Home / malware Worm:Win32/Brontok.FFV
First posted on 17 May 2010.
Source: SecurityHomeAliases :
Worm:Win32/Brontok.FFV is also known as Win32/Detnat.E (AhnLab), W32/Backdoor.BVDW (Authentium (Command)), Worm.Win32.Detnat.e (Kaspersky), Detnat.gen1 (Norman), Worm.VB.FMU (VirusBuster), Trojan horse Downloader.Generic2.OEH.dropper (AVG), TR/VB.BG (Avira), Trojan.FakeFolder.A (BitDefender), Win32/Bacalid (CA), Win32.HLLW.Blank (Dr.Web), Win32/Bacalid.A (ESET), Worm.Win32.Brontok (Ikarus), W32/Bacalid.gen (McAfee), W32/Bacalid.A (Panda), Worm.Win32.Detnat.g (Rising AV), W32/Bacalid-A (Sophos), Trojan.Win32.Generic.pak!cobra (Sunbelt Software), W32.SillyFDC (Symantec), PE_VBAC.A (Trend Micro) more.
Explanation :
Worm:Win32/Brontok.FFV is detection for a variant of the Win32/Brontok worm family. This variant of the Brontok family spreads by copying itself to removable drives. It can disable antivirus and security software and modify Windows settings.
Top
Worm:Win32/Brontok.FFV is detection for a variant of the Win32/Brontok worm family. This variant of the Brontok family spreads by copying itself to removable drives. It can disable antivirus and security software and modify Windows settings. InstallationWhen run, Worm:Win32/Brontok.FFV may create copies of itself as the following:<system folder>\dllchache\empty.jpg <system folder>\dllchache\blank.doc <system folder>\dllchache\zero.txt <system folder>\dllchache\hole.zip <system folder>\dllchache\unoccupied.reg <system folder>\dllcache\regedit32.com <system folder>\dllcache\ shell32.com <system folder>\rund1132.exe <system folder>\m5vbvm60.exe <system folder>\dllchache.exe c:\aut0exec.bat %windir%\system32.exe
Worm:Win32/Brontok.FFV launches dropped copies of the worm with "ReStart" as a parameter, for example, " C:\WINDOWS\system32\dllChache\Empty.jpg ReStart". Note - <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32. The worm drops a non-malicious Visual Basic runtime library file as the following: <system folder>\dllchache\msvbvm60.dll The registry is modified to run dropped copies of the worm during certain Windows events.At each Windows start:
Sets value: "Secure64"
With data: "<system folder>\dllcache\regedit32.com startup"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "Blank AntiViri"
With data: "c:\aut0exec.bat startup"
In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Modifies value: "Userinit"
From data: "<system folder>\userinit.exe,"
To data: "<system folder>\userinit.exe, "<system folder>\m5vbvm60.exe startup""
In subkey: HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
When starting Windows in Safe mode
Modifies value: "AlternateShell"
From data: "cmd.exe"
To data: "c:\aut0exec.bat startup"
In subkey: HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot
When opening files of type "text" (any file with extension ".dic", ".exc", ".log", ".scp", ".txt", ".wtx")
Modifies value: "(default)"
From data: "%SystemRoot%\system32\NOTEPAD.EXE %1"
To data: "<system folder>\rund1132.exe %1"
In subkey: HKLM\Software\Classes\txtfile\shell\open\command
When opening files of type "com" (any file with extension ".com") Spreads via€¦ Removable drivesWorm:Win32/Brontok.FFV attempts to copy itself to removable drives using random file names such as:
Modifies value: "(default)"
From data: ""%1" %*"
With data: "<system folder>\rund1132.exe %1"
In subkey: HKLM\Software\Classes\comfile\shell\open\commandsubst.exe new folder.exe The worm increases the chance of running the worm copy by a curious computer user by modifying the file icon of the worm copy to resemble the default icon for file folders. Payload Terminates security applicationsWorm:Win32/Brontok.FFV attempts to terminate processes associated with security software such as the following process names: antivirus.exe avgw.exe ccenter.exe navw32.exe Modifies Windows settingsThe worm prevents the display of hidden Windows system files by modifying registry data. Sets value: "ShowSuperHidden"
With data: "0"
To subkey: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced The worm makes another trivial settings change by modifying the registry to display the full path of files or folders in the Explorer title bar. Sets value: "FullPath"With data: "1"In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\CabinetState Additional InformationThe worm drops a text file as "c:\(read me)pendekar blank.txt". The data file contains text written in Indonesian.
Analysis by Lena LinLast update 17 May 2010