Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:Worm/Mytob.KV
Date discovered:16/10/2005
Type:Worm
In the wild:Yes
Reported Infections:Low
Distribution Potential:Medium
Damage Potential:Medium
Static file:Yes
File size:71.680 Bytes
MD5 checksum:1a579eaa603ac908f10E2ce4e3bdaf9b
VDF version:6.32.00.89

 General Methods of propagation:
   • Email
   • Local network


Aliases:
   •  Kaspersky: Net-Worm.Win32.Mytob.q
   •  TrendMicro: WORM_MYTOB.X
   •  Sophos: W32/Mytob-R
   •  Grisoft: I-Worm/Mytob.U
   •  VirusBuster: I-Worm.Mytob.W!zip
   •  Eset: Win32/Mytob.T
   •  Bitdefender: Win32.Worm.Mytob.S


Platforms / OS:
   • Windows 95
   • Windows 98
   • Windows 98 SE
   • Windows NT
   • Windows ME
   • Windows 2000
   • Windows XP


Side effects:
   • Blocks access to security websites
   • Drops a malicious file
   • Registry modification
   • Makes use of software vulnerability

 Files It copies itself to the following locations:
   • C:\funny_pic.scr
   • C:\see_this!!.scr
   • C:\my_photo2005.scr
   • %SYSDIR%\nethell.exe
   • %SYSDIR%\taskgmr.exe

– C:\hellmsn.exe Furthermore it gets executed after it was fully created. Further investigation pointed out that this file is malware, too. Detected as: Worm/Mytob.F.1

 Registry The following registry keys are continuously in an infinite loop added in order to run the processes after reboot.

–  HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
   • "WINTASK" = "taskgmr.exe"

–  HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
   • "WINTASK" = "taskgmr.exe"

–  HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunServices
   • "WINTASK" = "taskgmr.exe"



The following registry keys are added:

– HKCU\Software\Microsoft\OLE
   • "WINTASK" = "taskgmr.exe"

– HKLM\Software\Microsoft\OLE
   • "WINTASK" = "taskgmr.exe"

– HKCU\SYSTEM\CurrentControlSet\Control\Lsa
   • "WINTASK" = "taskgmr.exe"

– HKLM\SYSTEM\CurrentControlSet\Control\Lsa
   • "WINTASK" = "taskgmr.exe"

 Email It contains an integrated SMTP engine in order to send emails. A direct connection with the destination server will be established. The characteristics are described in the following:


From:
The sender address is spoofed.
Generated addresses. Please do not assume that it was the sender's intention to send this email to you. He might not know about his infection or might not even be infected at all. Furthermore it is possible that you will receive bounced emails telling you that you are infected. This might also not be the case.


To:
– Email addresses found in specific files on the system.
– Email addresses gathered from WAB (Windows Address Book)
– Generated addresses


Subject:
One of the following:
   • %random character string%
   • Error
   • Good day
   • hello
   • Mail Delivery System
   • Mail Transaction Failed
   • Server Report
   • Status



Body:
The body of the email is one of the lines:
   • %random character string%
   • Here are your banks documents.
   • Mail transaction failed. Partial message is available.
   • The message cannot be represented in 7-bit ASCII encoding and has been sent as a binary attachment.
   • The message contains Unicode characters and has been sent as a binary attachment.
   • The original message was included as an attachment.


Attachment:

–  It starts with one of the following:
   • body
   • data
   • doc
   • document
   • file
   • message
   • readme
   • test
   • text
   • %random character string%

    The file extension is one of the following:
   • bat
   • cmd
   • exe
   • scr
   • pif
   • zip

The attachment is a copy of the malware itself.



The email looks like the following:


 Mailing Search addresses:
It searches the following files for email addresses:
   • adb; asp; dbx; doc; htm; php; sht; tbb; tmp; txt; wab


Address generation for TO and FROM fields:
To generate addresses it uses the following strings:
   • adam; alex; andrew; anna; bill; bob; brenda; brent; brian; britney;
      bush; claudia; dan; dave; david; debby; fred; george; helen; jack;
      james; jane; jerry; jim; jimmy; joe; john; jose; julie; kevin; leo;
      linda; lolita; madmax; maria; mary; matt; michael; mike; peter; ray;
      robert; sam; sandra; serg; smith; stan; steve; ted; tom

It combines this with domains from the following list or from addresses found in files on the system

The domain is one of the following:
   • hotmail.com
   • cia.gov
   • fbi.gov
   • juno.com
   • yahoo.com
   • msn.com
   • aol.com


Avoid addresses:
It does not send emails to addresses containing one of the following strings:
   • -._!; -._!@; .edu; .gov; .mil; abuse; accoun; acketst; admin; anyone;
      arin.; avp; be_loyal:; berkeley; borlan; bsd; bugs; certific; contact;
      example; feste; fido; foo.; fsf.; gnu; gold-certs; google; gov.; help;
      iana; ibm.com; icrosof; icrosoft; ietf; info; inpris; isc.o; isi.e;
      kernel; linux; listserv; math; mit.e; mozilla; mydomai; nobody;
      nodomai; noone; not; nothing; ntivi; page; panda; pgp; postmaster;
      privacy; rating; rfc-ed; ripe.; root; ruslis; samples; secur;
      sendmail; service; site; soft; somebody; someone; sopho; submit;
      support; syma; tanford.e; the.bat; unix; usenet; utgers.ed; webmaster;
      www; you; your


Prepend MX strings:
In order to get the IP address of the mail server it has the ability to prepend the following strings to the domain name:
   • gate.
   • mail.
   • mail1.
   • mx.
   • mx1.
   • mxs.
   • ns.
   • relay.
   • smtp.

