New Waledac Trojan (Jan 23, 2009)
SonicWALL UTM Research team observed a new variant of Waledac Trojan in the wild starting today Thursday, January 23, 2009. Waledac was first seen on the Internet a day before Christmas (Dec 24, 2009) and since then there were multiple variants spammed in the wild.
Waledac arrives via email that contains a link to the Trojan. A sample of URL spammed for the newest variant of Waledac looks like following:
- wlt.goodnewsdigital.com?cardnum=(REMOVED)
If the user clicks on the link, the Trojan will get downloaded with one of the following filename:
- onlyyou.exe
- love.exe
- you.exe
- youandme.exe
- meandyou.exe
The malware when executed, performs the following tasks:
- Adds the following registry key to ensure that the Trojan gets executed every time system reboots
- HKLMSOFTWAREMicrosoftWindowsCurrentVersionRunPromoReg: “(PATH)(FILENAME)”
-
Sends out email messages containing the Malicious URL to e-mail addresses harvested from local machine. It contained following IP Addresses encrypted inside the binary file:
- 60.17.155.78
- 201.2.164.168
- 124.73.130.120
- 71.10.230.45
- 200.100.83.229
- 119.96.206.189
- 121.1.102.3
- 124.199.31.108
- 124.153.156.121
Malware sends folling HTTP requests to the above IP addresses most of which has content-length of 957 bytes:
- POST /zzmk.htm HTTP/1.1
- POST /smphsfmsdll.htm HTTP/1.1
- POST /xbqbqkhnd.htm HTTP/1.1
- POST /zmqwyliet.png HTTP/1.1
- POST /irpswjczfew.htm HTTP/1.1
The malware has very low AV detection (2/32) at the time of writing this Security Alert. SonicWALL Gateway Antivirus will detect this new Waledac variant as GAV: Waledac.Z (Trojan) .