|W32.Gaobot.ZW is a minor variant of W32.Gaobot.SY.
This worm attempts to spread through network shares with weak passwords.
It also allows attackers to access an infected computer using a predetermined IRC channel.
Disables other worms by deleting their files, associated registry values, and by terminating their processes.
Steals the Windows product ID and CD keys from some video games.
Attempts to terminate processes related with some antivirus software.
The worm uses multiple vulnerabilities to spread, including:
- The Microsoft Messenger Service Buffer Overrun Vulnerability (described in Microsoft Security Bulletin MS03-043).
- The Locator service vulnerability (described in Microsoft Security Bulletin MS03-001) using TCP port 445.
The worm specifically targets Windows 2000 machines using this exploit.
- The UPnP vulnerability (described in Microsoft Security Bulletin MS01-059).
- The vulnerabilities in the Microsoft SQL Server 2000 or MSDE 2000 audit (described in Microsoft Security Bulletin MS02-061), using UDP port 1434.
Sending itself to the backdoor ports that the Beagle and Mydoom families of worms open.
Copies itself as %System%\svdhost32.exe.
Adds the value: "Hotfix Updat"="svdhost32.exe"
to the registry keys:
Deletes the values: "Ssate.exe"; "rate.exe"; "d3dupdate.exe"; "TaskMon"; "Explorer"
from the registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Terminates the following processes: irun4.exe; i11r54n4.exe; winsys.exe; bbeagle.exe; taskmon.exe
Deletes the following files: %System%\irun4.exe; %System%\i11r54n4.exe; %System%\winsys.exe; %System%\bbeagle.exe; %System%\taskmon.exe
Deletes the service, upnphost.
Adds the following lines to the %System%\drivers\etc\hosts file, so that any attempts to connect to some antivirus Web sites fail.
Remove it automatically from startup by antivirus (also check How To Remove section)Startup Optimizer.
Still have a problem? Ask for help at our discussion forum.