Home Malware Programs Worms W32.Widoom

W32.Widoom

Posted: March 28, 2012

Threat Metric

Threat Level: 2/10
Infected PCs: 93
First Seen: March 28, 2012
OS(es) Affected: Windows

W32.Widoom is a malignant worm that tries to circulate through removable drives and open a back door on the infected PC by connecting to the particular remote location on TCP port 80. Once executed, W32.Widoom creates copies of itself by dropping a certain file. W32.Widoom also modifies the Windows Registry so that it can execute every time you boot up Windows. W32.Widoom creates the specific mutex called 'tbYfOPSWsbgXvrx' so that only one instance of the infection runs on the PC. W32.Widoom connects to an IRC server and waits for instructional commands that enable it to execute malicious actions that include updating itself, downloading and executing remote files and sending client status (computer name, locale info, Windows version). You should eliminate W32.Widoom immediately after detection by using a genuine security tool.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



%DriveLetter%\UxxxSBSERVICEx\FA8AF9NCAS-JK6NK3BHHBF-DFSDS89FY-F27E\Desktop.ini File name: %DriveLetter%\UxxxSBSERVICEx\FA8AF9NCAS-JK6NK3BHHBF-DFSDS89FY-F27E\Desktop.ini
Mime Type: unknown/ini
Group: Malware file
%DriveLetter%\UxxxSBSERVICEx\FA8AF9NCAS-JK6NK3BHHBF-DFSDS89FY-F27E\autorunme.exe File name: %DriveLetter%\UxxxSBSERVICEx\FA8AF9NCAS-JK6NK3BHHBF-DFSDS89FY-F27E\autorunme.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%Windir%\System.exe File name: %Windir%\System.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%DriveLetter%\AutORUN.inf File name: %DriveLetter%\AutORUN.inf
Mime Type: unknown/inf
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\..\..{Subkeys}HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"MSN Messanger" = "%Windir%\System.exe"
Loading...