This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.
This signature detects W32.Licum activity on compromised machine.
When executed, the worm creates the following mutex to ensure that it is the only copy of the threat running on the compromised computer:
The worm then attempts to download files from the following URLs:
The worm may also connect to the following network address to open a back door:
The worm injects itself into the following process to disable Windows File Protection:
The worm then generates a random list of IP addresses and may spread by exploiting the Microsoft Windows DCOM RPC Interface Buffer Overrun Vulnerability (BID 8205) through TCP port 139.
The worm infects executable files on the compromised computer.