Home Malware Programs Worms W32.Jabberbot

W32.Jabberbot

Posted: February 27, 2013

Threat Metric

Threat Level: 5/10
Infected PCs: 14
First Seen: February 27, 2013
OS(es) Affected: Windows

W32.Jabberbot is a worm that circulates through removable drives and opens a back door on the targeted computer system. When W32.Jabberbot is run, it creates the file. W32.Jabberbot may create the registry entries so that it can run automatically every time Windows is started. W32.Jabberbot may also strive to propagate through removable drives by creating copy of itself as the particular file. W32.Jabberbot then opens a back door on the infected computer by communicating over the XMPP network permitting the remote attacker to perform malicious actions such as Upload, download, delete, and execute files, execute commands, collect system information, navigate and list directory contents, visit websites and block itself from running.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



file.exe File name: file.exe
Size: 271.36 KB (271360 bytes)
MD5: 3d539ed8f15ce5d6a04c0d6720645893
Detection count: 35
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Last Updated: February 28, 2013
%System%\[RANDOM FILE NAME].exe File name: %System%\[RANDOM FILE NAME].exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%DriveLetter%\2_luxaeternabytaenarongc3luxaeternabytaenaluxaeternabytaenaluxaeternabytaena.scr File name: %DriveLetter%\2_luxaeternabytaenarongc3luxaeternabytaenaluxaeternabytaenaluxaeternabytaena.scr
Mime Type: unknown/scr
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"EXPLORER" = "%System%\[RANDOM FILE NAME].exe"
Loading...