Home / malware Worm:iPhoneOS/Ikee.C
First posted on 03 December 2009.
Source: SecurityHomeAliases :
There are no other names known for Worm:iPhoneOS/Ikee.C.
Explanation :
Worm:iPhoneOS/Ikee.C is a worm that uses the default root password in SSH in order to spread among jail-broken iPhones. The worm also changes the affected machine's background image.
Top
Worm:iPhoneOS/Ikee.C is a worm that uses the default root password in SSH in order to spread among jail-broken iPhones. The worm also changes the affected machine's background image.
Installation
When run on an iPhone, this worm takes the following actions:Attempts to set a file lock at /var/lock/bbot.lock in order to verify that only one copy of the worm runs at a time. Attempts to copy the file /var/log/youcanbeclosertogod.jpg to /var/mobile/Library/LockBackground.jpg Removes the /usr/sbin/sshd directory and stops the SSH daemon. Attempts to spread using several hard-coded IP ranges. When the worm infects a remote host, it does so by copying /bin/poc-bbot, /bin/sshpass and /var/log/youcanbeclosertogod.jpg from the local system to the remote system. It also copies /var/log/youcanbeclosertogod.jpg to /var/mobil/Library/LockBackground.jpg on the remote system. The file /System/Library/LaunchDaemons/com.ikey.bbot.plist is also copied to the remote system and the following command is run: "launchctl load /System/Library/LaunchDaemons/com.ikey.bbot.plist" This command is used to load the worm remotely, and to add it to startup on reboot on the remote machine. The worm then remotely stops the SSH daemon and deletes the automatic start on reboot option for the SSH service.
Analysis by Dan KurcLast update 03 December 2009