Home / malware Worm:Win32/Cambot.A
First posted on 28 September 2011.
Source: SecurityHomeAliases :
Worm:Win32/Cambot.A is also known as BackDoor.Blackshades.1 (Dr.Web), Win32/Spy.VB.NLS trojan (ESET), P2P-Worm.Win32.BlackControl (Ikarus), W32/Generic.worm!p2p (McAfee).
Explanation :
Worm:Win32/Cambot.A is a malware that can connect to a remote server to accept and execute commands from a remote attacker. The malware could be instructed to spread to removable drives, capture keystrokes and screenshots, download additional files and other actions. The malware could capture form data entered when visiting certain websites.
Top
Worm:Win32/Cambot.A is a malware that can connect to a remote server to accept and execute commands from a remote attacker. The malware could be instructed to spread to removable drives, capture keystrokes and screenshots, download additional files and other actions. The malware could capture form data entered when visiting certain websites.
Installation
Worm:Win32/Cambot.A may be installed by other malware, such as Trojan:MSIL/Gillver.A, or when connecting to a removable drive that is infected with Worm:Win32/Cambot.A. It may be present as the following:
- %TEMP%\goolge.exe.jpg
- %APPDATA%\goolge.exe
The registry is modified to run the worm at each Windows start.
In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "Google Tools"
With data: "%APPDATA%\goolge.exe"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Add value: "Google Tools"
With data: "%APPDATA%\goolge.exe"
In subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
Add value: "Google Tools"
With data: "%APPDATA%\goolge.exe"
In subkey: HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
Add value: "Google Tools"
With data: "%APPDATA%\goolge.exe"
Payload
Allows unauthorized access and control
This malware can connect to a remote server to accept and execute commands from a remote attacker. Commands could include any of the following actions:
- Log keystrokes
- Capture screen and webcam images
- Download additional files and update itself
- Spread to removable drives
- Load additional plugins
- Perform a DDoS attack
- Kill other bots
Capture Internet Explorer network traffic
This malware connects to the domain "play-support-email.com" to receive a list of websites. When the affected computer visits a website in the list, the malware could capture form data entered which can include sensitive information such as logon credentials. At the time of this writing, the list of websites includes the following:
- ADrive - adrive.com
- AlertPay - alertpay.com
- Amazon - amazon.com
- AT&T - att.com
- Bank of America - bankofamerica.com
- Best Buy - bestbuy.com
- Black Hat SEO Forum - blackhatworld.com
- CHASE Home - chase.com
- Citibank - citibank.com
- Consoles | GameStop - gamestop.com
- craigslist - craigslist.org
- Deposit Files - depositfiles.com
- deviantART - deviantart.com
- Direct2Drive - direct2drive.com
- EA Video Games - ea.com
- ePassporte - epassporte.com
- Escrow - escrow.com
- Facebook - facebook.com
- Fifth Third Bank - 53.com
- FileFactory - filefactory.com
- FilePlanet - fileplanet.com
- FileServe - fileserve.com
- FileSonic - filesonic.com
- GameFly - gamefly.com
- Go Daddy - godaddy.com
- Google Checkout - checkout.google.com
- Gunbound - gunbound.com
- Hack Forums - hackforums.net
- Harris Bank - harrisbank.com
- Hotfile - hotfile.com
- IBackup - ibackup.com
- ILoveI - iloveim.com
- IMVU - imvu.com
- LastPass - lastpass.com
- League of Legends LoL - leagueoflegends.com
- Liberty Reserve - libertyreserve.com
- Lockerz - lockerz.com
- MEGAUPLOAD - megaupload.com
- MEGAVIDEO - megavideo.com
- Moneybookers - moneybookers.com/app
- Myspace - myspace.com
- NameCheap - namecheap.com
- Netflix - netflix.com
- Network Solutions - networksolutions.com
- Newegg - newegg.com
- Online Internet Marketing - forums.digitalpoint.com
- Payment Gateway - authorize.net
- PayPal - paypal.com
- PlayStation - playstation.com
- Plimus - plimus.com
- PNC Bank - pnc.com
- RapidShare - rapidshare.com
- RoboForm - roboform.com
- RuneScape - runescape.com
- SitePoint - sitepoint.com
- Target - target.com
- TCF Bank - tcfbank.com
- TheVault - thevault.bz
- T-Mobile - t-mobile.com
- U.S. Cellular - uscellular.com
- ul.to - uploaded.to
- Unlimited free file storage - megashare.com
- Verizon - verizon.com
- Walmart.com - walmart.com
- Warez-BB - warez-bb.org
- WarriorForum - warriorforum.com
- WebMoney - wmtransfer.com
- Western Union - westernunion.com
- World of Warcraft - us.battle.net
- Xanga - xanga.com
- Xmarks - xmarks.com
Analysis by Shawn Wang
Last update 28 September 2011