W32/Rbot-CZ is a worm which attempts to spread to remote network shares. It also contains backdoor Trojan functionality, allowing unauthorised remote access to the infected computer via IRC channels while running in the background as a service process.
W32/Rbot-CZ spreads to network shares with weak passwords and via network security exploits as a result of the backdoor Trojan element receiving the appropriate command from a remote user.
W32/Rbot-CZ copies itself to the Windows system folder as WINSYS32.EXE and creates entries at the following locations in the registry so as to run itself on system startup, trying to reset them every minute:
W32/Rbot-CZ sets the following registry entries, trying to reset them every 2 minutes.
HKLM\SOFTWARE\Microsoft\Ole\EnableDCOM = "N"
HKLM\SYSTEM\CurrentControlSet\Control\Lsa\restrictanonymous = "1"
W32/Rbot-CZ tries to delete the C$, D$, E$, IPC$ and ADMIN$ network shares on the host computer every 2 minutes.
W32/Rbot-CZ attempts to terminate certain processes related to anti-virus and security programs including REGEDIT.EXE, MSCONFIG.EXE and NETSTAT.EXE.