Home / malware Worm:Win32/Ructo.J
First posted on 06 September 2011.
Source: SecurityHomeAliases :
There are no other names known for Worm:Win32/Ructo.J.
Explanation :
Worm:Win32/Ructo.J is a worm that spreads via Windows Live Messenger. It also lowers system security settings and downloads other malicious files from a remote server.
Top
Worm:Win32/Ructo.J is a worm that spreads via Windows Live Messenger. It also lowers system security settings and downloads other malicious files from a remote server.
Installation
When executed, Worm:Win32/Ructo.J drops the following files:
- <Computer name>mplayer2.exe - copy of itself
- <Computer name>mac.exe - malicious component also detected as Worm:Win32/Ructo.J
It then creates the following registry entry to be able to execute itself every time Windows starts:
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "wmplayer"
With data: "<Computer name>mplayer2.exe"
Sets value: "mac"
With data: "<Computer name>mac.exe"
Worm:Win32/Ructo.J then opens an Internet Explorer window to the following webpage:
Spreads via...
- youtube.com/watch?v=Bb_9w_9sroE
Windows Live Messenger
For it to spread via Windows Live Messenger, Worm:Win32/Ructo.J first checks the version of the file "%ProgramFiles%\Messenger\msgsc.dll". If the file version is not 4.7.0.3001, which is an old version, then it downloads the following:
- videoschatjogos.servegame.com/part/win.rar
and saves it as "%ProgramFiles%\Messenger\msgsc.dll".
It then checks Windows Live Messenger for the following statuses:
- MISTATUS_ONLINE
- MISTATUS_AWAY
- MISTATUS_BE_RIGHT_BACK
- MISTATUS_BUSY
- MISTATUS_UNKNOWN
If any of these statuses are found, Worm:Win32/Ructo.J attempts to send messages containing a hyperlink to the affected user's contacts. The hyperlink may point to a remotely-hosted copy of the worm.
In the wild, it has been observed to send out the following hyperlinks:
- ferreirasilva678.com/<removed>.php
- limamagalhaes.com/<removed>.php
- limamagalhaes.tempsite.ws/<removed>.php
- ssl5211.websiteseguro.com/ferreirasilva678/<removed>.php
- ssl5474.websiteseguro.com/limamagalhaes/<removed>.php
Payload
Terminates processes
The malicious component dropped file "mac.exe" is responsible for terminating the following security-related processes if found in the affected computer:
- AVGIDSAgent.exe
- avgchsvx.exe
- avgcsrvx.exe
- avgemcx.exe
- avgidsmonitor.exe
- avgnsx.exe
- avgrsx.exe
- avgtray.exe
- avgui.exe
- avast.setup
- AvastSvc.exe
- AvastUI.exe
Lowers system security settings
Worm:Win32/Ructo.J lowers system security settings by creating the following registry entries:
In subkey: HKCU\Software\Microsoft\Internet Explorer\Download
Sets value: "RunInvalidSignatures"
With dataL "00000001"
In subkey: HKCU\Software\Microsoft\Internet Explorer\Download
Sets value: "CheckExeSignatures"
With dataL "no"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Attachments
Sets value: "SaveZoneInformation"
With dataL "00000001"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations
Sets value: "LowRiskFileTypes"
With dataL ".zip;.rar;.nfo;.txt;.exe;.bat;.com;.cmd;.reg;.msi;.htm;.html;.gif;.bmp;.jpg;.avi;.mpg;.mpeg;.mov;.mp3;.m3u;.wav;.scr;"
Downloads and executes arbitrary files
Worm:Win32/Ructo.J downloads the following files related to the Win32/Banker family:
- vipshost1.myvnc.com/imagem/dll.rar - saved as "rEvents.dll" and registered as a Browser Helper Object
- masterhost1.myvnc.com/imagem/up.rar - saved and executed as "up.exe"
Gathers chat logs
Worm:Win32/Ructo.J also the capability to gather chat logs or archives stored in the affected computer. It then sends these logs to a specific email address.
Analysis by Ric Robielos
Last update 06 September 2011