 Network Infection In order to ensure its propagation the malware attemps to connect to other machines as described below.

It drops copies of itself to the following network shares:
   • Admin$
   • Admin$\system32
   • c$
   • c$\winnt\system32
   • d$
   • e$
   • ipc$
   • ipc$\system32
   • lwc$
   • NETLOGON
   • print$
   • print$\system32
   • profiles$
   • SYSVOL


It uses the following login information in order to gain access to the remote machine:

–Cached usernames and passwords.

– A list of usernames and passwords:
   • Cisco; CISCO; ROOT; Root; oeminstall; staff; teacher; student1;
      student; afro; turnip; glen; freddy; intranet; lan; nokia; ctx;
      headoffice; main; capitol; blank; office; mass; control; pink; yellow;
      siemens; compaq; dell; cisco; sqlpass; sql; db1234; db1;
      databasepassword; data; databasepass; dbpassword; dbpass; database;
      domainpassword; domainpass; domain; orange; heaven; fish; hell; god;
      sex; fuck; exchnge; exchange; backup; technical; sage; owa; loginpass;
      login; katie; kate; bruce; ian; neil; lee; spencer; frank; joan;
      susan; sue; barbara; ron; luke; qwe; asd; qaz; oemuser; oem; homeuser;
      home; accounting; internet; web; outlook; mail; qwerty; null; server;
      system; default; changeme; none; test; xxxxxxxxx; xxxxxxxx; xxxxxxx;
      xxxxxx; xxxxx; xxxx; xxx; wired; winxp; winston; winpass; winnt; wing;
      wine; windozexp; windozeME; windoze98; windoze95; windoze2k; windoze;
      windowz; WindowsXP; windowsME; windows98; windows95; windows2k;
      windows; windose; win98; win2k; win2000; win; userpassword; username;
      usermane; user1; User; USER; user; Unknown; unknown; password123;
      password1; Password; PASSWORD; password; passwd; passphra; pass1234;
      pass123; pass; Guest; GUEST; guest; Administrator; ADMINISTRATOR;
      administrator; Administrateur; Administrador; admin123; Admin; ADMIN;
      adm; accounts; account; access; ACCESS; abcd; abc123; abc; aaa;
      654321; 54321; 2600; 2003; 2002; 123qwe; 123asd; 123abc; 1234qwer;
      123467890; 12346789; 1234678; 123467; 12346; 123456789; 12345678;
      1234567; 123456; 12345; 1234; 123321; 123123; 123; 121212; 121;
      11111111; 111111; 111; 110; 0wned; 0wn3d; 007; 00000000; 000000;
      00000; 0000; 000



Exploit:
It makes use of the following Exploits:
– MS03-026 (Buffer Overrun in RPC Interface)
– MS04-011 (LSASS Vulnerability)


IP address generation:
It creates random IP addresses while it keeps the first two octets from its own address. Afterwards it tries to establish a connection with the created addresses.


Infection process:
Creates an FTP script on the compromised machine in order to download the malware to the remote location.

 IRC To deliver system information and to provide remote control it connects to the following IRC Server:

Server: 19.**********or.biz
Channel: #m-rl5
Nickname: q[I]%random character string%



– This malware has the ability to collect and send information such as:
    • Malware uptime


– Furthermore it has the ability to perform actions such as:
    • Download file
    • Execute file
    • Terminate malware

 Hosts The host file is modified as explained:

– In this case existing entries are deleted.

– Access to the following domains is effectively blocked:
   • www.symantec.com; securityresponse.symantec.com; symantec.com;
      www.sophos.com; sophos.com; www.mcafee.com; mcafee.com;
      liveupdate.symantecliveupdate.com; www.viruslist.com; viruslist.com;
      viruslist.com; f-secure.com; www.f-secure.com; kaspersky.com;
      www.avp.com; www.kaspersky.com; avp.com; www.networkassociates.com;
      networkassociates.com; www.ca.com; ca.com; mast.mcafee.com;
      my-etrust.com; www.my-etrust.com; download.mcafee.com;
      dispatch.mcafee.com; secure.nai.com; nai.com; www.nai.com;
      update.symantec.com; updates.symantec.com; us.mcafee.com;
      liveupdate.symantec.com; customer.symantec.com; rads.mcafee.com;
      trendmicro.com; www.microsoft.com; www.trendmicro.com




The modified host file will look like this:


 Backdoor The following port is opened:

%SYSDIR%\taskgmr.exe on TCP port 16542 in order to provide an FTP server.

 Miscellaneous Mutex:
It creates the following Mutex:
   • ggmutexk2

 File details Programming language:
The malware program was written in MS Visual C++.


Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with a runtime packer.

Description inserted by Irina Boldea on Friday, January 20, 2006
Description updated by Irina Boldea on Friday, January 20, 2006

Back . . . .