Home Malware Programs Worms Worm:Win32/Vobfus.MD

Worm:Win32/Vobfus.MD

Posted: December 5, 2012

Threat Metric

Ranking: 16,823
Threat Level: 2/10
Infected PCs: 12,045
First Seen: December 5, 2012
Last Seen: August 26, 2023
OS(es) Affected: Windows

Worm:Win32/Vobfus.MD is a worm that proliferates via network and removable drives and downloads other malware threats from a remote server. Once installed, Worm:Win32/Vobfus.MD drops potentially malicious files in the root folders of network and removable drives. Worm:Win32/Vobfus.MD also makes registry modifications. When executed, Worm:Win32/Vobfus.MD downloads a copy of itself as an executable file (.exe). Worm:Win32/Vobfus.MD modifies the certain registry entry to assure that its copy loads every time you start Windows. Worm:Win32/Vobfus.MD replicates itself to the root folder of all available network and removable drives. Worm:Win32/Vobfus.MD also sets an 'autorun.inf' file in the root directory of the affected drive. An 'autorun.inf' file contains instructions for the operating system so that when the removable drive is accessed, Worm:Win32/Vobfus.MD may be executed automatically. Worm:Win32/Vobfus.MD strives to contact the remote server to receive instructions. Worm:Win32/Vobfus.MD modifies computer settings of the infected PC by modifying the certain registry entry to block the display of files that have 'SYSTEM' and 'HIDDEN' attributes. Worm:Win32/Vobfus.MD also modifies the certain registry entry to disable the Automatic Updates feature of your computer.

Technical Details

File System Modifications

Tutorials: If you wish to learn how to remove malware components manually, you can read the tutorials on how to find malware, kill unwanted processes, remove malicious DLLs and delete other harmful files. Always be sure to back up your PC before making any changes.

The following files were created in the system:



autorun.inf File name: autorun.inf
Mime Type: unknown/inf
Group: Malware file
zuaixap.exe File name: zuaixap.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
nuaeku.exe File name: nuaeku.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
rcx<random>.tmp File name: rcx<random>.tmp
File type: Temporary File
Mime Type: unknown/tmp
Group: Malware file
rcx11.tmp File name: rcx11.tmp
File type: Temporary File
Mime Type: unknown/tmp
Group: Malware file
porn.exe File name: porn.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
sexy.exe File name: sexy.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
subst.exe File name: subst.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
passwords.exe File name: passwords.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file
secret.exe File name: secret.exe
File type: Executable File
Mime Type: unknown/exe
Group: Malware file

Registry Modifications

The following newly produced Registry Values are:

HKEY..\..\{Value}HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced "ShowSuperHidden" = "0"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "peuolig" = "C:\Users\[user name]\peuolig.exe /n"HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run "[malware file name]" = "%USERPROFILE%\[malware file name] /[random parameter]"HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU "NoAutoUpdate" = "1"

Additional Information

The following URL's were detected:
flewssyzygia.casa
Loading...