Threat Advisory: McAfee AVERT Raises Risk Assessment to Medium on New W32/Sober.k@MM Virus
Threat Advisory: McAfee AVERT Raises Risk Assessment to Medium on New W32/Sober.k@MM Virus
McAfee AVERT Raises Risk Assessment Based on Prevalence
BEAVERTON, Ore., Jan. 31 /PRNewswire-FirstCall/ -- McAfee, Inc. (NYSE:MFE), the pioneer and worldwide leader of intrusion prevention solutions, today announced that McAfee(R) AVERT(TM) (Anti-virus and Vulnerability Emergency Response Team), the world-class research division of McAfee, Inc., raised the risk assessment to Medium on the recently discovered W32/Sober.k@MM, also known as Sober.k. Sober.k is a prolific worm that spreads via email, sending itself to addresses found on the victim's machine. The worm arrives as a .zip file attached to e-mail and has many of the same functionalities as its W32/Sober.j@MM predecessor. The worm was first reported to McAfee AVERT researchers last night GMT and to date, McAfee AVERT has received more than 50 reports of the virus in the wild.
Threat Overview
Sober.k is a mass mailing threat that contains its own SMTP engine to construct outgoing messages, which are written in German or English. It harvests addresses from local files and then uses the harvested addresses to send itself. This produces a message with a spoofed From address. The attachment comes in the form of a .zip file that contains an executable file inside. The filename contains a dual extension with the first extension being .TXT, followed by many spaces and the second extension .PIF.
Users would need to manually extract the executable from the .zip file and manually run the attachment in order to be infected. There's no exploit launching the executable automatically.
German Version:
From: (address is spoofed) Subject: Ey du DOOF Nase, warum beantw...
Message Body: The message body will be one of the following:
Warum beantwortest Du meine E-Mails nicht?
Kommen meine Mails nicht mehr bei dir an oder so???
Habe mir jetzt extra eine neue Mail Adresse bei GMX gemacht!
Ich hoffe mal, das sie jetzt zu dir durch dringen wird.
In meinen anderen Mails habe ich einige Wichtige Dinge niedergeschrieben,
hatte aber keine Lust alles nochmal zu schreiben.
Deshalb habe ich die alten Mail-Texte im Texteditor kopiert und mit
Winzip klei ner gemacht.
Lesen und diesmal auch bescheid geben!!!!
tschau.....
Attachment: Texte.zip
English Version:
Subject: I've got YOUR email on my account!!
Body: Hello, First, Sorry for my very bad English! Someone send your
private mails on my email account!I think it's an Mail-Provider or SMTP
error.
Normally, I delete such emails immediately, but in the mail-text is a
name & ad ress. I think it's your name and adress. In the last 8 days
i've got 7 mails in my mail-box, but the recipient are you, not me. lol
OK,
I've copied all email text in the Windows Text-Editor and i've zipped
the t ext file with WinZip. The sender of this mails is in the text file,
too.
bye
Attachment:
-- EMAIL_TEXT.ZIP or
-- TEXT.ZIP
The ZIP archive contains a copy of the worm with the following filename:
-- MAIL_TEXT-INFO.TXT (many spaces) .PIF
The importance of the mail is set to "High" (this will only have an effect for certain mail clients).
Threat Pathology
After being executed, Sober.k copies itself into the Windows System directory using a constructed name from a pool of strings and thus is variable, for example:
-- C:\WINDOWS\SYSTEM32\SYSSPOOLDISC.EXE
It also creates other files in this directory to perform its functions:
-- DATAMX.DAM (contains harvested email addresses)
-- DGSFZIPP.GMX (59.504 bytes, copy of the worm in a ZIP and base64
encoded)
Additionally the following 0 byte files are dropped:
-- dgssxy.yoi (0 bytes)
-- nonrunso.ber (0 bytes)
-- Odin-Anon.Ger (0 bytes)
-- sysmms32.lla (0 bytes)
The following Registry keys are added to hook system startup:
-- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
"adisccrypt" = %SYSDIR%\sysspooldisc.exe
-- HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
"dircryptlog" = %SYSDIR%\sysspooldisc.exe
(where %SYSDIR% is C:\Windows\System32 or C:\Winnt\System32)
And also note that the mentioned filenames are constructed from a pool of strings and are thus variable.
System Protection and Cure
More information on Sober.k and cure for this worm can be found online at the McAfee AVERT site located at http://vil.mcafeesecurity.com/vil/content/v_131355.htm. McAfee AVERT is advising its customers to update to the 4424 DATs to stay protected from this variant of the threat.
McAfee AVERT Labs is one of the top-ranked anti-virus and vulnerability research organizations in the world, employing researchers in fourteen countries on five continents. McAfee AVERT combines world-class malicious code and anti-virus research with intrusion prevention and vulnerability research expertise from the McAfee(R) IntruShield(R) and McAfee(R) Entercept(R) organizations, two research arms that were acquired through IntruVert Networks and Entercept Security. McAfee AVERT protects customers by providing cures that are developed through the combined efforts of McAfee AVERT researchers and McAfee AVERT AutoImmune technology, which applies advanced heuristics, generic detection, and ActiveDAT technology to generate cures for previously undiscovered viruses.
About McAfee, Inc.
McAfee, Inc., headquartered in Santa Clara, Calif., creates best-of-breed intrusion prevention and risk management solutions. McAfee's market-leading security products and services help large, medium and small businesses, government agencies, and consumers prevent intrusions on networks and protect computer systems from critical threats. Additionally, through the Foundstone Professional Services division, leading security consultants provide security expertise and best practices for organizations. For more information, McAfee, Inc. can be reached at 972-963-8000 or on the Internet at http://www.mcafee.com/.
NOTE: McAfee, AVERT, IntruShield, Entercept and Foundstone are either registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the United States and/or other countries. The color Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. (C)2005 McAfee, Inc. All Rights Reserved.
Photo: http://www.newscom.com/cgi-bin/prnh/20040426/MCAFEELOGO
AP Archive: http://photoarchive.ap.org/
PRN Photo Desk, photodesk@prnewswire.com
Source: McAfee, Inc.
CONTACT: Tracy Ross of McAfee, Inc., +1-408-346-5965 or
Tracy_ross@nai.com; or Ally Zwahlen of Porter Novelli, +1-408-489-9774 or
Ally.Zwahlen@porternovelli.com, for McAfee, Inc.
Web site: http://www.mcafee.com/
-------
Profile: intent
0 Comments:
Post a Comment
<< Home