BlackWorm Summary

Published: 2006-01-30. Last Updated: 2006-02-03 14:02:29 UTC
by Johannes Ullrich (Version: 4)
0 comment(s)

About BlackWorm

Over the last week, "Blackworm" infected about 300,000 systems based on analysis of logs from the counter web site used by the worm to track itself. This  worm is  different and more serious than other worms for a number of reasons. In particular, it will overwrite a user's files on February 3rd.

At this point, the worm will be detected by up to date anti virus signatures. In order to protect yourself from data loss on February 3rd, you should use current (Jan 23rd or later) anti virus signatures.  Note, however, that the malware attempts to disable/remove any anti-virus software on the system (and does this every hour while the system is up), so if the machine was infected before signatures were deployed, obviously, that anti-virus software can't be expected to clean up the infection for you.

The following file types will be overwritten by the virus: DOC, XLS, MDE, MDB, PPT, PPS, RAR, PDF, PSD, DMP, ZIP. The files are overwritten with an error message( 'DATA Error [47 0F 94 93 F4 K5]').

We will try to post more detailed cleanup instructions later. However, it is likely that you will have to rebuild the system from scratch. Obtaining good backups is critical as a first step.

The first thing you should do is to update your anti virus signatures.

This page will be updated as new information becomes available. Please see the end of the page for references to other sites. Use only this url to link to this page: http://isc.sans.org/blackworm

Naming

As usual, this worm/virus has collected a number of names from various vendors. It is so far known as: Blackmal, Nyxem, MyWife, Tearec among other names. Update: we have been informed that the CME number will be 'CME-24'. cme.mitre.org should shortly list this number.

How would I get infected?

The worm spreads via e-mail attachments or file shares. Once a system in your network is infected, it will try to infect all shared file systems it has access to. You may see a new "zip file" icon on your desktop.

What will BlackWorm do to my system?

It will disable most anti virus products and delete them. The worm will e-mail itself using a variety of extensions and file names. It will add itself to the list of auto-start programs in your registry.

Removal

Anti virus vendors offer removal tools. Microsoft provides detailed instructions for manual removal. However, there are two important reasons to rebuild "from scratch":
  1. BlackWorm uses the same tricks to install itself as other viruses/worms. It may not be the only one on your system. Antivirus will not detect all viruses, and the removal tool will only remove this specific worm.
  2. BlackWorm will allow remote access to your system, and additional malware may have been installed via this backdoor.

Snort Signatures

Joe Stewart (Lurhq.com) provided the following snort signatures based on his analysis of the worm:
(for up to date rules, see bleedingsnort.org.
  1. This sig alerts if someone visits any counter at webstats.web.rcn.net without a Referrer: header in their URL. Could be an infected user, could be one of us checking out the counter stats:
  2. #by Joe Stewart at LURHQ, tweaks by Matt Jonkman
    alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS
    (msg:"BLEEDING-EDGE VIRUS webstats.web.rcn.net count.cgi request
    without referrer (possible BlackWorm/Nyxem infection)";
    content:"GET /cgi-bin/Count.cgi?"; depth:23; content:"df="; within:20;
    content:"Host|3a 20|webstats.web.rcn.net"; content:!"Referer|3a|";
    classtype:misc-activity; sid:2002788; rev:2;)

  3. This sig alerts on the specific pattern BlackWorm uses to test connectivity to www.microsoft.com. It's unique in that the request doesn't have a User-agent: header. So this will catch BlackWorm and possibly other automated requests to microsoft (which could happen if someone codes a sloppy app that uses the exact same pattern - but they should probably be flogged anyway)
  4. alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS 
    (msg:"BLEEDING-EDGE VIRUS Agentless HTTP request to www.microsoft.com
    (possible BlackWorm/Nyxem infection)"; dsize:92;
    content:"GET / HTTP/1.1|0d0a|Host|3a20|www.microsoft.com|0d0a|
    Connection|3a20|Keep-Alive|0d0a|Cache-Control|3a20|no-cache|0d0a0d0a|";
    classtype:misc-activity; sid:2002789; rev:1;)

