Threat Database Worms Worm:Win32/Vobfus.MD

Worm:Win32/Vobfus.MD

By LoneStar in Worms

Threat Scorecard

Ranking: 16,446
Threat Level: 20 % (Normal)
Infected Computers: 5,143
First Seen: December 5, 2012
Last Seen: August 26, 2023
OS(es) Affected: Windows

Worm:Win32/Vobfus.MD is a worm that is distributed via network and removable drives and downloads other security infections from a remote server. While being installed, Worm:Win32/Vobfus.MD downloads malevolent files in the root folders of network and removable drives. Worm:Win32/Vobfus.MD also modifies the Windows Registry. When activated, Worm:Win32/Vobfus.MD distributes its copy as an executable file (.exe). Worm:Win32/Vobfus.MD modifies the certain registry entry so that its copy is launched whenever you boot up Windows. Worm:Win32/Vobfus.MD copies itself to the root folder of all available network and removable drives. Worm:Win32/Vobfus.MD also sets an 'autorun.inf' file in the root directory of the targeted drive. An 'autorun.inf' file carries commands for the operating system so that when the removable drive is accessed, Worm:Win32/Vobfus.MD may be started automatically. Worm:Win32/Vobfus.MD contacts the remote server to get commands. Worm:Win32/Vobfus.MD alters computer settings of the affected computer by modifying the certain registry entry so that files that have 'SYSTEM' and 'HIDDEN' attributes are not displayed. Worm:Win32/Vobfus.MD also modifies the certain registry entry to disable the Automatic Updates feature of your PC.

File System Details

Worm:Win32/Vobfus.MD may create the following file(s):
# File Name Detections
1. porn.exe
2. passwords.exe
3. nuaeku.exe
4. subst.exe
5. zuaixap.exe
6. sexy.exe
7. secret.exe
8. rcx11.tmp
9. rcx.tmp
10. autorun.inf

Registry Details

Worm:Win32/Vobfus.MD may create the following registry entry or registry entries:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "[malware file name]" = "%USERPROFILE%\[malware file name] /[random parameter]"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "peuolig" = "C:\Users\[user name]\peuolig.exe /n"
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced "ShowSuperHidden" = "0"
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU "NoAutoUpdate" = "1"

URLs

Worm:Win32/Vobfus.MD may call the following URLs:

flewssyzygia.casa

Trending

Most Viewed

Loading...