Bremer24 Logo

Neuer Wurm ''Bobax'' aufgetaucht: Gefährlicher als ''Sasser''

Sie befinden sich: Home > News Archiv > Virus > Neuer Wurm ''Bobax''...

Nun ist noch ein Wurm, der ähnliche Sicherheitslücken nutzt wie 'Sasser', aufgetaucht. Dieser neue Virus namens 'Bobax' wird als noch gefährlicher eingestuft.

Der Wurm greift ebenfalls über die Sicherheitslücke 'LSASS' an, von der Microsoft aber bereits seit April einen Patch anbietet. Einige Internet-User haben ihn aber wohl immer noch nicht installiert.

Der Wurm ist noch tückischer: Er überprüft das System auf Win XP und nistet sich dann per Hintertür ein, die nach Angaben der LURHQ (IT-Sicherheitsunternehmen) zur Spam-Verbreitung von Müll-Versendern dient. Die Größe der Verbreitung ist noch unklar.

Quelle: www.netzeitung.de

INFO

Bobax Trojan Analysis
by LURHQ Threat Intelligence Group

URL
http://www.lurhq.com/bobax.html

Release Date
May 17, 2004

Bobax is a semi-automated spreading trojan. Similar in concept to bots like Agobot, the trojan can spread unattended, but only when given the command to do so by its author. Its primary purpose appears to be to create a massive automated spamming network. Unlike proxy trojans which require the spammer to connect and send each individual piece of mail, Bobax sends the mail using a template and a list of email addresses. This has the benefit of offloading almost all the bandwidth requirements of spamming onto the trojaned machines, allowing the spammer to operate with minimal cost.

The dropper file is named svc.exe. When run, it extracts a DLL file from its executable and injects it into the Explorer process space.

When executed for the first time, the Bobax trojan follows these steps:

  • Tests for the presence of mutex 00:24:03:54A9D. Exits if it exists, creates it if it doesn't
  • Attempts to delete files from the Temp directory with a tilde prefix, cleaning up after the infection process
  • Copies itself to the Windows system directory and adds to the following registry keys:
    	HKLMSoftwareMicrosoftWindowsCurrentVersionRun
    	HKLMSoftwareMicrosoftWindowsCurrentVersionRunServices
     		[keyname] => [path to executable file]
    
    The registry key name is an 8-digit hexidecimal psuedo-random number generated from the volume ID of the disk where the system directory resides. The exe name prefix is a sequence of 5-14 randomly generated lowercase letters.

  • Attempts to contact the the following sites:

    chilly.no-ip.info
    kwill.hopto.org
    cheese.dns4biz.org
    butter.dns4biz.org

    The requested URL is:

    http://hostname/reg?u=[8-digit hex id]&v=114

    The User-agent provided by the trojan when connecting to the control server is:

    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)

    If successful, the trojan will parse the returned content looking for commands from this server. These commands may or may not be present depending on the spammer's schedule:
    	exe - Download and execute a program
    	scn - Scan and infect hosts using the MS04-011 exploit
    	scs - Stop scanning
    	prj - Send spam from template email and list of addresses provided
     
The scanning thread works as follows:
  • An HTTP listener is set up on a random numbered port between 2000 and 62000
  • 128 threads are started to scan for vulnerable hosts:
    • 32 threads will scan the same /16 subnet as the local host
    • 32 threads will scan the same /8 subnet as the local host
    • 64 threads will scan randomly chosen Internet addresses
  • The scan is actually performed on TCP port 5000 - if the port is found open this is usually indicative of a Windows XP host. The trojan will then connect to port 445 and execute the LSASS exploit against the vulnerable host. The trojan file will be served from the internal HTTP process and the target host will be infected and under the control of the spammer.

It is unclear why the trojan author chose to only infect Windows XP systems. It could be for simplicity - the exploit will crash a system if the target OS and patchlevel does not match certain offsets in the exploit code, so limiting the target platform means you only have to send one offset. It could also be the spammer prefers to operate using home-user systems rather than corporate servers which would be more likely to be running Windows 2000.

The internal workings of the code appear similar to spam trojans we have seen before - most recently in the "Minit" trojan. This could be an indication that they at least share some of the same code if they are not written by the same author.

