
SonicWALL UTM Research team received reports of a new variant of mass-mailing worm propagating in the wild. This worm propagates through emails,P2P applications, network and removable drives.
Process of Infection:
An unsuspecting user may receive an email with the malware attachment. This worm can send emails as follows:
From: invitations@twitter.com
Subject: Your friend invited you to Twitter!
Attachment: Invitation Card.zip
From: order-update@amazon.com
Subject: Shipping update for your Amazon.com order
Attachment: Shipping documents .zip
From: update@facebookmail.com
Subject: You have got a new message on Facebook!
Attachment: Facebook message.zip
From: e-cards@hallmark.com
Subject: You have received A Hallmark E-Card!
Attachment: Postcard.zip
From: invitations@hi5.com
Subject: Laura would like to be your friend on hi5!
Attachment: Invitation Card.zip
From: resume-thanks@google.com
Subject: Thank you from Google!
Attachment: CV-20100120-112.zip
It may also send a phishing email:
Installation:
Once the user opens and executes the attachment, it will do the following:
Drops a copy of itself:
Registry Changes
Adds the following registry entries to ensure that the malware runs on every system startup.
Added the following registries as part of its installation:
Adds following registry entry to bypass firewall restrictions:
Mutex
Creates this mutex to ensure only a single instance is running in the memory.
Propagation
Removable Drives
Drops Autorun.inf and copy of itself as redmond.exe on and removable drives.
Peer-2-Peer Application
May copy itself in the following folders using listed filenames below:
Folder:
Filename:
Email Propagation
Harvests email addresses from files with the following extensions:
It avoids sending email with addresses having the following strings:
Queries available Mail-Exchange Server to send the email:
Other System Modification:
Delete files from the following directories:
Delete files related to the following registry entry:
Terminates the following services related to AV security softwares:
C&C Server
Sends information to the following remote server:
Anti-debugging Technique
Checks for the following SoftIce Debugger driver:
Anti-VMware:
Checks if its running in VMWare
SonicWALL Gateway AntiVirus provides protection against this worm via the following signatures:
GAV: Buzus.GDEF (Trojan) (Trojan)
GAV: Twain.A (Trojan)
GAV: Mufanom.APSW (Trojan)
GAV: (Cloud) Mufanom.APSW (Trojan)
Share This Article

An Article By
An Article By
Security News
Security News