computers vulnerable to common exploits, including: SRVSVC (MS06-040), Psy
me, PNP (MS05-039) and ASN.1 (MS04-007)
- to MSSQL servers protected by weak passwords
- to network shares
- via MSN Messenger

W32/Vanebot-F runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.

When first run W32/Vanebot-F copies itself to <System>\msclt.exe.

The following registry entries are created to run msclt.exe on startup:

HKCU\Software\Microsoft\Windows\CurrentVersion\RunServices
Microsoft Windows Client Firewall
msclt.exe

HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
Microsoft Windows Client Firewall
msclt.exe

The following registry entry is changed to run msclt.exe on startup:

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
Explorer.exe msclt.exe

(the default value for this registry entry is "Explorer.exe" which causes the Microsoft file <Windows>\Explorer.exe to be run on startup).

W32/Vanebot-F sets the following registry entries, disabling the automatic startup of other software:

HKLM\SYSTEM\CurrentControlSet\Services\wuauserv
Start
4

HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess
Start
4

Note: disabling autostart for the SharedAccess service deactivates the Microsoft Internet Connection Firewall (ICF).

Registry entries are set as follows:

HKLM\SOFTWARE\Microsoft\Ole
EnableDCOM
N

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
<System>\userinit.exe,msclt.exe

HKLM\SYSTEM\CurrentControlSet\Control\Lsa
lmcompatibilitylevel
1

HKLM\SYSTEM\CurrentControlSet\Control\Lsa
restrictanonymous
1