Threat Database Worms Worm:Win32/Rotrumas.A

Worm:Win32/Rotrumas.A

By JubileeX in Worms

Worm:Win32/Rotrumas.A is a worm that proliferates via removable drives. Worm:Win32/Rotrumas.A may replace detected picture files (.jpgand .jpeg) with its own picture and may delete contents of document files (.doc and .xls). Once installed on the targeted computer system, Worm:Win32/Rotrumas.A downloads malevolent files and modifies the Windows Registry by creating the certain registry entries so that its copy is initiated automatically whenever you boot up Windows. Worm:Win32/Rotrumas.A searches the infected computer for removable drives and, if found, adds its copy in the root folder of the drive. Worm:Win32/Rotrumas.A also creates a malevolent file to automatically load its copy when the drive is accessed and if 'Autorun' is enabled. Worm:Win32/Rotrumas.A can change file and folder display settings. Worm:Win32/Rotrumas.A can also change certain settings in the way that files and folders are shown in Windows Explorer. Worm:Win32/Rotrumas.A can remove the Folder Options menu item from the Tools menu and display hidden files and folders. Worm:Win32/Rotrumas.A steals information that involves email addresses from the affected computer.

File System Details

Worm:Win32/Rotrumas.A may create the following file(s):
# File Name Detections
1. [system folder]\deter177\sv[1 RANDOM CHARACTER]h[1 RANDOM CHARACTER]st.exe
2. [system folder]\deter177\smss.exe
3. psador18.dll
4. [system folder]\deter177\[1 RANDOM CHARACTER]ht[1 RANDOM CHARACTER]msys19.exe
5. CDROM.exe
6. [system folder]\deter177\ctfmon.exe
7. [system folder]\deter177\lsass.exe
8. Autorun.inf

Registry Details

Worm:Win32/Rotrumas.A may create the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced "Hidden" "0"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon "Shell" = "explorer.exe [system folder]\?ht?msys19.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced "HideFileExt" "1"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "lsass" = "[system folder]\deter177\lsass.exe"
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "?ht?msys19.exe" = "[system folder]\ctfmon.exe"
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\explorer "NoFolderOptions" "1"

Trending

Most Viewed

Loading...