live casino online

WORM_SALITY.RL

July 27, 2010
 Analysis by: Christopher Daniel So

 PLATFORM:

Windows 98, ME, NT, 2000, XP, Server 2003

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Worm

  • Destructiveness: No

  • Encrypted: No

  • In the wild: Yes

  OVERVIEW


live casino online has flagged this file infector as noteworthy due to the increased potential for damage, propagation, or both, that it possesses.

To get a one-glance comprehensive view of the behavior of this Worm, refer to the Threat Diagram shown below.

It drops a .LNK file that automatically executes the said file. The dropped .LNK file may use specific filenames. live casino online detects this file as EXPL_CPLNK.SM.

This worm may be downloaded by other malware/grayware/spyware from remote sites. It may be dropped by other malware. It may be unknowingly downloaded by a user while visiting malicious websites.

It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.

  TECHNICAL DETAILS

File Size:

Varies

File Type:

PE

Memory Resident:

Yes

Initial Samples Received Date:

26 Jul 2010

Payload:

Infects files

Arrival Details

This worm may be downloaded by other malware/grayware/spyware from remote sites.

It may be dropped by other malware.

It may be unknowingly downloaded by a user while visiting malicious websites.

Installation

This worm adds the following mutexes to ensure that only one of its copies runs at any one time:

  • op1mutx9
  • woemnm593jfe

Other System Modifications

This worm adds the following registry entries:

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\SharedAccess\Parameters\
FirewallPolicy\StandardProfile\AuthorizedApplications\
List
{malware path and file name} = "{malware path and file name}:*:Enabled:ipsec"

It adds the following registry keys as part of its installation routine:

HKEY_CURRENT_USER\Software\bntrp
(Default) =

HKEY_CURRENT_USER\Software\zrfke
(Default) =

Dropping Routine

This worm drops the following files:

It executes the dropped file(s). As a result, malicious routines of the dropped files are exhibited on the affected system.

Other Details

This worm connects to the following possibly malicious URL:

  • http://{BLOCKED}a.com/sm.php

NOTES:

Based on analysis of the codes, it has the following capabilities:

  • Enumerates network shares and drops the .DLL file, {random file name}.tmp, which live casino online detected as WORM_SALITY.RL
  • Drops an .LNK file that automatically executes WORM_SALITY.RL
  • Takes advantage of the vulnerability in Windows Shell that could allow arbitrary commands to be executed

It then drops a .LNK file that automatically executes the said file. The .LNK may use any of the following filenames:

  • Aline.lnk
  • Anna Benson Sex video.lnk
  • Anna.lnk
  • Audra.lnk
  • Bad girl.lnk
  • Barbi.lnk
  • Barrett Jackson nude photos.lnk
  • beautiful.lnk
  • Britney Spears XXX.lnk
  • Caitie.lnk
  • caroline.lnk
  • Copy of New File.lnk
  • Copy of New Folder.lnk
  • Copy of Shortcut.lnk
  • Drivers.lnk
  • Fotograf.lnk
  • Gallery photos.lnk
  • groom.lnk
  • Jammie.lnk
  • Jenna Elfman sex anal deepthroat.lnk
  • Juli.lnk
  • Julie.lnk
  • Kate Beckinsale nude pictures.lnk
  • kate.lnk
  • Katrina.lnk
  • Kelley.lnk
  • kleopatra.lnk
  • Lisa.lnk
  • Mandy.lnk
  • Mary-Anne.lnk
  • Mary.lnk
  • Miss America Porno.lnk
  • My beautiful person.lnk
  • My photoalbum.lnk
  • My Photos.lnk
  • Myphotos.lnk
  • New Folder.lnk
  • New Shortcut.lnk
  • Paris Hilton XXX Archive.lnk
  • Photoalbum.lnk
  • Picture.lnk
  • Porno Screensaver.lnk
  • rebecca.lnk
  • Rena.lnk
  • Sara.lnk
  • Serials.lnk
  • Shortcut.lnk
  • stacy.lnk
  • Tammy.lnk
  • XXX archive.lnk
  • XXX hardcore.lnk
  • XXX.lnk

The said shortcut file is detected as EXPL_CPLNK.SM.

  SOLUTION

Minimum Scan Engine:

8.900

VSAPI OPR PATTERN File:

7.341.00

VSAPI OPR PATTERN Date:

28 Jun 2010

Step 1

For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you to allow full scanning of your computer.

Step 2

Remove malware files dropped/downloaded by WORM_SALITY.RL