Home / malware Win32.Worm.Korgo.C
First posted on 21 November 2011.
Source: BitDefenderAliases :
Win32.Worm.Korgo.C is also known as Win32/Korgo.C.worm.
Explanation :
The worm exploits the Microsoft LSASS Windows vulnerability for spreading.
http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx
Once run, the worm will do the following:
1. Attempts to delete FTPUPD.EXE from current location
2. Creates the mutex names: r10, u6, u7, uterm7
3. Checks if the [HKLM SOFTWAREMicrosoftWindowsCurrentVersionRun"SysTray"] entry exists
If the key exists:
Attempts to delete the registry entry: [HKLMSoftwareMicrosoftWireless"Client"]
If the key doesn't exist, it attempts to create it:
[HKLMSoftwareMicrosoftWireless"Client"="1"]
4. Creates a randomly named copy of the worm in %SYSTEM% folder, as ????????.exe where ? may be any letter.
5. Creates the registry entry
[HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionRun"SysTray"="%SYSTEM%????????.exe"]
in order to run at startup.
6. Executes the copy of the worm and terminates the current process.
7. Starts many threads, and enters an infinite loop, preventing the system from shutting down.
8. Opens ports: 113, 3067 and a random port between 2000 and 10191 but not multpile of 256, allowing remote connection and for sending the worm, scans random IP addresses in order to infect unpatched systems.
Also opens port 6667, as it attempts to connect to a list of IRC servers where it listens for commands
9. Attempts to delete the following registry keys:
- HKLMSoftwareMicrosoftWindowsCurrentVersionRun"avserve2.exe"
- HKLMSoftwareMicrosoftWindowsCurrentVersionRun"avserve.exe"
- HKLMSoftwareMicrosoftWindowsCurrentVersionRun"Windows Security Manager"
- HKLMSoftwareMicrosoftWindowsCurrentVersionRun"WinUpdate"Last update 21 November 2011