WORM_VOBFUS.SMAC
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Ranking: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
Threat Level: | 50 % (Medium) |
Infected Computers: | 17 |
First Seen: | October 11, 2012 |
Last Seen: | January 18, 2023 |
OS(es) Affected: | Windows |
WORM_VOBFUS.SMAC is a dangerous worm that can have severe consequences on an infected computer. WORM_VOBFUS.SMAC is detectably a new threat, and WORM_VOBFUS.SMAC belongs to a large group of worms known as AUTORUN worms due to the fact that they exploit Windows' Autorun capabilities to ensure that their malicious executable files run automatically as soon as an infected memory drive is connected to a computer. While WORM_VOBFUS.SMAC attacks computers using the Windows operating system, most attacks involving WORM_VOBFUS.SMAC seem to be restricted to computers using the Windows XP operating system and earlier versions of the Windows OS.
Table of Contents
WORM_VOBFUS.SMAC’s Distribution Vectors
The WORM_VOBFUS.SMAC worm can be distributed using three possible routes:
- WORM_VOBFUS.SMAC can spread using removable memory devices such as USB drives and SD cards. Taking advantage of the AutoRun feature in many Windows operating systems, WORM_VOBFUS.SMAC is configured to make duplicates of itself on all drives connected to the infected computer as soon as WORM_VOBFUS.SMAC accesses the infected drive.
- WORM_VOBFUS.SMAC can also be downloaded from unsafe websites, malicious email attachments or other online sources. In fact, this is the most common way in which computers become infected with WORM_VOBFUS.SMAC. Most notably, ESG security researchers have observed that WORM_VOBFUS.SMAC is distributed using social engineering methods that exploit trending news stories. This has been especially notorious with events surrounding the recent presidential campaigns in the United States, in which fake news stories and documents are distributed using malicious email messages. These can then contain either WORM_VOBFUS.SMAC itself or a dropper Trojan designed to install WORM_VOBFUS.SMAC on the infected computer.
- Although WORM_VOBFUS.SMAC can distribute itself, unlike Trojan infections, WORM_VOBFUS.SMAC is also often installed on a victim's computer through another malware threat. Because of this, WORM_VOBFUS.SMAC infections will rarely occur alone. If your computer has been infected with WORM_VOBFUS.SMAC, it is highly likely tht other malware has also been installed on your computer.
WORM_VOBFUS.SMAC has some tactics that make WORM_VOBFUS.SMAC particularly difficult to remove. The main trick that WORM_VOBFUS.SMAC uses is to create files with innocuous extensions such as MP3 or BMP. It also sets its folder status to hidden and creates dummy files to mislead computer users from the real files containing this dangerous threat.
File System Details
# | File Name |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
---|---|---|
1. | Secret.exe | |
2. | Sexy.exe | |
3. | Passwords.exe | |
4. | %User Profile%\{RANDOM CHARACTERS}.exe | |
5. | Porn.exe | |
6. | autorun.inf |
Submit Comment
Please DO NOT use this comment system for support or billing questions. For SpyHunter technical support requests, please contact our technical support team directly by opening a customer support ticket via your SpyHunter. For billing issues, please refer to our "Billing Questions or Problems?" page. For general inquiries (complaints, legal, press, marketing, copyright), visit our "Inquiries and Feedback" page.