This section contains the description and advanced technical information
W32/Tilebot-GE is an internet worm and IRC backdoor for the Windows platform.
W32/Tilebot-GE spreads to other network computers by exploiting common buffer overflow vulnerabilities, including: LSASS (MS04-011), RPC-DCOM (MS04-012), WKS MS03-049) (CAN-2003-0812), PNP (MS05-039) and ASN.1 (MS04-007) and by copying itself to network shares.
W32/Tilebot-GE runs continuously in the background, providing a backdoor server which allows a remote intruder to gain access and control over the computer via IRC channels.
When W32/Tilebot-GE is first run, it copies itself to <Windows>\win325b.exe.
The file win325b.exe is registered as a new service named "win32socket", with a display name of "win32 socket and a startup type of automatic, so that it is started automatically during system startup. Registry entries are created under:
The worm creates the clean file \drivers\oreans32.sys . This file oreans32.sys is registered as a new service named "oreans32", with a display name of "oreans32".
Registry entries are created under:
HKLM\SYSTEM\CurrentControlSet\Services\oreans32\
Registry entries are set as follows, affecting system security: