※参考
以下の説明文では、Windowsオペレーティングシステムがインストールされたディレクトリを%windir%
と表記しており、インストール時の設定により異なる場合があります。%windir% のサブディレクトリである"System"や"System32"は
%system% と表記しています。
Virus description.
Bagle.EZ is a typical mass-mailing e-mail worm with
peer-2-peer spreading functionality
and a downloader component, the worm is runtime compressed.
Installation and Autostart Techniques
Upon execution, the worm copies itself into the
System32 folder as “ sysformat.exe”.
The worm creates several SkyNet Mutexes (“_-oO]xX|-S-k-y-N-e-t-|Xx[Oo-_”)
to prevent
these worms from running and uses its own mutex “MuXxXxTENYKSDesignedAsTheFollowerOfSkynet-D”
to prevent multiple instances of the worm from running
on one machine.
The worm adds the following key to the registry
to make sure that it runs every time windows is started:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
“sysformat” = “%System%\sysformat.exe”
Bagle.EZ modifies also the following registry keys:
HKCU\Software\Microsoft\Params
"FirstRun" = "1"
"Riga" = "{Random}"
and
HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess
“Start” = “4”
in order to lower security settings on the compromised
system and it also attempts to delete
“My AV” and “ICQ Net” from the following registry
keys:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
HKLM\Software\Microsoft\Windows\CurrentVersion\Run
The worm opens Notepad the first time it runs.
Process Termination
The worm tries to terminate several programs:
alogserv.exe
APVXDWIN.EXE
ATUPDATER.EXE
AUPDATE.EXE
AUTODOWN.EXE
AUTOTRACE.EXE
AUTOUPDATE.EXE
Avconsol.exe
AVENGINE.EXE
AVPUPD.EXE
Avsynmgr.exe
AVWUPD32.EXE
AVXQUAR.EXE
bawindo.exe
blackd.exe
ccApp.exe
ccEvtMgr.exe
ccProxy.exe
ccPxySvc.exe
CFIAUDIT.EXE
DefWatch.exe
DRWEBUPW.EXE
ESCANH95.EXE
ESCANHNT.EXE
FIREWALL.EXE
FrameworkService.exe
ICSSUPPNT.EXE
ICSUPP95.EXE
LUALL.EXE
LUCOMS~1.EXE
mcagent.exe
mcshield.exe
MCUPDATE.EXE
mcvsescn.exe
mcvsrte.exe
mcvsshld.exe
navapsvc.exe
navapw32.exe
NISUM.EXE
nopdb.exe
NPROTECT.EXE
NUPGRADE.EXE
OUTPOST.EXE
PavFires.exe
pavProxy.exe
pavsrv50.exe
Rtvscan.exe
RuLaunch.exe
SAVScan.exe
SHSTAT.EXE
SNDSrvc.exe
symlcsvc.exe
UPDATE.EXE
UpdaterUI.exe
Vshwin32.exe
VsStat.exe
VsTskMgr.exe
E-mail harvesting
The worm scans all fixed disks and collects e-mail
addresses from files which have one of the following
file extensions:
.adb .asp .cfg .dbx .dhtm .eml .htm .html .jsp
.mbx .mdx .mht .mmf .msg .nch .ods .oft
.php .sht .shtm .shtml .stm .tbb .txt .uin .wab.wsh .xls .xml
During scanning for these file-extensions the worm
will delete files named “mysuperprog.exe”
and tries to find “aaa.exe” and “bbb.exe” in order
to delete “mysuperprog1.exe” and “mysuperprog2.exe”.
DNS resolving
The worm performs DNS e-mail-exchange-queries to
find an appropriate mail server for each domain it
tries to send itself to.
Bagle.EZ performs in this case a so called “MX lookup”.
If this DNS request for the mail-server fails, the
worm uses the following static DNS Server: 217.5.97.137,
which is located in Germany (t-online Name-Server):
E-mail Sender
The worm uses spoofed email addresses collected
during E-mail harvesting.
It uses its own SMTP (Simple Mail Transfer Protocol)
engine to mass-mail copies of itself to other e-mail
addresses.
E-mail subjects
Bagle.EZ randomly selects an e-mail subject out
of the following list:
Delivery service mail
Delivery by mail
Registration is accepted
Is delivered mail
You are made active
Message Body
The E-mail contains one of the following message
texts:
Thanks for use of our software.
Before use read the help
E-mail Attachments
The worm attaches one of the following file names
with a copy of itself as ZIP-File or as a plain executable:
wsd01
viupd02
siupd02
guupd02
zupd02
upd02
Jol03
Note: The worm might also use randomly generated
attachment names and text.
