Threat Database Worms W32.Shadesrat.C

W32.Shadesrat.C

By GoldSparrow in Worms

Threat Scorecard

Ranking: 2,725
Threat Level: 80 % (High)
Infected Computers: 1,094
First Seen: July 2, 2012
Last Seen: September 20, 2023
OS(es) Affected: Windows

W32.Shadesrat.C is a worm that is distributed by attackers through removable drives. W32.Shadesrat.C also proliferates through various peer-to-peer programs that include Kazaa, BitTorrent, eMule, Azureus, and LimeWire. W32.Shadesrat.C can also try to spread through AOL Instant Messenger (AIM). W32.Shadesrat.C also opens a back door on the compromised PC. When activated, W32.Shadesrat.C replicates itself by creating potentially infectious files. W32.Shadesrat.C creates the specific file so that it can start automatically when the drives are accessed. W32.Shadesrat.C executes the specific process if the victim is running Windows XP or Windows 7. W32.Shadesrat.C then copies a signed Microsoft .NET ClickOnce Launch Utility file as the specific file. W32.Shadesrat.C then creates the certain registry entry so that it can start automatically whenever you boot up Windows. W32.Shadesrat.C also creates a few registry entries in order to avoid the Windows firewall. W32.Shadesrat.C then modifies the specific registry entry to permit the certain firewall exceptions.

SpyHunter Detects & Remove W32.Shadesrat.C

File System Details

W32.Shadesrat.C may create the following file(s):
# File Name MD5 Detections
1. %Windir%\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
2. %Temp%\local3.exe
3. %Temp%\D3D8THK.exe
4. %UserProfile%\Templates\VSCover.exe (Trojan.ADH.2)
5. %Temp%\Application Data\data.dat (a log file used to store recorded keystrokes)
6. %DriveLetter%\autorun.inf
7. file.exe 0d1bd081974a4dcdeee55f025423a72b 0
8. file.exe 291ce2c51e5ea57b571d6610e1d324f9 0

Registry Details

W32.Shadesrat.C may create the following registry entry or registry entries:
mp%\local3.exe" = "%Temp%\local3.exe:*:Enabled:Windows Messanger"
Messanger"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\[CERTIFICATE NUMBER]\Blob
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"Microsoft® Windows® Operating System" =
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\"%Te
ndir%\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe" = "%Windir%\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe:*:Enabled:Windows
HKEY_CURRENT_USER\Software\VB and VBA Program Settings\SrvID\ID\"DC596I04Z1" = "Local"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\"DoNotAllowExceptions" = "0"
"%UserProfile%\Templates\VSCover.exe"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\"%Wi
HKEY_CURRENT_USER\Software\VB and VBA Program Settings\INSTALL\DATE\"DC596I04Z1" = "[DATE THREAT EXECUTES MM/DD/YYYY]"

Trending

Most Viewed

Loading...