Threat Database Worms WORM_LUDER.USR

WORM_LUDER.USR

By ZulaZuza in Worms

Threat Scorecard

Threat Level: 50 % (Medium)
Infected Computers: 13
First Seen: May 9, 2013
Last Seen: December 13, 2022
OS(es) Affected: Windows

WORM_LUDER.USR is a worm that is distributed by using a bogus application, specifically a homemade web browser and targets users of 'Banco do Brasil'. WORM_LUDER.USR steals login information from victimized computer users. The particular web browser is offered that could access the website of the 'Banco do Brasil' without using the necessary security plugin. Web users that click the download link download a zip file. The compressed file involves two executable files: one is the web browser itself, which is called 'Navegador BB', and another one is the file called 'Plugin_Navegador_2.1.3.exe'. These files are recognized as WORM_LUDER.USR. The third file is a text file which carries instructions to run 'Plugin_Navegador_2.1.3.exe' first, and then run the web browser. The 'plugin', in actuality, steals the target PC user's bank information. Meanwhile, the web browser tricks the bank website into not needing the typical security plugin by acting as it is a mobile browser. The homemade web browser doesn't even have an address bar, or any other place to enter a domain name. It only has a single button that sends the Internet user directly to the bank's website.

File System Details

WORM_LUDER.USR may create the following file(s):
# File Name Detections
1. %System%\install\server.exe
2. Plugin_Navegador_2.1.3.exe
3. Navegador BB.exe
4. %User Temp%\XxX.xXx
5. %Application Data%\logs.dat
6. %User Temp%\XX--XX--XX.TXT
7. %User Temp%\[RANDOM FILE NAME].tmp
8. %User Temp%\UuU.uUu

Registry Details

WORM_LUDER.USR may create the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run HKCU = "%System%\install\server.exe"
HKEY_CURRENT_USER\Software\vítima "NewIdentification" = "vítima"
HKEY_CURRENT_USER\Software\vítima "FirstExecution" = "{current date and time with this format: dd/mm/yyy -- hh:mm}"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run Policies = "%System%\install\server.exe"
HKEY_CURRENT_USER\Software\vítima
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500}StubPath = "%System%\install\server.exe"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Policies = "%System%\install\server.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run HKLM = "%System%\install\server.exe"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500}

Trending

Most Viewed

Loading...