Threat Database Worms Worm:Win32/Dorkbot.I

Worm:Win32/Dorkbot.I

By ZulaZuza in Worms

Threat Scorecard

Threat Level: 20 % (Normal)
Infected Computers: 5
First Seen: December 4, 2012
Last Seen: October 16, 2022
OS(es) Affected: Windows

Worm:Win32/Dorkbot.I is a IRC-based worm that proliferates via removable drives, instant messaging programs such as Windows Live Messenger, Xchat, Pidgin chat, and mIRC, and social networks such as Facebook, Twitter, Bebo, and Vkontakte (a Russian social network). Win32/Dorkbot.I may seize user names and passwords by controlling network communication, and may block websites that are connected with security updates. Worm:Win32/Dorkbot.I may also initiate a limited denial of service (DoS) attack. When installed, Worm:Win32/Dorkbot.I makes system changes on the compromised PC by downloading malevolent files and modifying the Windows Registry. Worm:Win32/Dorkbot.I modifies the certain registry entry so that it can load its copy whenever you boot up Windows. Win32/Dorkbot.I show pop-up messages and may send a message from a Skype contact. Worm:Win32/Dorkbot.I may come as a link through in an instant message or social network message; the link points to a copy of Worm:Win32/Dorkbot.I that can be downloaded and executed on the victim's computer. Worm:Win32/Dorkbot.I contacts an IRC server, joins a channel to receive commands. Worm:Win32/Dorkbot.I corrupts websites and restricts access to security websites. Worm:Win32/Dorkbot.I may also download additional or updated domain list from a remote website.

File System Details

Worm:Win32/Dorkbot.I may create the following file(s):
# File Name Detections
1. facebook-profile-pic-[RANDOM NUMBERS]-JPEG.exe
2. facebook-pic00[RANDOM CHARACTERS].exe
3. skype__foto.exe, where is the day, month, and year, for example, "skype_06102012_foto.exe"
4. skype__foto.exe, where is the day, month, and year, for example, "skype_09-10-2012_image.exe"

Registry Details

Worm:Win32/Dorkbot.I may create the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "ozkqke" = "%AppData%\ozkqke.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "" = "%AppData%\.exe"

Trending

Most Viewed

Loading...