Threat Database Worms W32.Wergimog.B

W32.Wergimog.B

By Sumo3000 in Worms

Threat Scorecard

Threat Level: 20 % (Normal)
Infected Computers: 27
First Seen: May 18, 2012
Last Seen: June 6, 2022
OS(es) Affected: Windows

W32.Wergimog.B is a computer worm that is distributed through removable drives. W32.Wergimog.B replicates itself to removable drives as the specific file. W32.Wergimog.B may also create the particular file so that it can launch automatically every time the drive is used on another machine. W32.Wergimog.B also opens a back door and may steal information from the affected PC system. Once W32.Wergimog.B is executed, it replicates itself as one of the specific files. W32.Wergimog.B may modify the Windows Registry by creating the specific registry entries, so that it can load every time you start Windows. W32.Wergimog.B creates the specific mutexes 'skkd)*u32hqiajnzja' and '(asdj2j3e)*oqwjkz' so that only one instance of the copy initiates on the corrupted PC. W32.Wergimog.B executes the Explorer.exe process and embeds its code into it. W32.Wergimog.B may also attach itself into other processes as well. W32.Wergimog.B also aims at stealing data on the infected computer system including user name, user account type, operating system version and FileZilla account details. W32.Wergimog.B also alters any posts created on the social networking web pages such as Facebook, Twitter, Myspace, Hyves, Omegle, Linkedin and Hi5. W32.Wergimog.B tries to find other malware infections on the compromised PC and ends any malware processes it founded. W32.Wergimog.B tries to hook DNS requests made to numerous websites and change them with www.google.com.

File System Details

W32.Wergimog.B may create the following file(s):
# File Name Detections
1. %UserProfile%/Application Data/Microsoft/services[THREE RANDOM NUMBERS].exe
2. %DriveLetter%\autorun.inf
3. %DriveLetter%\adober~1/dsci5829.jpg

Registry Details

W32.Wergimog.B may create the following registry entry or registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\"Adobe Reader Speed Launcher" = "%UserProfile%/Application Data/Microsoft/services[THREE RANDOM NUMBERS].exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"Adobe Reader Speed Launcher" = "%UserProfile%/Application Data/Microsoft/services[THREE RANDOM NUMBERS].exe"

URLs

W32.Wergimog.B may call the following URLs:

initiateintenselyadvancedthefile.vip

Trending

Most Viewed

Loading...