Du brauchst Hilfe? Frage die Community oder wende dich an einen Experten.
Zu Avira Answers
Virus:Worm/IRCBot.37888
Date discovered:13/12/2012
Type:Worm
In the wild:No
Reported Infections:Low
Distribution Potential:Medium
Damage Potential:Medium
Static file:Yes
File size:37.888 Bytes
MD5 checksum:0575728fe6f970936ea90143db389596
VDF version:7.11.53.216

 General Methods of propagation:
   • Email
   • Local network


Aliases:
   •  TrendMicro: WORM_MYTOB.KX
   •  Bitdefender: Backdoor.Fanbot.A


Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Blocks access to security websites
   • Uses its own Email engine
   • Records keystrokes
   • Registry modification
   • Third party control


Right after execution the following information is displayed:


 Files It copies itself to the following locations:
   • %WINDIR%\Phantom.exe
   • %SYSDIR%\Phantom.exe



It deletes the initially executed copy of itself.



The following file is created:

%system drive root%\shell.sys This file contains collected keystrokes.

 Registry The following registry key is added in order to run the process after reboot:

– [HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon]
   • "Shell"="Explorer.exe Phantom.exe"
   • "Userinit"="userinit.exe,Phantom.exe"

 Email It contains an integrated SMTP engine in order to send emails. A direct connection with the destination server will be established. The characteristics are described in the following:


From:
Generated addresses. Please do not assume that it was the sender's intention to send this email to you. He might not know about his infection or might not even be infected at all. Furthermore it is possible that you will receive bounced emails telling you that you are infected. This might also not be the case.


To:
– Email addresses found in specific files on the system.
– Email addresses gathered from WAB (Windows Address Book)
– Generated addresses


Subject:
One of the following:
   • *DETECTED* ONLINE USER VIOLATION
   • Email Account Suspension
   • Important Notification
   • Members Support
   • Notice of account limitation
   • WARNING MESSAGE: YOUR SERVICES NEAR TO BE CLOSED.
   • You have successfully updated your password
   • Your Account is Suspended
   • YOUR ACCOUNT IS SUSPENDED FOR SECURITY REASONS
   • YOUR NEW ACCOUNT PASSWORD IS APPROVED
   • YOUR PASSWORD HAS BEEN SUCCESSFULLY UPDATED
   • Your password has been updated

Furthermore the subject line could contain random letters.


Body:
– Contains HTML code.

 
The body of the email is one of the following:

   • Dear user %username from receiver's email address%,
     
     You have successfully updated the password of your %receiver's domain name from email address% account.
     If you did not authorize this change or if you need assistance with your account, please contact %receiver's domain name from email address% customer service at: admin@%receiver's domain name from email address%
     
     Thank you for using %receiver's domain name from email address% !
     
     The %receiver's domain name from email address% Support Team
     
     +++ Attachment: No Virus (Clean)
     +++ %receiver's domain name from email address% Antivirus - www.%receiver's domain name from email address%

   •
     Dear user %username from receiver's email address%,
     
     It has come to our attention that your %receiver's domain name from email address% User Profile ( x ) records are out of date.
     For further details see the attached document.Thank you for using %receiver's domain name from email address% !
     
     The %receiver's domain name from email address% Support Team
     
     +++ Attachment: No Virus (Clean)
     +++ %receiver's domain name from email address% Antivirus - www.%receiver's domain name from email address%

   • Dear %receiver's domain name from email address% Member,
     
     Your e-mail account was used to send a huge amount of unsolicited spam messages during the recent week.
      If you could please take 5-10 minutes out of your online experience and confirm the attached document
     so you will not run into any future problems with the online service.
     If you choose to ignore our request, you leave us no choice but to cancel your membership.
     
     Virtually yours,
     The %receiver's domain name from email address% Support Team
     
     +++ Attachment: No Virus found
     +++ %receiver's domain name from email address% Antivirus - www.%receiver's domain name from email address%

   • Dear %receiver's domain name from email address% Member,
     We have temporarily suspended your email account %receiver's email address%
     This might be due to either of the following reasons:
     1. A recent change in your personal information (i.e. change of address).
     2. Submiting invalid information during the initial sign up process.
     3. An innability to accurately verify your selected option of subscription due to an internal error within our processors.
     See the details to reactivate your %receiver's domain name from email address% account.
     
     Sincerely,The %receiver's domain name from email address% Support Team
     
     +++ Attachment: No Virus (Clean)
     +++ %receiver's domain name from email address% Antivirus - www.%receiver's domain name from email address%


Attachment:
The filename of the attachment is one of the following:
   • accepted-password.zip
   • account-details.zip
   • account-info.zip
   • account-password.zip
   • account-report.zip
   • document.zip
   • email-password.zip
   • important-details.zip
   • password.zip
   • readme.zip
   • updated-password.zip
   • %random character string%

The attachment is a copy of the malware itself.



The email may look like one of the following:



 Mailing Search addresses:
It searches the following files for email addresses:
   • html; adb; tbb; dbx; asp; php; xml; cgi; jsp; sht; htm; txt; doc


Address generation for FROM field:
To generate addresses it uses the following strings:
   • admin
   • administrator
   • info
   • mail
   • register
   • service
   • support
   • webmaster

It combines the result with domains that were found in files, which were previously searched for addresses.