The worm avoids e-mail addresses which contain parts
of the following list:
@microsoft rating@ f-secur news update anyone@
bugs@ contract@ feste
gold-certs@ help@ info@ nobody@ noone@ kasp admin
icrosoft support ntivi unix bsd linux listserv certific sopho @foo @iana free-av
@messagelab winzip google winrar samples abuse panda cafee spam pgp @avp.
Noreply local root@ postmaster@
Note: The first missing character will match. For
example, 'Microsoft' as well as 'microsoft' will
match with "icrosoft".
Peer-2-Peer Network Spreading
During harvesting emails, the worm compares the
directory names with “shar”.
If the directory name contains “shar” (for instance
“My Shared Folder” for Kazaa, eDonkey etc.)
the worm then places selfcopies into this folder
as:
1.exe
2.exe
3.exe
4.exe
5.scr
6.exe
7.exe
8.exe
9.exe
10.exe
Ahead Nero 7.exe
Windown Longhorn Beta Leak.exe
Opera 8 New!.exe
XXX hardcore images.exe
WinAmp 6 New!.exe
WinAmp 5 Pro Keygen Crack Update.exe
Adobe Photoshop 9 full.exe
Matrix 3 Revolution English Subtitles.exe
ACDSee 9.exe
Downloader Component
Bagle.EZ tries to download and to run an executable
file from several webservers:
http://www.cnsrvr.com/{--Removed--}q.jpg
http://www.casinofunnights.com/{--Removed--}q.jpg
http://www.ec.cox-wacotrib.com/{--Removed--}q.jpg
http://www.crazyiron.ru/{--Removed--}q.jpg
http://www.uni-esma.de/{--Removed--}q.jpg
http://www.sorisem.net/{--Removed--}q.jpg
http://www.varc.lv/{--Removed--}q.jpg
http://www.belwue.de/{--Removed--}q.jpg
http://www.thetildegroup.com/{--Removed--}q.jpg
http://www.vybercz.cz/{--Removed--}q.jpg
http://www.kyno.cz/{--Removed--}q.jpg
http://www.forumgestionvilles.com/{--Removed--}q.jpg
http://www.campus-and-more.com/{--Removed--}q.jpg
http://www.capitalforex.com/{--Removed--}q.jpg
http://www.capitalspreadspromo.com/{--Removed--}q.jpg
http://www.prineus.de/{--Removed--}q.jpg
http://www.databoots.de/{--Removed--}q.jpg
http://www.steintrade.net/{--Removed--}q.jpg
http://www.njzt.net/{--Removed--}q.jpg
http://www.emarrynet.com/{--Removed--}q.jpg
http://www.zebrachina.net/{--Removed--}q.jpg
http://www.lxlight.com/{--Removed--}q.jpg
http://www.yili-lighting.com/{--Removed--}q.jpg
http://www.fachman.com/{--Removed--}q.jpg
http://www.q-serwer.net/{--Removed--}q.jpg
http://www.wellness-i.com/{--Removed--}q.jpg
http://www.newportsystemsusa.com/{--Removed--}q.jpg
http://www.westcoastcadd.com/{--Removed--}q.jpg
http://www.wing49.cz/{--Removed--}q.jpg
http://www.posteffects.com/{--Removed--}q.jpg
http://www.provax.sk/{--Removed--}q.jpg
http://www.casinobrillen.de/{--Removed--}q.jpg
http://www.duodaydream.nl/{--Removed--}q.jpg
http://www.finlaw.ru/{--Removed--}q.jpg
http://www.fitdina.com/{--Removed--}q.jpg
http://www.flashcardplayer.com/{--Removed--}q.jpg
http://www.flox-avant.ru/{--Removed--}q.jpg
http://www.lotslink.com/{--Removed--}q.jpg
http://www.algor.com/{--Removed--}q.jpg
http://www.gaspekas.com/{--Removed--}q.jpg
http://www.ezybidz.com/{--Removed--}q.jpg
http://www.genesisfinancialonline.com/{--Removed--}q.jpg
http://www.georg-kuenzle.ch/{--Removed--}q.jpg
http://www.girardelli.com/{--Removed--}q.jpg
http://www.rodoslovia.ru/{--Removed--}q.jpg
http://www.golden-gross.ru/{--Removed--}q.jpg
http://www.gregoryolson.com/{--Removed--}q.jpg
http://www.gtechna.com/{--Removed--}q.jpg
http://www.lunardi.com/{--Removed--}q.jpg
