Home Malware Programs Worms WORM_LUDER.USR

WORM_LUDER.USR

Posted: May 9, 2013

Threat Metric

Threat Level: 5/10
Infected PCs: 30
First Seen: May 9, 2013
Last Seen: December 13, 2022
OS(es) Affected: Windows

With past examples like Trojan-Banker.Win32.Banbra.atfl, TSPY_BANKER.EUIQ and Trojan.Komodola, Brazil is a very popular country for malware authors interested in attacking bank accounts, and WORM_LUDER.USR simply is one of the most recent forms of PC threats to be designed for that purpose. Distributed through forum spam links along with a specialized web browser, WORM_LUDER.USR is disguised as a free bank plugin but actually steals the account information that's entered into the included browser. Currently, the Banco do Brasil (Bank of Brazil) is the main bank targeted in these attacks, although similar PC threats have been known to target other online banks, particularly those operating in Brazil. Of course, SpywareRemove.com malware experts encourage any potential victims to avoid installing any software from strange sources like the above, including specialized web browsers, but if you need to remove WORM_LUDER.USR from your computer, a good anti-malware program should be sufficient.

Why Random Forum Posters Shouldn't Be Used as Software Sources

WORM_LUDER.USR is marketed through forum posts (and potentially other methods) that promote WORM_LUDER.USR and the accompanying browser as utilities for logging in to the Bank of Brazil without needing to use its security plugin by tricking the site into thinking that your special browser is an iPhone. Although this browser does navigate directly to the Banco do Brasil website and does, in fact, do what it claims to do, launching the 'plugin' of WORM_LUDER.USR beforehand (as the directions instruct users to do) will allow WORM_LUDER.USR to steal your bank account's login information.

Anti-malware programs may detect WORM_LUDER.USR as Worm:Win32/Rebhip.A or Worm.Win32.Luder.tvz. The browser that's designed to work with WORM_LUDER.USR also may be detected as a variant of Parite (which sometimes is identified as a virus). Both WORM_LUDER.USR and its browser are specific to Windows, but can attack multiple versions of that OS.

SpywareRemove.com malware researchers also warn that, as with any worm, you should be prepared for the possibility of WORM_LUDER.USR using your PC to infect other computers. WORM_LUDER.USR may infect any accessible flash drives, travel through local networks or use your PC for posting a new series of forum spam messages. Appropriate precautions should be taken to keep WORM_LUDER.USR from infecting any other computers that may be vulnerable to these attacks originating from your own.

A Pesticide That Even a Digital Thief Can't Beat

SpywareRemove.com malware experts never recommend installing software from sources like the one outlined in this article, and particularly emphasize what a spectacularly bad idea it is to log in to your bank account while intentionally circumventing the bank's security procedures. WORM_LUDER.USR cannot steal your bank credentials without you intentionally using its browser and entering your information, and so, appropriate PC user education and caution are the absolute best ways to protect your PC and money from WORM_LUDER.USR attacks.

In cases where you or someone you know has fallen for WORM_LUDER.USR's scam, SpywareRemove.com malware experts note that you should consider the relevant bank account to be compromised. Contact the Banco do Brasil for any advice on how to protect your account from any fraudulent transactions, and use anti-malware applications to delete WORM_LUDER.USR and its browser from your computer. While you're scanning for WORM_LUDER.USR, you also should pay particularly close attention to any removable hard drives (such as a common USB-based flash drive) and network-accessible locations that may be exploited by WORM_LUDER.USR.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



Navegador BB.exe File name: Navegador BB.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
Plugin_Navegador_2.1.3.exe File name: Plugin_Navegador_2.1.3.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%System%\install\server.exe File name: %System%\install\server.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
%User Temp%\[RANDOM FILE NAME].tmp File name: %User Temp%\[RANDOM FILE NAME].tmp
File type: Temporary File
Mime Type: unknown/tmp
Group: Malware file
%Application Data%\logs.dat File name: %Application Data%\logs.dat
File type: Data file
Mime Type: unknown/dat
Group: Malware file
%User Temp%\XX--XX--XX.TXT File name: %User Temp%\XX--XX--XX.TXT
Mime Type: unknown/TXT
Group: Malware file
%User Temp%\XxX.xXx File name: %User Temp%\XxX.xXx
Mime Type: unknown/xXx
Group: Malware file
%User Temp%\UuU.uUu File name: %User Temp%\UuU.uUu
Mime Type: unknown/uUu
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_CURRENT_USER\Software\vítima "FirstExecution" = "{current date and time with this format: dd/mm/yyy -- hh:mm}"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500}StubPath = "%System%\install\server.exe"HKEY_CURRENT_USER\Software\vítima "NewIdentification" = "vítima"HKEY..\..\..\..{Subkeys}HKEY_CURRENT_USER\Software\vítimaHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{08B0E5JF-4FCB-11CF-AAA5-00401C6XX500}HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\..{RunKeys}HKEY_CURRENT_USER\Software\vítimaHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\policies\Explorer\Run Policies = "%System%\install\server.exe"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run HKCU = "%System%\install\server.exe"HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run HKLM = "%System%\install\server.exe"
Loading...