Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:Worm/NetSky.AA
Date discovered:13/12/2012
Type:Worm
In the wild:Yes
Reported Infections:Medium
Distribution Potential:Medium
Damage Potential:Low
Static file:Yes
File size:27.136 Bytes
MD5 checksum:c43fa1b082302f3b8e01d77fb95c78c6
VDF version:7.11.53.216

 General Method of propagation:
   • Email


Aliases:
   •  Symantec: W32.Netsky.Z@mm
   •  Mcafee: W32/Netsky
   •  Kaspersky: Email-Worm.Win32.NetSky.aa
   •  TrendMicro: WORM_NETSKY.Z
   •  F-Secure: W32/Netsky.AK@mm
   •  Grisoft: I-Worm/Netsky.Z
   •  VirusBuster: I-Worm.NetSky.Z1
   •  Bitdefender: Win32.Netsky.AA@mm


Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Uses its own Email engine
   • Registry modification

 Files It copies itself to the following location:
   • %WINDIR%\Jammer2nd.exe



The following files are created:

– It creates the following archive containing a copy of the malware:
   • %WINDIR%\pk_zip_alg.log

– MIME encoded copies of itself:
   • %WINDIR%\pk_zip1.log
   • %WINDIR%\pk_zip2.log
   • %WINDIR%\pk_zip3.log
   • %WINDIR%\pk_zip4.log
   • %WINDIR%\pk_zip5.log
   • %WINDIR%\pk_zip6.log
   • %WINDIR%\pk_zip7.log
   • %WINDIR%\pk_zip8.log

 Registry The following registry key is added in order to run the process after reboot:

– [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "Jammer2nd"="%WINDIR%\Jammer2nd.exe"

 Email It contains an integrated SMTP engine in order to send emails. A direct connection with the destination server will be established. The characteristics are described in the following:


From:
The sender address is spoofed.
Generated addresses. Please do not assume that it was the sender's intention to send this email to you. He might not know about his infection or might not even be infected at all. Furthermore it is possible that you will receive bounced emails telling you that you are infected. This might also not be the case.


To:
– Email addresses found in specific files on the system.
– Email addresses gathered from WAB (Windows Address Book)
The recipient of the email is the following:
   • jamainlbbbsdef@yahoo.com


Subject:
One of the following:
   • Document
   • Hello
   • Hi
   • Important
   • Information



Body:
The body of the email is one of the lines:
   • Important bill!
   • Important data!
   • Important details!
   • Important document!
   • Important informations!
   • Important notice!
   • Important textfile!
   • Important!


Attachment:
The filename of the attachment is one of the following:
   • Bill.zip
   • Data.zip
   • Details.zip
   • Important.zip
   • Informations.zip
   • Notice.zip
   • Part-2.zip
   • Textfile.zip

 Mailing Search addresses:
It searches the following files for email addresses:
   • .ppt; .xml; .wsh; .jsp; .msg; .oft; .sht; .nch; .mmf; .mht; .dbx;
      .tbb; .adb; .xls; .stm; .ods; .dhtm; .cgi; .shtm; .uin; .rtf; .vbs;
      .php; .txt; .eml; .doc; .wab; .asp; .html; .htm; .pl; .mdx; .mbx; .cfg


Resolving server names:
If the request using the standard DNS fails it continues with the following
It has the ability to contact the following DNS servers:
   • 212.44.160.8; 195.185.185.195; 151.189.13.35; 213.191.74.19;
      193.189.244.205; 145.253.2.171; 193.141.40.42; 194.25.2.134;
      194.25.2.133; 194.25.2.132; 194.25.2.131; 193.193.158.10;
      212.7.128.165; 212.7.128.162; 193.193.144.12; 217.5.97.137;
      195.20.224.234; 194.25.2.130; 194.25.2.129; 212.185.252.136;
      212.185.253.70; 212.185.252.73

 Backdoor The following port is opened:

%executed file% on TCP port 665 in order to provide backdoor capabilities.

 DoS  On 02/05/2004 it performs DoS attacks against the following destinations:
   • www.nibis.de
   • www.medinfo.ufl.edu
   • www.educa.ch

 Miscellaneous Mutex:
It creates the following Mutex:
   • (S)(k)(y)(N)(e)(t)


String:
Furthermore it contains the following string:
   • :::::::::::They never learn it!:::::::::::

 File details Programming language:
The malware program was written in MS Visual C++.


Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with the following runtime packer:
   • ASPack 2.11c

Description inserted by Razvan Olteanu on Monday, August 29, 2005
Description updated by Andrei Ivanes on Tuesday, March 14, 2006

Back . . . .