http://www.sgmisburg.de/{--Removed--}q.jpg
http://www.harmony-farms.net/{--Removed--}q.jpg
http://www.hftmusic.com/{--Removed--}q.jpg
http://www.hiwmreport.com/{--Removed--}q.jpg
http://www.horizonimagingllc.com/{--Removed--}q.jpg
http://www.hotelbus.de/{--Removed--}q.jpg
http://www.howiwinmoney.com/{--Removed--}q.jpg
http://www.ietcn.com/{--Removed--}q.jpg
http://www.import-world.com/{--Removed--}q.jpg
http://www.houstonzoo.org/{--Removed--}q.jpg
http://www.interorient.ru/{--Removed--}q.jpg
http://www.internalcardreaders.com/{--Removed--}q.jpg
http://www.interstrom.ru/{--Removed--}q.jpg
http://www.iutoledo.org/{--Removed--}q.jpg
http://www.wena.net/{--Removed--}q.jpg
http://www.iesgrantarajal.org/{--Removed--}q.jpg
http://www.alexandriaradiology.com/{--Removed--}q.jpg
http://www.booksbyhunter.com/{--Removed--}q.jpg
http://www.wxcsxy.com/{--Removed--}q.jpg
http://www.coupdepinceau.com/{--Removed--}q.jpg
http://www.erotologist.com/{--Removed--}q.jpg
http://www.jackstitt.com/{--Removed--}q.jpg
http://www.imspress.com/{--Removed--}q.jpg
http://www.digitalefoto.net/{--Removed--}q.jpg
http://www.josemarimuro.com/{--Removed--}q.jpg
http://www.eversetic.com/{--Removed--}q.jpg
http://www.curious.be/{--Removed--}q.jpg
http://www.kameo-bijux.ru/{--Removed--}q.jpg
http://www.karrad6000.ru/{--Removed--}q.jpg
http://www.kaztransformator.kz/{--Removed--}q.jpg
http://www.keywordthief.com/{--Removed--}q.jpg
Hostfile Manipulation
It overwrites the present hosts file with the following
data to prevent access to these sites:
127.0.0.1 localhost
127.0.0.1 ad.doubleclick.net
127.0.0.1 ad.fastclick.net
127.0.0.1 ads.fastclick.net
127.0.0.1 ar.atwola.com
127.0.0.1 atdmt.com
127.0.0.1 avp.ch
127.0.0.1 avp.com
127.0.0.1 avp.ru
127.0.0.1 awaps.net
127.0.0.1 banner.fastclick.net
127.0.0.1 banners.fastclick.net
127.0.0.1 ca.com
127.0.0.1 click.atdmt.com
127.0.0.1 clicks.atdmt.com
127.0.0.1 dispatch.mcafee.com
127.0.0.1 download.mcafee.com
127.0.0.1 download.microsoft.com
127.0.0.1 downloads.microsoft.com
127.0.0.1 engine.awaps.net
127.0.0.1 fastclick.net
127.0.0.1 f-secure.com
127.0.0.1 ftp.f-secure.com
127.0.0.1 ftp.sophos.com
127.0.0.1 go.microsoft.com
127.0.0.1 liveupdate.symantec.com
127.0.0.1 mast.mcafee.com
127.0.0.1 mcafee.com
127.0.0.1 media.fastclick.net
127.0.0.1 msdn.microsoft.com
127.0.0.1 my-etrust.com
127.0.0.1 nai.com
127.0.0.1 networkassociates.com
127.0.0.1 office.microsoft.com
127.0.0.1 phx.corporate-ir.net
127.0.0.1 secure.nai.com
127.0.0.1 securityresponse.symantec.com
127.0.0.1 service1.symantec.com
127.0.0.1 sophos.com
127.0.0.1 spd.atdmt.com
127.0.0.1 support.microsoft.com
127.0.0.1 symantec.com
127.0.0.1 update.symantec.com
127.0.0.1 updates.symantec.com
127.0.0.1 us.mcafee.com
127.0.0.1 vil.nai.com
127.0.0.1 viruslist.ru
127.0.0.1 windowsupdate.microsoft.com
127.0.0.1 www.avp.ch
127.0.0.1 www.avp.com
127.0.0.1 www.avp.ru
127.0.0.1 www.awaps.net
127.0.0.1 www.ca.com
127.0.0.1 www.fastclick.net
127.0.0.1 www.f-secure.com
127.0.0.1 www.kaspersky.ru
127.0.0.1 www.mcafee.com
127.0.0.1 www.my-etrust.com
127.0.0.1 www.nai.com
127.0.0.1 www.networkassociates.com
127.0.0.1 www.sophos.com
127.0.0.1 www.symantec.com
127.0.0.1 www.trendmicro.com
127.0.0.1 www.viruslist.ru
127.0.0.1 www3.ca.com
NOD32アンチウイルスは、ウイルス定義ファイルのバージョン
1.1392(20060202) にて対応しています。 |