[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

UNIRAS ALERT - 05/04 - Malicious Software Report - W32/Bagle.b@MM



- ----------------------------------------------------------------------------------
      UNIRAS (UK Govt CERT) ALERT - 05/04 dated 17.02.04  Time: 15:50  
 UNIRAS is part of NISCC (National Infrastructure Security Co-ordination Centre)
- ---------------------------------------------------------------------------------- 
  UNIRAS material is also available from its website at www.uniras.gov.uk and
         Information about NISCC is available from www.niscc.gov.uk
- ----------------------------------------------------------------------------------

Title
=====
Malicious Software Report - W32/Bagle.b@MM

Detail
====== 

UNIRAS comment - This worm is spreading rapidly.  The following is taken from the Network Associates URL
http://vil.nai.com/vil/content/v_101030.htm



This is a mass-mailing worm with the following characteristics:

contains its own SMTP engine to construct outgoing messages 
harvests email addresses from the victim machine 
the From: address of messages is spoofed 
contains a remote access component (notification is sent to hacker) 
Users are reminded that the scanning of compressed files (default option) is required for detection.

As for its predecessor , this worm checks the system date. If it is the 25th February 2004 or later, the worm simply exits and does
not propagate.

If the date check is satisfied, the virus executes the standard Windows Sound Recorder (SNDREC32.EXE) application. The virus copies
itself into the Windows system directory as AU.EXE, for example:

C:\WINNT\SYSTEM32\AU.EXE 
The following Registry key is added to hook system startup:

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\
Run "au.exe" = C:\WINNT\SYSTEM32\AU.EXE 
Additionally, the following two Registry keys are added:

HKEY_CURRENT_USER\Software\Windows2000 "frn" 
HKEY_CURRENT_USER\Software\Windows2000 "gid" 

 
Top of Page 

Symptoms  
Port 8866 (TCP) open on the victim machine 
Outgoing messages matching the described characteristics 
Files/Registry keys as described 
 
Top of Page 

Method Of Infection  
Mail Propagation 
This virus constructs messages using its own SMTP engine. Target email addresses are harvested from files with the following
extensions on the victim machine:

.WAB 
.TXT 
.HTM 
.HTML 
The virus spoofs the sender address by using a harvested address in the From: field.

Messages are constructed as follows:

- From : (address is spoofed)
Subject : ID (string)... thanks
Body :
Yours ID (string2)
- --
Thank

Attachment : randomly named binary (11,264 bytes) with .EXE attachment

Where "string" and "string2" are random strings.

The virus avoids sending itself to addresses containing the following:

@hotmail.com 
@msn.com 
@microsoft 
@avp. 
Remote Access Component 
The virus listens on TCP port 8866 for remote connections.  A notification is sent to the author(s) via HTTP. A GET request
(containing the port number and "id") is sent to a PHP script on remote server(s). Users are recommended to block access to the
following domains:

http://www.47df.de 
http://www.strato.de 
http://intern.games-ring.de 
http://www.strato.de 

Other links http://www.sophos.com/virusinfo/analyses/w32tanxa.html 

http://www.f-secure.com/v-descs/bagle_b.shtml

http://securityresponse.symantec.com/avcenter/venc/data/w32.alua@xxxxxxx
- ----------------------------------------------------------------------------------

For additional information or assistance, please contact the HELP Desk by 
telephone or Not Protectively Marked information may be sent via 
EMail to: uniras@xxxxxxxxxxxx

Office Hours:
Mon - Fri: 08:30 - 17:00 Hrs
Tel: +44 (0) 20 7821 1330 Ext 4511
Fax: +44 (0) 20 7821 1686

Outside of Office Hours:
On Call Duty Officer:
Tel: +44 (0) 20 7821 1330 and follow the prompts

- ----------------------------------------------------------------------------------
UNIRAS wishes to acknowledge the contributions of NAI for the information 
contained in this Briefing. 
- ----------------------------------------------------------------------------------
This Briefing contains the information released by the original author. Some 
of the information may have changed since it was released. If the vulnerability 
affects you, it may be prudent to retrieve the advisory from the canonical site 
to ensure that you receive the most current information concerning that problem.

Reference to any specific commercial product, process, or service by trade 
name, trademark manufacturer, or otherwise, does not constitute or imply 
its endorsement, recommendation, or favouring by UNIRAS or NISCC.  The views 
and opinions of authors expressed within this notice shall not be used for 
advertising or product endorsement purposes.

Neither UNIRAS or NISCC shall also accept responsibility for any errors 
or omissions contained within this briefing notice. In particular, they shall 
not be liable for any loss or damage whatsoever, arising from or in connection 
with the usage of information contained within this notice.

UNIRAS is a member of the Forum of Incident Response and Security Teams (FIRST) 
and has contacts with other international Incident Response Teams (IRTs) in 
order to foster cooperation and coordination in incident prevention, to prompt 
rapid reaction to incidents, and to promote information sharing amongst its 
members and the community at large. 
- ----------------------------------------------------------------------------------
<End of UNIRAS Briefing>