10,240 bytes, packed with UPX (both variants)
- Presence of the next files in %SYSTEM% folder:
a newly created executable file ????????.exe (10,240 bytes, see below)
- Presence of the next registry keys or entries:
???????? is a string of maximum 8 characters, and ? may be any letter (eg: etxovima.exe , afpsqg.exe)
and the exe file which the registry entry points to has 10,240 bytes.
where %WINDOWS% points to Windows folder (or WinNT on Windows NT based systems)
%SYSTEM% points to "System" folder on Windows 9x systems and "System32" folder on WinNT systems.
- automatic removal: let BitDefender delete/disinfect files found infected.
Patrik Vicol BitDefender Virus Researcher
The worm exploits the Microsoft LSASS Windows vulnerability for spreading.
Once run, the worm will do the following:
1. Attempts to delete Go.exe from current location
2. Creates the mutexes:
variant A: r10, rocket10
variant B: r10, u2, uterm5
3. Checks if the [HKLM \SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"WinUpdate"] entry exists
If the key exists:
Attempts to delete the registry entry: [HKLM\Software\Microsoft\Wireless\"Server"]
If the key doesn't exist, it attempts to create it:
4. Creates a randomly named copy of the worm in %SYSTEM% folder, as ????????.exe where ? may be any letter.
5. Creates the registry entry
in order to run at startup.
6. Executes the copy of the worm and terminates the current process.
7. Starts many threads, and enters an infinite loop, preventing the system from shutting down.
8. Opens ports: 113, 3067, 2041, allowing remote connection and for sending the worm, scans random IP addresses in order to infect unpatched systems.
Also opens port 6667, as it attempts to connect to a list of IRC servers where it listens for commands