Here you can find examples of generated addresses:
   • webmaster@%receiver's domain name from email address%
   • register@%receiver's domain name from email address%


Address generation for TO field:
To generate addresses it uses the following strings:
   • sandra; adam; frank; linda; julie; jimmy; jerry; helen; debby;
      claudia; brenda; anna; sales; brent; paul; ted; fred; jack; bill;
      stan; smith; steve; matt; dave; dan; joe; jane; bob; robert; peter;
      tom; ray; mary; serg; brian; jim; maria; leo; jose; andrew; sam;
      george; david; kevin; mike; james; michael; alex; josh; john

It combines the result with domains that were found in files, which were previously searched for addresses.

Here you can find examples of generated addresses:
   • alex@%receiver's domain name from email address%
   • sandra@%receiver's domain name from email address%


Avoid addresses:
It does not send emails to addresses containing one of the following strings:
   • .edu; abuse; www; fcnz; spm; master; accoun; certific; listserv;
      ntivi; icrosoft; admin; page; the.bat; gold-certs; feste; submit; not;
      help; service; privacy; somebody; soft; contact; site; rating; bugs;
      you; your; someone; anyone; nothing; nobody; noone; webmaster;
      postmaster; samples; info; root; slashdot; sourceforge; mozilla;
      utgers.ed; tanford.e; pgp; acketst; secur; isc.o; isi.e; ripe.; arin.;
      sendmail; rfc-ed; ietf; iana; usenet; fido; linux; kernel; google;
      ibm.com; fsf.; gnu; mit.e; bsd; math; unix; berkeley; foo.; .mil;
      gov.; .gov; support; messagelabs; ruslis; nodomai; mydomai; example;
      inpris; borlan; sopho; panda; hotmail; msn.; icrosof; syma; avp


Prepend MX strings:
In order to get the IP address of the mail server it has the ability to prepend the following strings to the domain name:
   • gate.
   • ns.
   • relay.
   • mail1.
   • mxs.
   • mx1.
   • smtp.
   • mail.
   • mx.

 IRC To deliver system information and to provide remote control it connects to the following IRC Server:

Server: SmallPhantom.**********.org
Port: 6667
Channel: #xiaoyu

Server: SmallPhantom.**********.com
Port: 6667
Channel: #xiaoyu



– This malware has the ability to collect and send information such as:
    • CPU speed
    • Current user
    • Details about drivers
    • Free disk space
    • Free memory
    • Malware uptime
    • Information about the network
    • Platform ID
    • Size of memory
    • System directory
    • Username
    • Information about the Windows operating system


– Furthermore it has the ability to perform actions such as:
    • Launch DDoS SYN flood
    • Launch DDoS UDP flood
    • disconnect from IRC server
    • Download file
    • Execute file
    • Join IRC channel
    • Kill process
    • Leave IRC channel
    • Open remote shell
    • Start keylog
    • Terminate malware
    • Terminate process
    • Updates itself
    • Upload file

 Hosts The host file is modified as explained:

– In this case already existing entries remain unmodified.

– Access to the following domains are redirected to other destinations:
   • jiangmin.com
   • www.jiangmin.com
   • Update2.JiangMin.com
   • Update3.JiangMin.com
   • rising.com.cn
   • www.rising.com.cn
   • online.rising.com.cn
   • iduba.net
   • www.iduba.net
   • kingsoft.com
   • db.kingsoft.com
   • scan.kingsoft.com
   • kaspersky.com.cn
   • www.kaspersky.com.cn
   • symantec.com.cn
   • www.symantec.com.cn
   • www.symantec.com
   • securityresponse.symantec.com
   • symantec.com
   • www.sophos.com
   • sophos.com
   • www.mcafee.com
   • mcafee.com
   • liveupdate.symantecliveupdate.com
   • www.viruslist.com
   • viruslist.com
   • viruslist.com
   • f-secure.com
   • www.f-secure.com
   • kaspersky.com
   • kaspersky-labs.com
   • www.avp.com
   • www.kaspersky.com
   • avp.com
   • www.networkassociates.com
   • networkassociates.com
   • www.ca.com
   • ca.com
   • mast.mcafee.com
   • my-etrust.com
   • www.my-etrust.com
   • download.mcafee.com
   • dispatch.mcafee.com
   • secure.nai.com
   • nai.com
   • www.nai.com
   • update.symantec.com
   • updates.symantec.com
   • us.mcafee.com
   • liveupdate.symantec.com
   • customer.symantec.com
   • rads.mcafee.com
   • trendmicro.com
   • www.pandaguard.com
   • pandasoftware.com
   • www.pandasoftware.com
   • www.trendmicro.com
   • www.grisoft.com
   • www.microsoft.com
   • microsoft.com
   • www.virustotal.com
   • virustotal.com
   • www.amazon.com
   • www.amazon.co.uk
   • www.amazon.ca
   • www.amazon.fr
   • www.paypal.com
   • paypal.com
   • moneybookers.com
   • www.moneybookers.com
   • www.ebay.com
   • ebay.com




The modified host file will look like this:


 Miscellaneous Mutex:
It creates the following Mutex:
   • [Phantom]

 File details Programming language:
The malware program was written in MS Visual C++.


Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with the following runtime packer:
   • PE Pack 1.0

Die Beschreibung wurde erstellt von Catalin Jora am Dienstag, 11. Oktober 2005
Die Beschreibung wurde geändert von Catalin Jora am Mittwoch, 19. Oktober 2005

zurück . . . .