Threat Database Worms W32/Vanebot-R

W32/Vanebot-R

By GoldSparrow in Worms

Threat Scorecard

Threat Level: 10 % (Normal)
Infected Computers: 1
First Seen: January 4, 2013
Last Seen: February 7, 2023
OS(es) Affected: Windows

The W32/Vanebot-R Worm is a dangerous malware infection that was mainly active in 2006 and 2007. Although infections involving W32/Vanebot-R may still appear, they are much less frequent than before thanks to the efforts of PC security researchers and the advancement of the anti-malware programs technology. W32/Vanebot-R spreads using the following pathways:

  1. W32/Vanebot-R may be distributed by compromised MS SQL servers which may be infected due to using weak passwords or security settings.
  2. W32/Vanebot-R can spread on a network through shared folders and drives.
  3. W32/Vanebot-R can also take advantage of a security vulnerability present in Microsoft Server Service known as MS06-040. By using this vulnerability, the remote code (such as W32/Vanebot-R's executable file) can be executed on the victim's computer.
  4. W32/Vanebot-R is often spread through instant message spam sent from an infected computer.

How Criminals Profit from Using W32/Vanebot-R to Infect a Computer

Once a computer is infected, W32/Vanebot-R will contact an IRC server so W32/Vanebot-R can receive instructions, effectively integrating the infected computer into a botnet. Using this botnet, the criminals responsible for the W32/Vanebot-R infection managed to generate thousands of dollars in illegal revenue. W32/Vanebot-R has been used in various scams. However, the most notorious involved infecting computers in order to earn money from affiliate marketing. An adware company paid people to install adware on vulnerable computers. Using this adware affiliate scheme, computers infected with W32/Vanebot-R were then used to spread W32/Vanebot-R further. Each computer infected with W32/Vanebot-R would, in turn, have this adware installed on its drive. Although there are more sophisticated ways of profiting from botnets (such as generating bitcoins or using them to steal banking information and carry out credit card fraud), when W32/Vanebot-R was mainly active, this was the principal way of generating revenue from a botnet infection.

The most common file name associated with W32/Vanebot-R is some variation of 'redworld'. Some examples of typical file names associated with W32/Vanebot-R include the following:

  • redworld.exe
  • redworld2.exe
  • (random number string)_redworld2.exe

W32/Vanebot-R makes changes to the Windows Registry which allows W32/Vanebot-R to start up automatically when Windows is launched; W32/Vanebot-R disguises itself as a 'Microsoft Security Login Service'. W32/Vanebot-R also makes changes to the Windows Registry that allows W32/Vanebot-R to disable the infected computer's firewall and to interfere with security software installed on the victim's computer.

File System Details

W32/Vanebot-R may create the following file(s):
# File Name Detections
1. [RANDOM CHARACTERS]_redworld2.exe
2. redworld.exe
3. redworld2.exe
4. [Windows system folder]\dllcache\mssecure32.exe

Registry Details

W32/Vanebot-R may create the following registry entry or registry entries:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess "Start" = "4"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa "restrictanonymous" = "1"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv "Start" = "4"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa 'lmcompatibilitylevel' = '1"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Microsoft Security Login Service\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ole "EnableDCOM" = "N"

URLs

W32/Vanebot-R may call the following URLs:

thesearchconverters.com

Trending

Most Viewed

Loading...