------------------------------------------------------------------------------------------------------------------------------
A new variant of Koobface.worm has been seen spreading. It creates a copy of itself in %WINDOWS% directory as:
- freddy35.exe
(where %WINDOWS% is the Windows directory e.g. C:\Windows)
It connects to the following domains and IP to send informations and receive command through HTTP request.
- 1dns2[blocked].com
- temp2[blocked].com
- wm210[blocked].com
- open21[blocked].com
- er21[blocked].com
- websrv[blocked].com
- rserve[blocked].org
- 94.142.129.[blocked]
Issued commands includes downloading and installing new malware.
STARTONCE|http://www.blankpages.be/[blocked]/websrvx.exe
START|http://www.blankpages.be/[blocked]/captcha6.exe
STARTONCE|http://www.blankpages.be/[blocked]/kaka.exe
FBTARGETPERPOST|10
RAZLOG|1
#BLACKLABEL
Downloaded malwares are identified as PWS-LDPinch, Generic Downloader.x and Puper.
The worm sends messages with a link like the one shown below, to FaceBook users.
Unsuspecting users may click the link which redirects to a page, a snapshot of which is as follows:
The displayed page contains an ActiveX control, which tells the user that their Flash Player is out of date. An attempt to update links to the Koobface malware file. At the time of testing this file was called "flash_update.exe"
Upon execution of the flash_update.exe file displays an error message but infacts drops and executes a
The file is a downloader and makes connections to the following domains:
- y171108.com
- aibcvienna.org
- mediabspl.com
Upon execution, it downloads and opens an innocent picture(saved as %WinDir% \joke.gif) from the following web site:
- img.123greetings.com
(where %WinDir% is the default Windows directory, for example C:\WINNT, C:\WINDOWS etc.)
It also downloads malwares(identified as BackDoor-AWQ.b trojan and Generic Backdoor trojan) from the following remote server:
- ipluginu.cn
- currentsession.net
The downloaded malwares further download other malwares.
The following files are added in %WinDir% folder:
- %WinDir% \system32\splm\kbdsapi.dll
- %WinDir% \system32\splm\lmfunit32.dll
- %WinDir% \system32\splm\mcaserv32.dll
- %WinDir% \system32\splm\ncsjapi32.exe
- %WinDir%\system32\nScan\ecls.exe
- %WinDir%\system32\nScan\ekrn.exe
- %WinDir%\system32\nScan\ekrnAmon.dll
- %WinDir%\system32\nScan\ekrnEmon.dll
- %WinDir%\system32\nScan\ekrnEpfw.dll
- %WinDir%\system32\nScan\ekrnScan.dll
- %WinDir%\system32\nScan\em000_32.dat
- %WinDir%\system32\nScan\em001_32.dat
- %WinDir%\validate.inf
The following registry keys are added:
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\Intelli Mouse Pro Version 2.0B\StubPath: "%WinDir% \System32\splm\ncsjapi32.exe"
- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*Intelli Mouse Pro Version 2.0B*: "%WinDir% \System32\splm\ncsjapi32.exe"
- HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden: "2"
- HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\Run\Intelli Mouse Pro Version 2.0B: "%WinDir% \System32\splm\ncsjapi32.exe"
- HKEY_USERS\Software\Microsoft\Windows\CurrentVersion\RunOnce\*Intelli Mouse Pro Version 2.0B*: "%WinDir% \System32\splm\ncsjapi32.exe"
- HKEY_USERS\Software\Microsoft\Windows\nScan32\ExecuteDate: "14\8\2008"
Hosts file is modified to disable the compromised machine to access most of security web sites:
such as:
- ar.atwola.com
- my-etrust.com
- trendmicro.com
- norton.com
- nai.com
- sophos.com
- etc
The following files could be created depending on the variant (the filepath is hardcoded):
- C:\WINDOWS\fbtre6.exe
- C:\WINDOWS\mstre6.exe
- C:\WINDOWS\f49f4d98.dat
- C:\WINDOWS\t49f4d98.dat
- C:\WINDOWS\fmark2.dat
- C:\WINDOWS\tmark2.dat
The worm can connect to the following domain to do a HTTP post command and receive instructions to download and execute additional malware files:
- zzzping.com
Facebook users receives links to download the worm via Inbox messages from infected users while links are posted in MySpace commentaries when infected MySpace users log into their account.
Current variant of the worm is faked as a codec installer named as codecsetup.exe. When the worm is ran, a dialog box will pop up with the message "Error installing Codec. Please contact support"Symptoms -
Unexpected network connections to the previously mentioned domainMethod of Infection -
The worm spreads by fooling users into downloading and running it from links sent via Facebook and MySpace users.
Removal -
All Users:
Use specified engine and DAT files for detection and removal by your desktop Antivirus Program.
Modifications made to the system Registry and/or INI files for the purposes of hooking system startup, will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).
Aliases
- Net-Worm.Win32.Koobface.b (Kaspersky)
Courtesy: McaFee.com
No comments:
Post a Comment