W32/MyTob.PF@mm
Analysis
- Sample is packed with PESpin.
- Creates a mutex named H-E-L-L-B-O-T-P-O-L-Y-M-O-R-P-H to make sure that there is only one instance of the worm running.
- Copies itself to the System folder as dd.exe.
- Adds the following value to run itself at each Windows startup:
SYSTEM = "dd.exe"
to the following subkeys:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
Email Propagation
- Gathers email addresses from the Microsoft Windows Address Book and from files that contain any of the following extensions:
- Htm
- Sht
- Php
- Jsp
- cgi
- Asp
- Dbx
- Tbb
- Adb
- pl
- wab
- Avoids sending emails to addresses that contain any of the strings in its specified list, which includes the following:
- avp
- syma
- icrosof
- msn.
- hotmail
- panda
- sopho
- borlan
- inpris
- example
- mydomai
- nodomai
- ruslis
- .gov
- gov.
- .mil
- foo.
Also avoided are email addresses having the following strings in their domain names:
- berkeley
- unix
- math
- bsd
- mit.e
- gnu
- fsf.
- ibm.com
- kernel
- linux
- fido
- usenet
- iana
- ietf
- rfc-ed
- sendmail
- arin.
- ripe.
- isi.e
- isc.o
- secur
- acketst
- pgp
- tanford.e
- utgers.ed
- mozilla
- Searches for SMTP servers by prepending the following strings to domain names that it finds:
- mx.
- mail.
- smtp.
- mx1.
- mxs.
- mail1.
- relay.
- ns.
- gate.
- Uses its own SMTP engine to send itself to email addresses that it finds.
- The email has the following format:
From: can be any of various strings, such as:
- john
- josh
- alex
- michael
- james
- mike
- kevin
- david
- george
- sam
- andrew
- jose
- leo
- maria
- jim
- brian
- serg
- mary
- ray
- tom
- peter
- robert
- bob
- jane
- joe
- dan
- dave
- matt
- steve
- smith
- stan
- bill
- bob
- jack
- fred
- ted
- paul
- brent
- sales
- anna
- brenda
- claudia
- debby
- helen
- jerry
- jimmy
- julie
- linda
- michael
- frank
- adam
- Sandra
Subject: one of the following:
- Your password has been updated
- Your password has been successfully updated
- You have successfully updated your password
- Your new account password is approved
- Your Account is Suspended
- *DETECTED* Online User Violation
- Your Account is Suspended For Security Reasons
- Warning Message: Your services near to be closed.
- Important Notification
- Members Support
- Security measures
- Email Account Suspension
- Notice of account limitation
Message Body: one of the following:
Hey [DOMAIN],
There is something wrong with: undefineds account.
if you did not authorize this change or if you need assistance with your account, please contact undefineds customer service at: undefineds
Thank you for using undefineds!
undefineds team
+++ Attachment: No Virus (Clean)
+++ undefineds Antivirus - www. domain nameHi [DOMAIN],
It has come to our attention that your undefineds User Profile ( x ) records are out of date.
Please mail back and read the file i send you.
thank you for using undefineds
undefineds team
+++ Attachment: No Virus (Clean)
+++ undefineds Antivirus - www. domain name[DOMAIN] family,
We have temporarily suspended your email account undefineds.
his might be due to either of the following reasons:
1. You cracked other sites with it.
2. Porno sites, movies or pictures
3. An innability to accurately verify your selected option of subscription due to an internal error within our processors.
See the details to reactivate your undefineds account.
undefineds team
+++ Attachment: No Virus (Clean)
+++ undefineds Antivirus - www. domain name
Attachment: [Filename].[Extension1].[Extension2]Hey domain name,
Your e-mail account was hacked please take 5-10 minutes out of your online experience and confirm the attached document so you will not run into any future problems with the Online service.
If you choose to ignore our request, you leave us no choice but to cancel your e-mail account
Virtually yours
The undefineds Support Team
+++ Attachment: No Virus found
+++ undefineds Antivirus - www. domain name
[Filename] can be any of the following:
- updated-password
- email-password
- new-password
- password
- approved-password
- account-password
- accepted-password
- important-details
- account-details
- email-details
- account-info
- document
- readme
- account-report
[Extension1] can be any of the following:
- .doc
- .htm
- .txt
[Extension2] can be any of the following:
- .bat
- .cmd
- .exe
- .pif
- .scr
- .zip
Backdoor/Trojan Behavior
- Prevents the infected system from connecting to update servers and various other security related web pages by modifying the local HOSTS file.
- Modifies the value:
Start = 4 (The default value is 3)
in the following subkey:HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess
This disables the Shared Access service in Windows 2000/XP.
- Modifies the subkeys of the following key to change the security configuration of Microsoft Internet Explorer:
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\3
- Terminates certain processes, some of which may be security related, such as:
- ADAWARE.EXE
- ADVXDWIN.EXE
- APLICA32.EXE
- AVP.EXE
- BOOTCONF.EXE
- CMD32.EXE
- ESCANHNT.EXE
- IEXPLORER.EXE
- LOCKDOWN.EXE
- NEC.EXE
- Connects to the Internet Relay Chat (IRC) server rax.oucihax.info, joins a channel, and listens for commands that allow the remote attacker to perform any of the following actions:
- Download files
- Execute files
- Perform other IRC commands determined by the attacker
- Reboot the compromised computer
Recommended Action
-
FortiGate systems:
- Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option
Telemetry
Detection Availability
FortiGate | |
---|---|
Extended | |
FortiClient | |
FortiMail | |
FortiSandbox | |
FortiWeb | |
Web Application Firewall | |
FortiIsolator | |
FortiDeceptor | |
FortiEDR |