Need help? Ask the community or hire an expert.
Go to Avira Answers
Virus:Worm/Lovgate.F
Date discovered:13/05/2003
Type:Worm
In the wild:Yes
Reported Infections:Low to medium
Distribution Potential:Low to medium
Damage Potential:Medium
Static file:Yes
File size:107.008 Bytes
MD5 checksum:5d73aba7169ebfd2bdfd99437d5d8b11
IVDF version:6.19.00.15 - Tuesday, May 13, 2003

 General Methods of propagation:
   • Email
   • Local network


Aliases:
   •  Symantec: W32.HLLW.Lovgate.G@mm
   •  Mcafee: W32/Lovgate.f@M
   •  Kaspersky: Email-Worm.Win32.LovGate.f
   •  F-Secure: W32/Lovgate.F@mm
   •  Sophos: W32/Lovgate-E
   •  Panda: W32/Lovgate.F
   •  Eset: Win32/Lovgate.G
   •  Bitdefender: Win32.LovGate.F@mm


Platforms / OS:
   • Windows 2000
   • Windows XP
   • Windows 2003


Side effects:
   • Drops malicious files
   • Uses its own Email engine
   • Registry modification

 Files It copies itself to the following locations:
   • %SYSDIR%\IEXPLORE.EXE
   • %SYSDIR%\kernel66.dll
   • %SYSDIR%\RAVMOND.exe
   • %SYSDIR%\WinDriver.exe
   • %SYSDIR%\WinGate.exe
   • %SYSDIR%\WinHelp.exe
   • %SYSDIR%\winrpc.exe



The following files are created:

%SYSDIR%\111.dll (81920 bytes) Further investigation pointed out that this file is malware, too. Detected as: Worm/Lovgate.F.2

%SYSDIR%\ily668.dll (81920 bytes) Further investigation pointed out that this file is malware, too. Detected as: Worm/Lovgate.F.2

%SYSDIR%\reg678.dll (81920 bytes) Further investigation pointed out that this file is malware, too. Detected as: Worm/Lovgate.F.2

%SYSDIR%\Task688.dll (81920 bytes) Further investigation pointed out that this file is malware, too. Detected as: Worm/Lovgate.F.2

 Registry One of the following values is added in order to run the process after reboot:

  [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
   • "WinHelp"="%SYSDIR%\WinHelp.exe"
   • "WinGate initialize"="%SYSDIR%\WinGate.exe -remoteshell"
   • "Remote Procedure Call Locator"="RUNDLL32.EXE reg678.dll ondll_reg"
   • "Program In Windows"="%SYSDIR%\IEXPLORE.EXE"



The following registry keys are added in order to load the services after reboot:

[HKLM\SYSTEM\CurrentControlSet\Services\ll_reg]
   • "Type"=dword:00000010
     "Start"=dword:00000002
     "ErrorControl"=dword:00000001
     "ImagePath"=Rundll32.exe Task688.dll ondll_server
     "DisplayName"="ll_reg"
     "ObjectName"="LocalSystem"

[HKLM\SYSTEM\CurrentControlSet\Services\
   NetMeeting Remote Desktop (RPC) Sharing]
   • "Type"=dword:00000010
     "Start"=dword:00000002
     "ErrorControl"=dword:00000001
     "ImagePath"=Rundll32.exe Task688.dll ondll_server
     "DisplayName"="NetMeeting Remote Desktop (RPC) Sharing"
     "ObjectName"="LocalSystem"

[HKLM\SYSTEM\CurrentControlSet\Services\
   Windows Management Instrumentation Driver Extension]
   • "Type"=dword:00000010
     "Start"=dword:00000002
     "ErrorControl"=dword:00000001
     "ImagePath"=%SYSDIR%\WinDriver.exe -start_server
     "DisplayName"="Windows Management Instrumentation Driver Extension"
     "ObjectName"="LocalSystem"



The following registry keys are changed:

[HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows]
   New value:
   • "run"="RAVMOND.exe"

[HKLM\SOFTWARE\Classes\txtfile\shell\open\command]
   New value:
   • @="winrpc.exe %1"

 Email It contains an integrated SMTP engine in order to send Spam emails. A direct connection with the destination server will be established. The characteristics are described in the following:
It uses the Messaging Application Programming Interface (MAPI) in order to send a reply to emails stored in the inbox. The characteristics are further described:


From:
The sender address is spoofed.
The sender address is the user's Outlook account.


