My Bitdefender
  • 0 Shopping Cart

SHARE
THIS ON

Facebook Twitter Google Plus

Win32.Bagle.{J-K}@mm

MEDIUM
LOW
12888
(Bagle, Beagle)

Symptoms

Symptoms:
- The registry keys
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\ssate.exe with value
"C:\Windows\System\irun4.exe"
HKCU\Software\DateTime\frun with value "1"
- Listening on port 2745.
- Presence of the following files:
C:\Windows\System\irun4.exe, 12888 bytes
C:\Windows\System\irun4.exeopen, 12888 to 12500 bytes

Removal instructions:

Automatic removal
Let BitDefender delete infected files

Analyzed By

Daniel IonitaVirus Researcher

Technical Description:

The mass-mailer is aproximately 12888 bytes in length, comes as attachement in zip
form with "store" method and password protected or (with a 50% chance)
as an attachement with .pif or .exe extension. It is packed with UPX.

It arrives in an email in the following format:

From: [forged email address, starts with one of the following:]
management@
administration@
staff@
noreply@
support@
Subject: [one of the following]
E-mail account security warning.
Notify about using the e-mail account.
Warning about your e-mail account.
Important notify about your e-mail account.
Email account utilization warning.
Notify about your e-mail account utilization.
E-mail account disabling warning.
Body:

Part1: [one of the following]
Dear user of %s,
Dear user of %s gateway e-mail server,
Dear user of e-mail server "%s",
Hello user of %s e-mail server,
Dear user of "%s" mailing system,
Dear user, the management of %s mailing system wants to let you know that,

Part2: [one of the following]
Your e-mail account has been temporary disabled because of unauthorized access.
Our main mailing server will be temporary unavaible for next two days,
to continue receiving mail in these days you have to configure our free
auto-forwarding service.
Your e-mail account will be disabled because of improper using in next
three days, if you are still wishing to use it, please, resign your
account information.
We warn you about some attacks on your e-mail account. Your computer may
contain viruses, in order to keep your computer and e-mail account safe,
please, follow the instructions.
Our antivirus software has detected a large ammount of viruses outgoing
from your email account, you may use our free anti-virus tool to clean up
your computer software.
Some of our clients complained about the spam (negative e-mail content)
outgoing from your e-mail account. Probably, you have been infected by
a proxy-relay trojan server. In order to keep your computer safe,
follow the instructions.

Part3: [one of the following]
For more information see the attached file.
Further details can be obtained from attached file.
Advanced details can be found in attached file.
For details see the attach.
For details see the attached file.
For further details see the attach.
Please, read the attach for further details.
Pay attention on attached file.

Part4: [one of the following]

The %name% team
http://www.%name%
The Management,
Sincerely,
Best wishes,
Have a good day,
Cheers,
Kind regards,

Please note that %name% will be replaced with the recepient\'s mail
server name.

Example: if the message will be send to someone@yahoo.com, then the
message will end with something like this:

The Yahoo.com team.

Part5: [optional, if the attachement will be in zip form, one of the
following]

For security reasons attached file is password protected. The password
is "%pass%".
For security purposes the attached file is password protected.
Password is "%pass%".
Attached file protected with the password for security reasons.
Password is %pass%.
In order to read the attach you have to use the following password:
%pass%.

Please note that %pass% is variable, 5 characters in length and
numeric only.

Attachment: [one of the following].[zip, exe or pif]
Attach
Information
Readme
Document
Info
TextDocument
TextFile
MoreInfo
Message

Upon execution, it drops only two files in the Windows\\System
directory (as opposed to the previous variants):

- irun4.exe is the virus in UPX form.

- irun4.exeopen, may be the archived and password protected version of
the virus or a copy of iru4.exe.

The virus will not inject itself in the "explorer.exe" process anymore
in this strain.

The worm checks the date and if the date is after 25 April 2005 the
worm will exit, deleting all registry entries and killing itself from
memory.

The worm will create the registry keys described in the "Symptoms"
sections, and starts a backdoor that will listen for commands on the
port 2745.

The worm will create a mutex and create a series
of threads, performing various functions:

- every 100 milliseconds kill all proces with the name:
ATUPDATER.EXE
AVWUPD32.EXE
AVPUPD.EXE
LUALL.EXE
DRWEBUPW.EXE
ICSSUPPNT.EXE
ICSUPP95.EXE
UPDATE.EXE
NUPGRADE.EXE
ATUPDATER.EXE
AUPDATE.EXE
AUTODOWN.EXE
AUTOTRACE.EXE
AUTOUPDATE.EXE
AVXQUAR.EXE
CFIAUDIT.EXE
MCUPDATE.EXE
NUPGRADE.EXE
OUTPOST.EXE
AVLTMAIN.EXE

- every 2000 milliseconds check if connected to internet.

- every aproximately 28 hours the worm will connect to the
following addresses under the name "li":

http://postertog.de
http://www.gfotxt.net
http://www.maiklibis.de

The worm will search the host computer for the filenames with the
following extensions, extracting email addresses from them:

.wab
.txt
.htm
.html
.dbx
.mdx
.eml
.nch
.mmf
.ods
.cfg
.asp
.php
.adb
.sht

The worm will not send itself to addresses containing the following
strings:

@hotmail.com
@msn.com
@microsoft
@avp.
noreply
local
root@
postmaster@

The virus will search for directories on the harddisk whose names
start with "shar" and then copy itself to those directories under the
following names:

Microsoft Office 2003 Crack, Working!.exe
Microsoft Office XP working Crack, Keygen.exe
Microsoft Windows XP, WinXP Crack, working Keygen.exe
Porno Screensaver.scr
Porno, sex, oral, anal cool, awesome!!.exe
Porno pics arhive, xxx.exe
Serials.txt.exe
Windown Longhorn Beta Leak.exe
Windows Sourcecode update.doc.exe
XXX hardcore images.exe
Opera 8 New!.exe
WinAmp 5 Pro Keygen Crack Update.exe
WinAmp 6 New!.exe
Matrix 3 Revolution English Subtitles.exe
Adobe Photoshop 9 full.exe
Ahead Nero 7.exe
ACDSee 9.exe

Thus, the worm threatens the P2P networks as well.

Update: just received news about a new strain, Win32.Bagle.K@mm. The only difference at this time seems to be the user name that connects to the mentioned sites, from "li" to "beagle2_proclivity" and the name of the dropped file, that changed from "irun4.exe" to "winsys.exe" (of course, irun4.exeopen changed too to winsys.exeopen).