New Pushbot worm variant (Mar 2, 2010)
SonicWALL UTM Research team received reports of a new variant of Pushbot worm spreading in the wild. This worm generally spreads through MSN Messenger and includes IRC-based backdoor capability to receive instructions from remote server.
The new variant includes Yahoo Messenger as an added propagation vector and sends localized messages based on the target users system language setup.
Installation:
- Copies itself as winmbu.exe in %windir% directory.
- Creates a mutex (SN5JSN868L) to ensure that only one instance of the application runs in the system.
The dropped file looks like this:
Registry Changes:
- It modifies following registry entry to ensure that the dropped copy of the malware starts on every system reboot:
Key: [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon] Value: “Userinit”
Original Data: “C:\WINDOWS\system32\userinit.exe,”
Modified Data: “C:\WINDOWS\system32\userinit.exe,C:\WINDOWS\winmbu.exe,”
Adds following registry entry to allow itself to pass through firewall restrictions:
Key: [HKLMSYSTEMCurrentControlSetServicesSharedAccessParametersFirewallPolicyStandardProfileAuthorizedApplicationsList] Value: “C:\WINDOWS\winmbu.exe”
Data: “C:\WINDOWS\winmbu.exe:*:Enabled:Userinit”
Command & Control (C&C) Server connection:
- Upon successful installation, it tries to connect to a remote IRC server to receive further instruction:
- Spread via instant messaging
- Update itself
- Remove itself
- Download and execute files
IRC Server: buri.burimche.net
Port: 1234/tcp
Backdoor Functionality:
IM Propagation:
This worm checks the system language setup of the target machine to determine which localized message it will send out to all the contacts.
- Localized languages used:
- Czech
- Danish
- Dutch
- English
- Finnish
- French
- German
- Italian
- Norwegian
- Polish
- Portuguese
- Romanian
- Slovak
- Spanish
- Turkish
- seen this?? ๐ [Malicious URL Link]
- look at this picture ๐ [Malicious URL Link]
- poglej to fotografijo ๐ [Malicious URL Link]
- pogled na ovu fotografiju ๐ [Malicious URL Link]
- min bild ๐ [Malicious URL Link]
- foto ๐ [Malicious URL Link]
- to fotografiu ๐ [Malicious URL Link]
- uita-te la aceasta fotografie ๐ [Malicious URL Link]
- kuvaa ๐ [Malicious URL Link]
- bu resmi bakmak ๐ [Malicious URL Link]
- olhar para esta foto ๐ [Malicious URL Link]
- spojrzec na to zdjecie ๐ [Malicious URL Link]
- dette bildet ๐ [Malicious URL Link]
- pet ๐ [Malicious URL Link]
- dette billede ๐ [Malicious URL Link]
- vejte se na mou fotku ๐ [Malicious URL Link]
- guardare quest’immagine ๐ [Malicious URL Link]
- bekijk deze foto ๐ [Malicious URL Link]
- schau mal das foto an ๐ [Malicious URL Link]
- regardez cette photo ๐ [Malicious URL Link]
Messages:
A sample instant message sent by the worm looks like:
SonicWALL Gateway AntiVirus provides protection against this worm via GAV: Pushbot.QM (Trojan) and GAV: Downloader.JMVS (Trojan) signatures.