08-23-2003, 12:13 AM
|
#1 (permalink)
|
Sexy eh?
|
Sobig.f -worm attack stoped!
Sobig virus information from http://www.f-secure.com
Quoted from: http://www.f-secure.com/v-descs/sobig_f.shtml
Quote:
F-Secure Virus Descriptions
Radar Alert LEVEL 1
NAME: Sobig.F
ALIAS: W32/Sobig.F@mm
THIS VIRUS IS RANKED AS LEVEL 1 ALERT
UNDER F-SECURE RADAR.
For more information, see:
http://www.F-Secure.com/products/radar/
A new variant of Sobig, known as Sobig.F was first found on August 19th, 2003 and it is spreading in the wild.
Sobig.F activates on Friday the 22nd of August at 19:00 UTC. For information on this, please see:
http://www.f-secure.com/news/items/n...03082200.shtml
Update on 16:00 UTC
F-Secure can confirm that 18 of the 20 master servers are currently down or unreachable.
Update on 17:00 UTC
F-Secure can confirm that 17 of the 20 master servers are currently down. Apparently one of the machines was not disconnected by an ISP and has been booted up by its owner.
We're working together with CERTs, FBI and Microsoft to stop the last three.
Update on 18 UTC
F-Secure can confirm that ALL the master server machines are currently down or unreachable. One of them seems to still respond to PING but not to 8998 UDP.
We have one hour to go to see if this really is the case.
Update on 18:20 UTC
Unfortunately one server is up right now after all. And one might be enough for the attack to start succesfully.
Update on 19:00 UTC
When deadline for the attack was passed, one machine was still (somewhat) up. However, immediately after the deadline, this machine (located in the USA) was totally swamped under network traffic.
We've tried connecting to it, just like the virus does. We do this from three different sensors from three different machines in three different countries. We haven't been able to connect to it once. If we can't connect, neither can the viruses.
So the attack failed.
We'll keep monitoring until 22:00 UTC. If we're not able to connect once, we can safely say that the attack was prevented.
Update on 19:50 UTC
Still not a single connection from any of our sensors to any of the servers.
Update on 21:30 UTC
Situation is still the same. Things look good.
Update on 22:00 UTC
The official attack time on Friday has ended. All 20 machines were inaccessible throughout the attack.
Now we are investigating random UDP traffic that has been seen in the net, possibly relating to the worm.
Disinfection Instructions
Disinfection Tool
F-Secure provides the special tool to disinfect the Sobig.F worm. The tool and disinfection instructions are available at:
http://www.f-secure.com/tools/f-sobig.zip
http://www.f-secure.com/tools/f-sobig.txt
http://www.f-secure.com/tools/f-sobig.exe
http://www.f-secure.com/tools/f-sobig.jar
You can also download them from our FTP server:
ftp://ftp.f-secure.com/anti-virus/tools/f-sobig.zip
ftp://ftp.f-secure.com/anti-virus/tools/f-sobig.txt
ftp://ftp.f-secure.com/anti-virus/tools/f-sobig.exe
ftp://ftp.f-secure.com/anti-virus/tools/f-sobig.jar
Detailed Description
Sobig sends massive amounts of mail. The sender information of these mails is wrong and doesn't indicate the real infected user.
The attachment has a size of around 70KB and it's packed with TELock. It has its own SMTP engine, apart from routines to query directly DNS servers and make requests using the Network Time Protocol.
The worm will also attempt to fetch a URL from where to download components when certain conditions are met. The condition, in this case, is that the time which is obtained from one the NTP servers (which addresses it has hard-coded inside its code) is Friday or Sunday (regardless of the week) between 19:00 and 22:00 UTC time. The worm will perform this test every hour.
When the condition meets, it will attempt to retrieve an URL from a predefined list of 20 master hosts. The content of the URL will be downloaded and executed on the infected machines.
The list of NTP servers, used to coordinate the download of the URL is: (This is not the list of master servers)
Code:
200.68.60.246
62.119.40.98
150.254.183.15
132.181.12.13
193.79.237.14
131.188.3.222
131.188.3.220
193.5.216.14
193.67.79.202
133.100.11.8
193.204.114.232
138.96.64.10
chronos.cru.fr
212.242.86.186
128.233.3.101
142.3.100.2
200.19.119.69
137.92.140.80
129.132.2.21
Deactivation routine
The worm will stop spreading on 10th of September 2003. From this date onwards the worm will exit immediately when executed.
Infection
It will install itself into:
%windir%\winppr32.exe
Proceeding then to add the following keys to the Windows Registry:
[HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc
[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TrayX" = %windir%\winppr32.exe /sinc
So it's started when Windows does.
Mail spreading
The worm usually arrives in e-mails with the following characteristics:
From:
The 'From:' field is filled with an address found from the infected system.
If no address is found, it will use "admin@internet.com"
To:
The 'To:' field is filled with an address found from the infected system.
Subject, any from the list:
Re: Thank you!
Thank you!
Your details
Re: Details
Re: Re: My details
Re: Approved
Re: Your application
Re: Wicked screensaver
Re: That movie
Body, it chooses one from the two following lines:
See the attached file for details
Please see the attached file for details.
Attachment names can be any from:
your_document.pif
document_all.pif
thank_you.pif
your_details.pif
details.pif
document_9446.pif
application.pif
wicked_scr.scr
movie0045.pif
Sometimes the attachment is missing.
Also, the mail header always contains this string: "X-MailScanner: Found to be clean". Do note that there's an anti-virus product which inserts this header to emails.
Sobig history
The following table shows all the Sobig variants, with their expiration dates and when they were first found in the wild. The "Detection" field refers to when we first had databases which detected the corresponding variant.
Variant _____ Found ______ Expires __________ Detection
_____________________________________________________________
Sobig.A ___ January 9th ___ NO ______________ 2003-01-09_04
Sobig.B ___ May 18th _____ May 31st _________ 2003-05-19_03
Sobig.C ___ May 31st _____ June 8th _________ 2003-06-01_01
Sobig.D ___ June 18th __ __ July 2nd ________ _ 2003-06-18_03
Sobig.E ___ June 25th __ __ July 14th _________ 2003-06-26_02
Sobig.F ___ August 19th ___ September 10th ___ 2003-08-19_02
_____________________________________________________________
Detection
F-Secure Anti-Virus detects the worm with:
[FSAV_Database_Version]
Version=2003-08-19_02
[Description: Ero Carrera, Veli-Jussi Kesti; 19th of August, 2003]
|
__________________
Life is shit,
Death is even worse,
So what's the point of killing yourself?
/Ignatius Camryn Paladine
|
|
|