検索:

About WORM_BAGLE Links

  • 投稿日:2005年9月27日
  • 執筆:ウイルス解析担当者
0


Just an additional info for WORM_BAGLE.DA.

After the bagle storm yesterday, we were still receiving reports that new bagle variants were being seen. So we decided to again download the links found on the WORM_BAGLE, TROJ_BAGLE and TROJ_DLOADER. I didnt find a new bagle variant, although i’m still downloading from the links, what I found out is a completely different thing.

On WORM_BAGLE.DA download links, there are 8 download links which connects to a web.php, 2 links were already down while the other 6 were downloaded successfully.

http://{blocked}/web.php

Inside the file web.php, are the email addresses used by WORM_BAGLE in its FROM FIELD. This may also be the reason why I couldnt simulate the E-Mail propagation of the worm since I tested it on an environment without internet connection. Each download link contains a different domain and name.

On one web.php



  • tom@atomate.com
  • tom@atomco.com
  • tom@atomcreation.com
  • tom@atomdigitaldesign.co.uk
  • tom@atomic.com.au
  • tom@atomic4.com
  • tom@atomicamps.com
  • tom@atomicblender.com
  • tom@atomicdesign.tv
  • tom@atomicdesigninc.com
  • tom@atomicdog.com
  • tom@atomicmarketing.com
  • tom@atomicspatula.com
  • …


and on another



  • shkim301@korea.com
  • shkim303@ktsolution.co.kr
  • shkim303@ktsolutions.co.kr
  • shkim304@hanmail.net
  • shkim304@samsung.co.kr
  • shkim3057@hanmail.net
  • shkim30@daewoo.com
  • shkim30@famecs.co.kr
  • shkim30@hanmail.net
  • …


yet on another



  • kathleen@kent.net
  • kathleen@kenwoodcc.net
  • kathleen@keogh.net.au
  • kathleen@kephart.net
  • kathleen@keplers.com
  • kathleen@keromail.com
  • kathleen@kerraisle.com
  • kathleen@kerstondesignteam.com
  • kathleen@kertzmanweil.com
  • …
Also WORM_BAGLE.DA downloads a file from this link http://{blocked}/sss.php and saves it as re_file.exe. However the link is still down as of the moment.

続きを読む
Tags: スミッシング

VIRUS Hitches A Ride With WORM

  • 投稿日:2005年9月27日
  • 執筆:ウイルス解析担当者
0



Lately we have been finding some malwares wherein a fast spreading WORM like REATLE is carrying a VIRUS in its body.

I dont know if this is something old or new, but all I can think of is that this technique of WORM with a VIRUS maybe used by some malware authors to increase the infection rate of their viruses. Please see below



  • A WORM is created by malware author
  • Malware Author infects the WORM with a VIRUS
  • WORM is spread carrying with it the VIRUS
  • Upon execution of the WORM, the VIRUS also infects other files in the system.


This way the VIRUS carried by the WORM can infect more files while getting a free ride accross the networks via its WORM where it can again infect other files.

続きを読む

A New Exploit for Mozilla Browsers

  • 投稿日:2005年9月27日
  • 執筆:ウイルス解析担当者
0

Berend-Jan Wever, aka “Skylined”, released an exploit code for the IDN host name heap buffer overrun vulnerability in Mozilla browsers. Mozilla browsers include (Firefox, Mozilla, and Netscape). You can find the source code of the exploit here.


http://www.milw0rm.com/id.php?id=1224

These two lines are worth noticing in the exploit code.


One sploit to rule them all, One sploit to find them,
One sploit to bring them all and to port 28876 bind them.

If succesful, the exploit will set up a listening port at 28876. The exploit was tested to work in Firefox 1.0.6.

Skylined is previously known for his InternetExploiter series of exploits against MS IE and the Alpha 2 alphanumeric shellcode encoder, among others.

Firefox fix

Firefox 1.0.7 has been released to address this vulnerability, and is now available for download at the Mozilla Foundation homepage. MozillaZine also issued a security bulletin announcing the release of the Firefox fix. To quote the bulletin


“The Mozilla Foundation previously issued a patch for Firefox 1.0.6 that protected users against the IDN link buffer overflow flaw at the expense of removing support for IDNs. Firefox 1.0.7 has a more permanent solution that does not involve disabling IDN functionality and any users who installed the patch will find that IDN support is restored when they upgrade.”

続きを読む
Tags: スミッシング

Trojan Dropper-Worm Mytob Tandem

  • 投稿日:2005年9月27日
  • 執筆:ウイルス解析担当者
0

The tandem of a Trojan and a worm is now becoming a favorite technique of malware authors for a more successful propagation or attack of their malicious programs. The combination of a Trojan and a worm started from the Troj_Bagle downloading the Worm_Bagle. However, another example of the trojan-worm tandem technique being noticed is in this new TROJ_DROPPER.LV and WORM_MYTOB.KM.

Instead of downloading the Mytob worm, TROJ_DROPPER.LV drops a copy of WORM_MYTOB.KM and a WORM_SDBOT.CHA in the affected system. Then, WORM_MYTOB.KM mass mails an email message containing a link which points to TROJ_DROPPER.LV. Thus, when a user clicks on the link found in the email, the Trojan dropper is downloaded.

This technique can bypass the filters used in email scanning applications that scans or blocks malicious attachments. A good social engineering would then complete the intention of the malware enticing a user to click on the malicious link found in the mail.

The URL link was submitted to the web-blocking query so we have no problem when a user clicks on the malicious link of this malware since it is already blocked in the server.

続きを読む
Tags: スミッシング

PE_BOBAX Surf Network Through Other WORMS

  • 投稿日:2005年9月27日
  • 執筆:ウイルス解析担当者
0

At the end of my boring shift, e mails started arriving and soon I was wide awake.
The emails contained in it a copy of a WORM_MYTOB, this is easily distinguished because of the hellmsn.exe drop file and other common WORM_MYTOB traits…or so I thought. :)
After I few minutes of looking at the malware body, I realized that it is again a WORM infected with PE_BOBAX.
At first I thought this was just a technique to raise the infection rate of PE_BOBAX. Now I’m realizing a new angle on this, it may also be done to avoid detection of the Infector itself (PE_BOBAX).
This is because most AV engineers would then be fooled to detect the INFECTED WORM, thus the nasty little bugger (I’m talking about PE_BOBAX here) that is carried by the WORM gets away, free to infect other files in the user’s system.
So far the most successfull in spreading is the one infected with WORM_MYTOB.

続きを読む
Tags: スミッシング
Page 230 of 230 « ‹ 229230


  • 個人のお客さま向けオンラインショップ
  • |
  • 法人のお客さま向け直営ストア
  • |
  • 販売パートナー検索
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • 電子公告
  • ご利用条件
  • プライバシーポリシー
  • Copyright © 2021 Trend Micro Incorporated. All rights reserved.