To:
– Email addresses found in specific files on the system.
 Email addresses gathered from WAB (Windows Address Book)


Subject:
One of the following:
   • Reply to this!
   • Let's Laugh
   • Last Update
   • for you
   • Great
   • Help
   • Attached one Gift for u..
   • Hi Dear
   • Hi
   • See the attachement



Body:
The body of the email is one of the lines:
   • For further assistance, please contact!
   • Copy of your message, including all the headers is attached.
   • This is the last cumulative update.
   • Tiger Woods had two eagles Friday during his victory over Stephen Leaney. (AP Photo/Denis Poroy)
   • Send reply if you want to be official beta tester.
   • This message was created automatically by mail delivery software (Exim).
   • It's the long-awaited film version of the Broadway hit. Set in the roaring 20's, this is the story of Chicago chorus girl Roxie Hart (Zellweger), who shoots her unfaithful lover (West).
   • Adult content!!! Use with parental advisory.
   • Patrick Ewing will give Knick fans something to cheer about Friday night.
   • Send me your comments...


Attachment:
The filename of the attachment is one of the following:
   • About_Me.txt.pif
   • driver.exe
   • Doom3 Preview!!!.exe
   • enjoy.exe
   • YOU_are_FAT!.TXT.pif
   • Source.exe
   • Interesting.exe
   • README.TXT.pif
   • images.pif
   • Pics.ZIP.scr

The attachment is a copy of the malware itself.

 Mailing Search addresses:
It searches the following file for email addresses:
   • *.ht*


MX Server:
It has the ability to contact the MX server:
   • smtp.163.com

 Network Infection In order to ensure its propagation the malware attemps to connect to other machines as described below.

It drops copies of itself to the following network shares:
   • Are you looking for Love.doc.exe
   • autoexec.bat
   • The world of lovers.txt.exe
   • How To Hack Websites.exe
   • Panda Titanium Crack.zip.exe
   • Mafia Trainer!!!.exe
   • 100 free essays school.pif
   • AN-YOU-SUCK-IT.txt.pif
   • Sex_For_You_Life.JPG.pif
   • CloneCD + crack.exe
   • Age of empires 2 crack.exe
   • MoviezChannelsInstaler.exe
   • Star Wars II Movie Full Downloader.exe
   • Winrar + crack.exe
   • SIMS FullDownloader.zip.exe
   • MSN Password Hacker and Stealer.exe


It uses the following login information in order to gain access to the remote machine:

The following list of usernames:
   • Guest
   • Administrator

The following list of passwords:
   • zxcv; yxcv; xxx; xp; win; test123; test; temp123; temp; sybase; super;
      sex; secret; pwd; pw123; pw; pc; Password; owner; oracle; mypc123;
      mypc; mypass123; mypass; love; login; Login; Internet; home;
      godblessyou; god; enable; database; computer; alpha; admin123; Admin;
      abcd; aaa; aa; 88888888; 2600; 2003; 2002; 123asd; 123abc; 123456789;
      1234567; 123123; 121212; 12; 11111111; 110; 007; 00000000; 000000; 0;
      pass; 54321; 12345; password; passwd; server; sql; !@; $%^&*; !@;
      $%^&; !@; $%^; !@; $%; asdfgh; asdf; !@; $; 1234; 111; 11; root;
      abc123; 12345678; abcdefg; abcdef; abc; 888888; 666666; 111111; admin;
      administrator; guest; 654321; 123456; 321; 123



IP address generation:
It creates random IP addresses while it keeps the first three octets from its own address. Afterwards it tries to establish a connection with the created addresses.

 Backdoor The following port is opened:

%SYSDIR%\lsass.exe on TCP port 1092 in order to provide a remote Shell.

 Injection –  It injects the following file into a process: %SYSDIR%\111.dll


– It injects a backdoor routine into a process.

    Process name:
   • %SYSDIR%\lsass.exe


 Miscellaneous Mutex:
It creates the following Mutexes:
   • CTF.Compart.Mutex
   • CTF.Asm.Mutex
   • CTF.Layouts.Mutex
   • CTF.TMD.Mutex
   • CTF.TimListCache.FMP

 File details Programming language:
The malware program was written in MS Visual C++.


Runtime packer:
In order to aggravate detection and reduce size of the file it is packed with the following runtime packer:
   • Aspack

Açıklamayı yerleştiren Petre Galan tarihinde 5 Ekim 2009 Pazartesi
Açıklamayı güncelleyen: Petre Galan tarihinde 6 Ekim 2009 Salı

Geri . . . .
https:// Bu pencere güvenlik amacıyla şifrelenmiştir.