Class | Net-Worm |
Platform | Win32 |
Description |
Technical DetailsRandon is a Virus-Worm distributed via IRC-channels and LANs with shared resources. When executed this worm installs its components into the subdirectory zxz and/or zx in the Windows system directory and registers its main file and the mIRC client in the Windows registry auto-run key (below):
Randon then executes the above key and hides the process via the HideWIndows utility. Randon connects to the IRC-server and executes its scripts. In addition to DDoS attacks and IRC channel flooding, Randon scans port 445 of other IRC clients.
Distribution "admin", "administrator", "root", "admin", "test", "test123", "temp", "temp123", "pass", "password", "changeme" If a connection is successful the worm opens a socket on port 445, transfers the trojan horse TrojanDownloader.WIn32.APher.gen and runs it. This trojan downloads a self-extracting archive of the worm’s ‘full’ version from “www.q8kiss.net” and installs it in the system. Additional information The Randon worm consists of the following components:
|
Find out the statistics of the threats spreading in your region |