  5. These signatures detect the payload of Nyxem_D aka CME-24. Same sig is swapped for outbound vs. inbound detection. Robert Danford
#Submitted 2006-01-17 by Mark Tombaugh
alert tcp $EXTERNAL_NET any -> $HOME_NET 25
(msg:"BLEEDING-EDGE VIRUS W32.Nyxem-D SMTP inbound";
flow:established,to_server; content:"YmVnaW4gNjY0I";
content:"ICAgICAgICAgICAgICAgICAgICAgICA"; distance:31;
within:31; classtype:trojan-activity;
reference:url,www.sophos.com/virusinfo/analyses/w32nyxemd.html;
sid: 2002779; rev:1;)

alert tcp $HOME_NET any -> $EXTERNAL_NET 25
(msg:"BLEEDING-EDGE VIRUS W32.Nyxem-D SMTP outbound";
flow:established,to_server; content:"YmVnaW4gNjY0I";
content:"ICAgICAgICAgICAgICAgICAgICAgICA"; distance:31;
within:31; classtype:trojan-activity;
reference:url,www.sophos.com/virusinfo/analyses/w32nyxemd.html;
sid: 2002778; rev:1;)

Inital days

The worm did hit a counter on the web as noted above. We took those logs, removed the attempted DoS attack from it and plotted both total hits per hour (blue line) and the first hit from each IP address per hour as well (red line). It's interesting to note the spread had slowed before the DoS attack on the counter had started.


the format of the x axis is date.hour


Credits

We would like to thank the members of the TISF BlackWorm task force for analysis and coordination.

The task force emerged from the MWP/DA groups.  This task force is now known as the TISF BlackWorm task force. It involves many in the security (anti spam, CERTs, anti virus, academia, ISP's, etc.) community and industry, working together to combat threats to the security of the Internet in cooperation with law enforcement globally.

Links

Update: http://www.lurhq.com/blackworm.html
www.f-secure.com
http://blogs.securiteam.com
Symantec
Trend Micro
Update:
Excellent Stats From LURHQ:
http://www.lurhq.com/blackworm-stats.html

Note: some of these links will offer removal tools. We have not tested any of these tools thoroughly enough to recommend them. They should be used as a "first try" tool, but do not substitute for a full analysis and possible rebuild of the infected system. BlackWorm includes the ability to install additional components. These additional components, if installed, will likely be missed. In addition, a virus like BlackWorm is likely an indication of a more fundamental problem in your security posture and multiple infections are likely.

BlackWorm FAQ

Q. What is CME-24?
A. A mass emailing worm with a destructive payload.
Please see http://cme.mitre.org/data/list.html#24 for pointers to antivirus vendor descriptions and analyses relating to this malware.

Q. I hear about new viruses all the time--what makes this one a "big deal?"
A. This destructive virus will delete files from a number of popular programs on February 3rd, and on the 3rd day of the month thereafter. 
Files which may be deleted by the malware include files ending with the extension of DOC, XLS, MDE, MDB, PPT, PPS, RAR, PDF, PSD, DMP, ZIP
Another factor that potentially makes this virus particularly noteworthy is that it has seen broad distribution, with the estimated infected machines in the hundreds of thousands. http://www.lurhq.com/blackworm-stats.html
Another factor that potentially makes this virus noteworthy is it's self defense mechanism. It closes windows if the caption has any of the following strings in it. SYMANTEC, SCAN, KASPERSKY, VIRUS, MCAFEE, TREND MICRO, NORTON, REMOVAL, or FIX. So many antivirus programs, scanners etc... can not be updated or used on a system that is infected with cme-24.

Q. You refer to this virus/worm as CME-24 -- that's not what *my* antivirus vendor calls it. What other names does CME-24 use?

