Win32.Sober.AD@mm
The presence of the WinSecurity directory in the %WINDIR% folder.
The presence in the %WINDIR%\WinSecurity folder of the following files :
The presence in the %WINDIR%\WinSecurity folder of any other file with extension one of the following :
for example :
Presence of the following key in the Windows Registry :
"HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENT VERSION\RUN\ Windows" = C:\WINNT\WinSecurity\services.exe
The virus comes in form of an e-mail with variable subject, body or attachement name. It’s written in Visual Basic 6.
When the virus is launched, an error box appears on the screen, looking like this:

thus leading the victim to belive that the executable contained an error and everything it’s ok.
Then, the virus creates the folder WinSecurity in the %WINDIR% folder and drops the above files in it. It then executes the executable just dropped named
Then executes
and finally
Each of these processes play a specific role :
has been deleted and rewrites it if this is the case
Files with the following extension are scanned:
stm slk inbox imb csv bak imh x
html imm imh cms nws vcf ctl dhtm cgi pp ppt msg jsp oft vbs uin
ldb abc pst cfg mdw mbx mdx mda
adp nab fdb vap dsp ade sln dsw
mde frm bas adr cls ini ldif log mdb xml wsh tbb abx abd adb pl
rtf mmf doc ods nch xls nsf txt
wab eml hlp mht nfo .OK
pmr phtm stm slk inbox imb csv
bak imh xhtml imm imh cms nws
vcf ctl dhtm cgi pp ppt msg jsp
oft vbs uin ldb abc pst cfg mdw
mbx mdx mda adp nab fdb vap dsp
ade sln dsw mde frm bas adr cls
ini ldif log mdb xml wsh tbb abx abd adb pl rtf mmf doc ods nch
xls nsf txt wab eml hlp mht nfo
php asp shtml db
It creates the registry key
HKLM\SOFTWARE\MICROSOFT\WINDOWS\CURRENT VERSION\RUN\
Windows = C:\WINNT\WinSecurity\services.exe
in order to assure it will be run at every OS startup. If this key is deleted from the registry while the virus is running in memory, it will try to put it back, having a dedicated thread to do this job.
The virus tries to download a file from the Internet and run it:
The worm implements it’s own SMTP engine for spreading via e-mail.
The possible mail subject includes one of the following :
The possible mail content includes one of the following :
The virus also spoofs the sender’s domain address, wich will appear to originate from one of the following domains
The virus then searches list of active processes for process names from the list below :
and tries to kill them.
If any removal tool is running, in order to detect the presence of Sober, the worm will close it, and display the following message, like it would be a message from the removal tool:

For Win XP operating systems, the virus also tries to patch the tcpip.sys driver to allow it to open a virtually unlimited number of connections from the victim’s computer (since in Windows XP SP2 the number of simultaneously open connections from a host is restricted). This may result in asking the user to restart his computer in order for the patch to take effect.
SHARE
THIS ON