Update: May 19, 2004
At this time, two more variants have been discovered. Bobax.B is a minor variant with additional websites to contact. It also attempts to download files from other websites as a bandwidth-speed test. Bobax.C has introduced the ability to spread by also exploiting the RPC/DCOM vulnerability used by the Blaster worm (MS03-026/MS03-039) on TCP port 135.

Variant Size MD5 Compile Date
A 20,480 b0825423585db91f845cf77cbeb91774 Sat May 15 18:31:56 2004
B 21,504 a1ed86348c7c2540244dc87dea3db5e9 Sun May 16 22:13:38 2004
C 22,528 18a3787cbb84b4215c28a3d7ba20213f Tue May 18 00:09:19 2004


Manual Removal
The Bobax trojan injects itself into the Explorer process memory, so using the Task Manager, kill the explorer.exe process (it should restart, sans Bobax). Remove the registry keys that match the pattern above and any files associated with the trojan and reboot the computer. Install the MS04-011 patch (and the MS03-039 patch if needed) to prevent reinfection.

About LURHQ Corporation
LURHQ Corporation is the trusted provider of Managed Security Services. Founded in 1996, LURHQ has built a strong business protecting the critical information assets of more than 400 customers by offering managed intrusion prevention and protection services. LURHQ's 24X7 Incident Handling capabilities enable customers to enhance their security posture while reducing the costs of managing their security environments. LURHQ's OPEN Service Delivery™ methodology facilitates a true partnership with customers by providing a real time view of the organization's security status via the Sherlock Enterprise Security Portal. For more information visit
http://www.lurhq.com.

Copyright (c) 2004 LURHQ Corporation Permission is hereby granted for the redistribution of this document electronically. It is not to be altered or edited in any way without the express written consent of LURHQ Corporation. If you wish to reprint the whole or any part of this document in any other medium excluding electronic media, please e-mail
advisories@lurhq.com for permission.

Disclaimer
The information within this paper may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties implied or otherwise with regard to this information. In no event shall the author be liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

Feedback
Updates and/or comments to:
LURHQ Corporation
http://www.lurhq.com/
advisories@lurhq.com



aufgetaucht neuer wurm sasser gefährlicher

Kommentar schreiben

Teilen Sie uns Ihre Meinung mit. Ihr Kommentar wird nach Pruefung veroeffentlicht.

Pflichtfelder


Neusten News in der Kategorie "Virus"

• Neue Android-Malware manipuliert Kontaktliste für Fake-Anruf...
Eine neue Android-Malware namens RoarBat fügt gefälschte Kon...
• Wie ein Komma die Defender-Sicherheit aushebelt
Ein simples Komma genügt, um die Sicherheitsmechanismen des Micro...
• Handy-Virus: Jedes Java“-Handy ist gefährdet – Virus verschi...
Mit dem Namen "Trojan-SMS.J2ME.RedBrowser.a" wurde der erste Handy-Vir...
• Trojaner ''Meheerwar'' im Umlauf - Er öffnet und schließt u....
Zurzeit ist der Trojaner "Meheerwar" im Internet unterwegs. Der Virus ...
• Mit gefälschten Februar-Rechnungen der Telekom wird Trojaner...
Seit ein paar Tagen finden viele Internetnutzer in ihren Internetbrief...
• Viren: Neues Angriffsziel sind Handys und Konsolen
Antiviren-Spezialisten haben im Jahr 2005 nur zwei größere Virenausbrü...
• Trojaner überschreibt Google AdSense-Werbung
Ein Trojaner überschreibt Google AdSense-Anzeigen auf Websites und in ...
• Gefährlicher Virus verbreitet sich als Messenger-Update
Ein neuer Virus breitet sich derzeit im Internet aus. Dieser Virus hei...
• Neuer Weihnachtswurm im Umlauf
Seit kurzem ist ein neuer Weihnachtswurm im Umlauf, dies meldet der An...
• Sober-Virus: Anti-Viren-Experten entschlüsseln den Wurm
Mit Hilfe von E-Mails, die angeblich vom BKA waren, hat sich der Sober...