Vendor            Malware Name
Authentium        W32/Kapser.A@mm
AntiVir           Worm/KillAV.GR
Avast!            Win32:VB-CD [Wrm]
AVG               Worm/Generic.FX
BitDefender       Win32.Worm.P2P.ABM
ClamAV            Worm.VB-8
Command           W32/Kapser.A@mm (exact)
Dr Web            Win32.HLLM.Generic.391
eSafe             Win32.VB.bi
eTrust-INO        Win32/Blackmal.F!Worm
eTrust-VET        Win32/Blackmal.F
Ewido             Worm.VB.bi
F-Prot            W32/Kapser.A@mm (exact)
F-Secure          Email-Worm.Win32.Nyxem.e
Fortinet          W32/Grew.A!wm
Ikarus            Email-Worm.Win32.VB.BI
Kaspersky         Email-Worm.Win32.Nyxem.e
McAfee            W32/MyWife.d@MM
Nod32             Win32/VB.NEI worm

Norman            W32/Small.KI (W32/Small.KI@mm)
Panda             W32/Tearec.A.worm (W32/MyWife.E.Worm)
QuickHeal         I-Worm.Nyxem.e
Sophos            W32/Nyxem-D
Symantec          W32.Blackmal.E@mm
Trend Micro       WORM_GREW.A (Worm_BLUEWORM.E)
VBA32             Email-Worm.Win32.VB.b
VirusBuster       Worm.P2P.VB.CIL

(source: AV-Test.org)

Q. What is CME?
A. http://cme.mitre.org/ CME provides single, common identifiers to new virus threats to reduce public confusions during malware outbreaks. CME is not an attempt to solve the challenges involved with naming schemes for viruses and other forms of malware, but instead aims to facilitate the adoption of a shared, neutral indexing capability for malware.

Q. How do people get infected with CME-24?
A. Known methods for infection include infected email attachments and network shares, however other mechanisms are also possible. While some areas of the world appear to be more prone toward infection than others, it appears that infected systems may be found in virtually all countries.

Q. What should I do to protect myself from getting infected with CME-24?
A. There is a number of things you can do:

  • Email attachments can contain viruses. If your Internet Service Provider provides an email scanning service subscribe to it.
  • Do not open attachments without first verifying that a trusted sender intentionally sent it to you by asking them if they sent you an attachment.
  • Scan email attachments before opening them.
  • Do not open emails that claim to have naughty content. This is a common trick used by email based viruses.
  • Backup your system! You should be routinely making backups of your system. If you've been putting it off, do it now. Backups will be a foundation that will help you recover if your system does get infected. Backups are the most reliable way to recover your data in the event of any data corruption event, virus, malware, or hardware failure. Note that your backup should be taken to non-rewritable media and/or stored offline. If you do not make your backup to non-rewritable or offline media, depending on the format you use; your backups might be at risk from the malware's destructive payload. This is particularly true if you currently backup important files into a zipped archive, use mirrored hard drives, or file shares none of those will protect you from the destructive potential of this worm.
  • On new systems create recovery CDs. Many systems sold today do not come with recovery CDs. The person purchasing the system is expected to create them. Consult manufactures documentation for details.
  • Insure that you have antivirus software installed, and that you have up-to-date antivirus definitions covering this particular malware. Do a full system scan and confirm that you are not infected with CME-24 or other malware. If you are infected, seek professional assistance to fix the problem at once.
  • Do not unnecessarily share or mount shareable filesystems. Filesystems should never be made available via weak or non-existant passwords.

Q. Help, I think I have been infected with CME-24. What should I do now?
A. If you have anti-virus software installed verify that it is up to date. Check with your anti-virus vendor if you are unsure of how to do this. If you had anti-virus software that you believe was disabled by CME-24 you may have to uninstall it before re-installing it.
If you do not have anti-virus software installed there are several anti-virus products that offer free or trial tools.  Av-test.org maintains a list of antivirus products. here
and West Coast labs at http://www.westcoastlabs.org/cm-av-list.asp?Cat_ID=2 and ICSA https://www.icsalabs.com/icsa/product.php?tid=dfgdf$gdhkkjk-kkkk
Some of these vendors offer free online scans as well. Be aware online scanners usually require activex or java be enabled, may take a long time and probably require admin privileges. Online scanners also do not provide any long term protection against reinfection.
If you've already been infected, you should seek professional help to deal with that infection at once. Failure to deal with this malware prior to the 3rd day of the month can result in data loss.

