Help!
  • cooldoc
    #2117
    This section contains the description and advanced technical information

    W32/Tilebot-GE is an internet worm and IRC backdoor for the Windows platform.

    W32/Tilebot-GE spreads to other network computers by exploiting common buffer overflow vulnerabilities, including: LSASS (MS04-011), RPC-DCOM (MS04-012), WKS MS03-049) (CAN-2003-0812), PNP (MS05-039) and ASN.1 (MS04-007) and by copying itself to network shares.

    W32/Tilebot-GE runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.

    When W32/Tilebot-GE is first run, it copies itself to <Windows>\win325b.exe.

    The file win325b.exe is registered as a new service named "win32socket", with a display name of "win32 socket and a startup type of automatic, so that it is started automatically during system startup. Registry entries are created under:

    HKLM\SYSTEM\CurrentControlSet\Services\win32socket\

    The worm creates the clean file \drivers\oreans32.sys . This file oreans32.sys is registered as a new service named "oreans32", with a display name of "oreans32".

    Registry entries are created under:

    HKLM\SYSTEM\CurrentControlSet\Services\oreans32\

    Registry entries are set as follows, affecting system security:

    HKLM\SOFTWARE\Microsoft\Ole
    EnableDCOM
    N

    HKLM\SOFTWARE\Microsoft\Security Center
    AntiVirusOverride
    1

    HKLM\SOFTWARE\Microsoft\Security Center
    FirewallOverride
    1

    HKLM\SYSTEM\CurrentControlSet\Control\Lsa
    restrictanonymous
    1

    HKLM\SYSTEM\CurrentControlSet\Services\RemoteRegistry
    Start
    4

    HKLM\SYSTEM\CurrentControlSet\Services\TlntSvr
    Start
    4

    HKLM\SYSTEM\CurrentControlSet\Services\wscsvc
    Start