sobota 25. února 2012

Worm:Win32/Cambot.A


Encyclopedia entry
Updated: Sep 23, 2011  |  Published: May 12, 2011

Aliases
  • BackDoor.Blackshades.1 (Dr.Web)
  • Win32/Spy.VB.NLS trojan (ESET)
  • P2P-Worm.Win32.BlackControl (Ikarus)
  • W32/Generic.worm!p2p (McAfee)

Alert Level (?)
Severe

Antimalware protection details
Microsoft recommends that you download the latest definitions to get protected.
Detection last updated:
Definition: 1.121.253.0
Released: Feb 23, 2012
Detection initially created:
Definition: 1.103.1522.0
Released: May 12, 2011


 

Summary

Worm:Win32/Cambot.A is a malware that can connect to a remote server to accept and execute commands from a remote attacker. The malware could be instructed to spread to removable drives, capture keystrokes and screenshots, download additional files and other actions. The malware could capture form data entered when visiting certain websites.


 

Symptoms

System changes
The following system changes may indicate the presence of this malware:
  • The presence of the following files:
    • %TEMP%\goolge.exe.jpg
    • %APPDATA%\goolge.exe
  • The presence of the following registry modifications:

    In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Run
    Sets value: "Google Tools"
    With data: "%APPDATA%\goolge.exe"
    In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
    Add value: "Google Tools"
    With data: "%APPDATA%\goolge.exe"
    In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
    Add value: "Google Tools"
    With data: "%APPDATA%\goolge.exe"
    In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
    Add value: "Google Tools"
    With data: "%APPDATA%\goolge.exe"


 

Technical Information (Analysis)

Worm:Win32/Cambot.A is a malware that can connect to a remote server to accept and execute commands from a remote attacker. The malware could be instructed to spread to removable drives, capture keystrokes and screenshots, download additional files and other actions. The malware could capture form data entered when visiting certain websites.
Installation
Worm:Win32/Cambot.A may be installed by other malware, such as Trojan:MSIL/Gillver.A, or when connecting to a removable drive that is infected withWorm:Win32/Cambot.A. It may be present as the following:
  • %TEMP%\goolge.exe.jpg
  • %APPDATA%\goolge.exe
The registry is modified to run the worm at each Windows start.
In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "Google Tools"
With data: "%APPDATA%\goolge.exe"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Add value: "Google Tools"
With data: "%APPDATA%\goolge.exe"
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
Add value: "Google Tools"
With data: "%APPDATA%\goolge.exe"
In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
Add value: "Google Tools"
With data: "%APPDATA%\goolge.exe"
Payload
Allows unauthorized access and control
This malware can connect to a remote server to accept and execute commands from a remote attacker. Commands could include any of the following actions:
  • Log keystrokes
  • Capture screen and webcam images
  • Download additional files and update itself
  • Spread to removable drives
  • Load additional plugins
  • Perform a DDoS attack
  • Kill other bots
Capture Internet Explorer network traffic
This malware connects to the domain "play-support-email.com" to receive a list of websites. When the affected computer visits a website in the list, the malware could capture form data entered which can include sensitive information such as logon credentials. At the time of this writing, the list of websites includes the following:
  • ADrive - adrive.com
  • AlertPay - alertpay.com
  • Amazon - amazon.com
  • AT&T - att.com
  • Bank of America - bankofamerica.com
  • Best Buy - bestbuy.com
  • Black Hat SEO Forum - blackhatworld.com
  • CHASE Home - chase.com
  • Citibank - citibank.com
  • Consoles | GameStop - gamestop.com
  • craigslist - craigslist.org
  • Deposit Files - depositfiles.com
  • deviantART - deviantart.com
  • Direct2Drive - direct2drive.com
  • EA Video Games - ea.com
  • ePassporte - epassporte.com
  • Escrow - escrow.com
  • Facebook - facebook.com
  • Fifth Third Bank - 53.com
  • FileFactory - filefactory.com
  • FilePlanet - fileplanet.com
  • FileServe - fileserve.com
  • FileSonic - filesonic.com
  • GameFly - gamefly.com
  • Go Daddy - godaddy.com
  • Google Checkout - checkout.google.com
  • Gunbound - gunbound.com
  • Hack Forums - hackforums.net
  • Harris Bank - harrisbank.com
  • Hotfile - hotfile.com
  • IBackup - ibackup.com
  • ILoveI - iloveim.com
  • IMVU - imvu.com
  • LastPass - lastpass.com
  • League of Legends LoL - leagueoflegends.com
  • Liberty Reserve - libertyreserve.com
  • Lockerz - lockerz.com
  • MEGAUPLOAD - megaupload.com
  • MEGAVIDEO - megavideo.com
  • Moneybookers - moneybookers.com/app
  • Myspace - myspace.com
  • NameCheap - namecheap.com
  • Netflix - netflix.com
  • Network Solutions - networksolutions.com
  • Newegg - newegg.com
  • Online Internet Marketing - forums.digitalpoint.com
  • Payment Gateway - authorize.net
  • PayPal - paypal.com
  • PlayStation - playstation.com
  • Plimus - plimus.com
  • PNC Bank - pnc.com
  • RapidShare - rapidshare.com
  • RoboForm - roboform.com
  • RuneScape - runescape.com
  • SitePoint - sitepoint.com
  • Target - target.com
  • TCF Bank - tcfbank.com
  • TheVault - thevault.bz
  • T-Mobile - t-mobile.com
  • U.S. Cellular - uscellular.com
  • ul.to - uploaded.to
  • Unlimited free file storage - megashare.com
  • Verizon - verizon.com
  • Walmart.com - walmart.com
  • Warez-BB - warez-bb.org
  • WarriorForum - warriorforum.com
  • WebMoney - wmtransfer.com
  • Western Union - westernunion.com
  • World of Warcraft - us.battle.net
  • Xanga - xanga.com
  • Xmarks - xmarks.com
Analysis by Shawn Wang

Žádné komentáře:

Okomentovat

Poznámka: Komentáře mohou přidávat pouze členové tohoto blogu.