Q. Some very important file was trashed by the worm. I really need to get the information that was in that file. I don't have a clean backup. What can I do? Can I get back at least part of that file?
A. Possibly, some file recovery tools might recover all or part of the missing data. A data recovery service may be your be able to assist.

Q. Why would someone do something so tremendously stupid and destructive?
A. Unless the author comes out and tells us we may never know why.

Q. I run Windows Media Center Edition, Mac OS X, Linux, have a Treo, etc. Is my system at risk? Or is this just a Windows XP thing?
A. This virus only affects Windows operating systems. It affects nearly every version of windows.
From: http://www.microsoft.com/security/encyclopedia/details.aspx?Name=Win32/Mywife.E@mm&view=en-us
Windows NT 3.x/4.0, 95, 2000, XP, Server 2003, ME and 98 are all potentially affected.

NETWORK ADMINISTRATORS PORTION

Q. I'm a mail server administrator. How can I protect my customers from CME-24 and other malware?
A. There are several things you may want to do:
You may want to run a server-side antivirus program, or software to strip or defang potentially dangerous attachments. Under Unix, ClamAV is one example of a free antivirus program that you can run on your mail server; Procmail Email Sanitizer http://www.impsec.org/email-tools/procmail-security.html is an example of a program that you can run to remove or defang potentially hostile attachments. Under Windows there are several email scanning antivirus programs available.
You should also endeavor to accept, process and resolve notifications you may receive about infected customers. Confirm that you have a working abuse@ address, a working postmaster@ address, and current whois contact information for your domain(s). See http://www.faqs.org/rfcs/rfc2142.html for clarification.
If you have netblock(s) that have been assigned to you via SWIP or whois, or an autonomous system number (ASN), please make sure that you have current abuse reporting contact information defined in whois for those resources as well.
If you operate an intrusion detection system, consider running the Bleeding Snort rules that may help you to identify potentially infected customers. http://www.bleedingsnort.com/cgi-bin/viewcvs.cgi/sigs/VIRUS/WORM_Nyxem#rev1.6
Educate your customers about security effective practices.
Site license an antivirus product and distribute it to your customers.
Encourage customers to routinely apply patches.
Encourage customers to use a software and/or hardware firewall.
Encourage customers to routinely backup their systems.
Where terms of service and applicable law permits, scan customer systems for vulnerabilities and insure that customers get fixed or removed from the network.

This document was prepared by the TISF BlackWorm task force which includes many elements in the security communities including: anti spam groups, CERTs, anti-virus teams, academia, law enforcement, and ISP's. The TISF BlackWorm task force would like to thank all the contributors to this FAQ including: Members of the DA/MWP groups and The Internet Storm Center handlers.

Original can be found at: http://isc.sans.org/blackworm

Keywords:
0 comment(s)

Seasonal Malwares and other trends

Published: 2006-01-24. Last Updated: 2006-01-24 18:55:00 UTC
by Pedro Bueno (Version: 1)
0 comment(s)
Seasonal Malwares and other trends...    

Seasonal Malwares are not a new thing, remember Bin Landen´s emails "see the pictures of Bin Landen
being arrested"...:) but recently I started to see some really intresting ones...

