Home / malware Win32.Worm.Korgo.R
First posted on 21 November 2011.
Source: BitDefenderAliases :
Win32.Worm.Korgo.R is also known as Worm.Win32.Padobot.k, Win32/Korgo.S, Win32.Lsabot.
Explanation :
The worm spreads by exploiting the Microsoft Windows LSASS Buffer Overrun vulnerabilty (MS04-011).
This version is a minor update to Win32.Worm.Korgo.P
Once run the virus will do the following:
When run it attempts to remove the file "ftpupd.exe", creates the mutex "uterm18" to avoid a duplicate process running simultaneously and if no error has occured it adjusts its token's privileges.
After that it tries to remove the following entries from the start-up key
"HKLMSoftwareMicrosoftWindowsCurrentVersionRun":
Windows Security Manager
Disk Defragmenter
System Restore Service
Bot Loader
SysTray
WinUpdate
Windows Update Service
avserve.exe
avserve2.exeUpdate Service
MS Config v13
At this time it also tries to kill the processes containing the processes having in their names one of the strings pointed to by the above mentioned names.
Next "HKLMSoftwareMicrosoftWireless" is checked for the presence of "ID" string; if it doesn't exist it is initialized with a string of 13 to 20 random characters.
Then it checks for "Windows Update" string in "HKLMSoftwareMicrosoftWindowsCurrentVersionRun" key and if doesn't exist it creates that string pointing to a random generated file name from 5 to 12 characters [rand].exe and copies the worm to "%system%[rand].exe". In this case it also sets a new string "Client" in "HKLMSoftwareMicrosoftWireless" with the value "1" and finally executes that copy of the worm and exits the current instance.
When run after it has self-installed or on "normal" start-up the worm tries to inject a thread into the first "Shell_TrayWnd" window class it finds and if it manages so it quits. Otherwise it does the following same things, as the injected thread does, from the main process:
- attempts to open and set the following events: u10x, u11x, u12x, u13x, u14x, u15x, u16x, u17x and u18x
- creates the following mutexes: u8, u9, u10, u11, u12, u13, u13i, u14, u15, u16, u17 and u18
- creates three threads used for spreading and checking for updates
- chosses a random port between 257 and 8191 excluding all multiples of 256 on which it creates a pseudo HTTP server managed by a new thread
- using the HTTP server the successful exploit fetches and executes a copy of the worm
- the delay between two update checks is randomly chosen from 400.2 to 700.2 seconds
- the update thread searches randomly the following sites for updates:
mazafaka.ru
xware.cjb.net
citi-bank.ru
konfiskat.org
adult-empire.com
parex-bank.ru
kidos-bank.ru
crutop.nu
kavkaz.tv
color-bank.ru
master-x.com
asechka.ru
fethard.biz
roboxchange.com
filesearch.ru
www.redline.ru
cvv.ru
The worm also prevents the system from shutting down by entering a loop that each 5 seconds aborts system shutdown.Last update 21 November 2011