VBS/Agent.NLD [Threat Name] go to Threat

VBS/Agent.NLD [Threat Variant Name]

Category trojan,worm
Size 14754 B
Detection created Feb 09, 2015
Signature database version 11148
Aliases Worm:VBS/Jenxcus.K (Microsoft)
  VBS/Autorun.worm.aapj (McAfee)
Short description

VBS/Agent.NLD is a worm that spreads via removable media. The worm serves as a backdoor. It can be controlled remotely.

Installation

When executed, the worm copies itself in some of the the following locations:

  • %temp%\­%malwarefilename%
  • %startup%\­%malwarefilename%

In order to be executed on every system start, the worm sets the following Registry entries:

  • [HKEY_CURRENT_USER\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "%malwarefilename%" = "wscript.exe /B "%malwarefilepath%""
  • [HKEY_LOCAL_MACHINE\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • "%malwarefilename%" = "wscript.exe /B "%malwarefilepath%""

The worm may set the following Registry entries:

  • [HKEY_LOCAL_MACHINE\­software]
    • %malwarefilename% = "true - %variable%"
    • %malwarefilename% = "false - %variable%"

A string with variable content is used instead of %variable% .

Spreading on removable media

VBS/Agent.NLD is a worm that spreads via removable media.


The worm copies itself into the root folders of removable drives using the following name:

  • %malwarefilename%

The worm may create the following files:

  • %removabledrive%\­%variable%.lnk

The file is a shortcut to a malicious file.


A string with variable content is used instead of %variable% .


The name of the file may be based on the name of an existing file or folder.

Information stealing

The worm collects the following information:

  • computer name
  • user name
  • operating system version
  • installed antivirus software
  • list of files/folders on a specific drive
  • list of running processes
  • list of disk devices and their type

The worm attempts to send gathered information to a remote machine.

Other information

The worm acquires data and commands from a remote computer or the Internet.


The worm contains a URL address. The HTTP protocol is used in the communication.


It can execute the following operations:

  • download files from a remote computer and/or the Internet
  • run executable files
  • upload files to a remote computer
  • send gathered information
  • terminate running processes
  • uninstall itself
  • execute shell commands
  • delete files
  • delete folders

Please enable Javascript to ensure correct displaying of this content and refresh this page.