Home Malware Programs Worms W32/Vanebot-R

W32/Vanebot-R

Posted: January 4, 2013

Threat Metric

Threat Level: 1/10
Infected PCs: 52
First Seen: January 4, 2013
Last Seen: February 7, 2023
OS(es) Affected: Windows

W32/Vanebot-R is an IRC-based backdoor Trojan that connects victims' computers to a botnet and then installs its payload – adware programs that display advertisements for the profit of W32/Vanebot-R's long-since-imprisoned mastermind, Robert Bentley. Although the man behind W32/Vanebot-R's botnet was captured and imprisoned years ago, W32/Vanebot-R may still cause incidental harm to your PC with its malicious settings changes, unwarranted network activity and adware installations. SpywareRemove.com malware analysts suggest using strong anti-malware software to remove W32/Vanebot-R and, in the meantime, paying close attention to network-shared resources and other infection vectors that W32/Vanebot-R could use to spread to any linked computers.

The Importance of Paying Attention to W32/Vanebot-R Attacks from Every Direction Imaginable

W32/Vanebot-R uses multiple methods of distributing itself to new PCs, although only Windows computers are affected by W32/Vanebot-R. Means of installation that SpywareRemove.com malware researchers have confirmed in usage by W32/Vanebot-R Trojans include:

  • Instant messenger spam for MSN Messenger and Yahoo Instant Messenger that include links to W32/Vanebot-R.
  • A Windows exploit, MS06-040, that affects Windows 2000, XP and Server 2003. This exploit can allow arbitrary code to be executed without your permission, resulting in W32/Vanebot-R's installation. However, SpywareRemove.com malware experts emphasize that Microsoft has issued a security patch to correct this vulnerability.
  • Network-shared resources, such as shared hard drives between two locally-networked computers. W32/Vanebot-R may use worm-based techniques to install itself as soon as such resources are accessed by an uninfected PC.
  • SQL servers that use easily-cracked passwords also may be compromised and forced to host W32/Vanebot-R installers and drive-by-download exploits (referencing the aforementioned Windows exploit).

The Ill Weather that this Vane Has for You

Like most backdoor Trojans, W32/Vanebot-R is used for profit, namely, by installing adware that generates money for W32/Vanebot-R's original coder. Pop-up advertisements, unusual links inserted into text content and other symptoms of adware infection may or may not be present with any specific W32/Vanebot-R infection, particularly since W32/Vanebot-R's botnet has suffered significant attacks by American and UK-based law enforcement. SpywareRemove.com malware researchers also note that you can expect to see unusual network activity from W32/Vanebot-R's various functions.

Because W32/Vanebot-R attempts to disable several Windows security features and programs, including anti-virus software, SpywareRemove.com malware research team urges you to delete W32/Vanebot-R immediately after discovering W32/Vanebot-R on any computer. Although you may need to use Safe Mode or other tactics to regain unfettered access to your anti-malware software, once this is done, removing W32/Vanebot-R should be as easy as scanning your computer.

Given W32/Vanebot-R's many possible infection vectors, an equally large number of security solutions should be employed to prevent W32/Vanebot-R from spreading itself to other PCs. Strong passwords for server accounts, network-monitoring security software, regular patches to Windows and, of course, simple avoidance of suspicious links all should be used to prevent W32/Vanebot-R from being installed without your realizing it.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



redworld.exe File name: redworld.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
redworld2.exe File name: redworld2.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
[RANDOM CHARACTERS]_redworld2.exe File name: [RANDOM CHARACTERS]_redworld2.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
[Windows system folder]\dllcache\mssecure32.exe File name: [Windows system folder]\dllcache\mssecure32.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\wuauserv "Start" = "4"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess "Start" = "4"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Ole "EnableDCOM" = "N"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa 'lmcompatibilitylevel' = '1"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa "restrictanonymous" = "1"HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Microsoft Security Login Service\

Additional Information

The following URL's were detected:
thesearchconverters.com
Loading...