- In the end of 2005, the most common malwares were named <something>2006.exe/scr...like greeting
cards wishing a very happy 2006...:)

Some examples:
felizanonovo2006.UOL.scr-9ac416ab6f2da444c4dcba8750ff31d4      BehavesLike:Trojan.Downloader
terra2006.scr-81cab96a398d4399c8dd444d107a03e2          Win32.Worm.VB.AR
cartao2006.scr-112785080ab88f639ed77ef7c963355e         Trojan.Downloader.Delf.QZ
Cartoes2006.exe-0fd8e5dc41e6b6a74046fb2a34045d90         Trojan.Banker.Delf.8B54173E
fefe2006.exe-e6791a1c8525c778ccb2eabb53423ed4             Win32.Parite.B
feliz2006.exe-a25f1cca2ae0d210eb28600403c1a894             Trojan.Downloader.Banload.V
feliz2006.scr-96ba8bfefe94baf8eaa533921715cf06             Trojan.Banker.VB.4616C390

Sometimes, if you check the md5 hash, you will notice that some that appears to be a new one, was in fact an old one, that was renamed to something more current...

Another example: A new version of reality show Big Brother was about to start in Brazil on January 2006, it was called BigBrotherBrazil 6. So, we started to see some emails telling that if you fill the 'form'  you would get a chance to be part of the show:

BBB6.exe  suspected: GenPack:Generic.Malware.Sdld.91FA0809

One more? Ok, today is January 23, and here in Brazil, we are about 1 month before our Carnival, which is a big
party here...So, guess what:

carnaval-previnido.scr-3f1476def1dadd57f54658aae6710acc suspected: BehavesLike:Trojan.Downloader

Another interesting trend that I am observing is the use of .cmd extensions.

www.convitedoorkutpravoce.cmd-2924df691a9fe38ec1bdfd1bfabf1ad5         Trojan.Downloader.Banload.AL
www.fernandapaesleme.com.br.cmd-a3aedc0d95549e086e5c4a89956923f7     Trojan.Downloader.Delf.CI

But what is a .cmd extension? Thats a question that I asked on my Malware Analysis Quiz 3 :
"On windows OSs, files with the "cmd" extension are generally scripts passed to the cmd.exe command interpreter for execution. They are very similar to the (older) ".bat" files,used since the days of DOS for scripting and interpreted by command.com, but the different extension indicates slightly updated syntax/capabilities associated with cmd.exe"

And to finish our update on malware world, hacking websites or using free hosting sites to host malware is   happening yet, but I am seeing more and more malwares hosted on file-sharing websites , like i.e., rapidupload.com, zupload.com...which is kind more difficult to take down...

For example: http://z13.zupload.com/file.php?filepath=<removed>

If you want to take a look at my personal zoo, you can check it here. On this zoo I try to keep malwares with unique md5 hashes.

Btw, did you update your AV for  Nyxem.E??  Check it twice...you dont want to lose your .doc,.xls,.ppts...right?

------------------------------------------------------------
Handler on Duty: Pedro Bueno ( pbueno && isc. sans. org )
Keywords:
0 comment(s)

OpenSSH scp Issue

Published: 2006-01-24. Last Updated: 2006-01-24 17:52:56 UTC
by David Goldsmith (Version: 1)
0 comment(s)
Secunia has released an advisory here that addresses an issue with the use of the "system()" function in scp.  Because of this usage, certain special characters, that may be in the command line arguments to scp that are escaped on the command line, go through shell expansion twice and lose their special escape character.  This can cause what was initially a valid filename to now be interpreted as multiple filenames (pointing to non-existing files) or as additional commands (if the filename had included a semi-colon).

Additional details about the bug can be found from this Bugzilla post.

The latest version of OpenSSH, 4.2p1, is affected by this issue and a patch has not yet been made generally available.  Fedora has released updated RPMs for Fedora Core 4 that address this issue.  You can get more information about the Fedora updates here.

Here is an example from the Bugzilla post demonstrating the bug

Steps to Reproduce:
1. touch foo\ bar (the \ escapes the space embedded in the filename)
2. mkdir somedir
3. scp foo\ bar somedir

Expected Results:
No message, the file copied
Actual Results:
cp: cannot stat `foo': No such file or directory
cp: cannot stat `bar': No such file or directory




Keywords:
0 comment(s)

Comments


Diary Archives