Windows 2000, Windows XP, Windows Server 2003
Propagates via removable drives, Propagates via software vulnerabilities
This is the Trend Micro detection for files that propagate via vulnerablity in Windows Shell that could allow arbitrary commands to be executed.
This Worm drops file(s)/component(s) detected as RTKT_STUXNET.A. It also drops non-malicious files. It drops copy(ies) of itself in all removable drives. It connects to certain URL(s) to check for an internet connection. It hooks certain APIs to hide files with .TMP and .LNK extensions. It drops the file named Copy of Shortcut to.lnk in all removable drives. Trend Micro detects is as EXPL_CPLNK.SM.
This is the Trend Micro detection for files that exhibit certain behaviors.
22 Jul 2010
Drops files, Connects to URLs or IP addresses
This worm drops the following file(s)/component(s):
(Note: %System% is the Windows system folder, which is usually C:\Windows\System on Windows 98 and ME, C:\WINNT\System32 on Windows NT and 2000, or C:\Windows\System32 on Windows XP and Server 2003.)
It drops the following non-malicious files:
(Note: %Windows% is the Windows folder, which is usually C:\Windows or C:\WINNT.)
This worm drops the following copy(ies) of itself in all removable drives:
This worm connects to the following URL(s) to check for an Internet connection:
More information on this vulnerability can be found below:
This is the Trend Micro detection for:
It does the following:
22 Jul 2010
23 Jul 2010
For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.
Remove malware files dropped/downloaded by WORM_STUXNET.SM
Scan your computer with your Trend Micro product and note files detected as WORM_STUXNET.SM
Restart in Safe Mode
Search and delete these files
Search and delete the file detected as WORM_STUXNET.SM
Download and apply this security patch Refrain from using these products until the appropriate patches have been installed. Trend Micro advises users to download critical patches upon release by vendors.
Note: To identify STUXNET-infected systems within a network, administrators can use Trend Micro's special STUXNET Scanner Tool. For more details, download and extract the package and refer to the tool's incorporated text file.