Home / malware Gattman.A
First posted on 13 September 2006.
Source: SecurityHomeAliases :
Gattman.A is also known as Pe_Gattman.A-O, W32/Gattman.A.
Explanation :
Gattman.A is a file infector targeted at IDC files. IDC files are proprietary script files for the popular reverse engineering tool IDA Pro. The author's purpose seems to be the creation of a proof-of-concept file infector with the aim of fooling security researchers. However, due to the very specific nature of the files it attempts to infect, the threat can be considered almost null.
Infected IDC files can usually be restored by opening them with a text editor and manually removing the code created by the malware.
Gattman.A can arrive on the victim's computer in two ways:
Executable file
Infected IDC script
Both the executable file and the IDC script need to be executed for Gattman.A to activate. (IDC needs to be explicitly executed from inside IDA Pro.) If the executable file is launched, it will start looking for IDC files starting from its current directory and recursing through subdirectories. When it finds a file suitable for infection, it will inject its own code into the script, maintaining the original code of the script. The injected code is responsible to recreate the executable file and execute it. This code is polymorphic: it is composed by oligomorphic IDC commands that will recreate the original binary executable, while the polymorphism consists of randomly generated comments.
It is notable that the executable created by running the IDC script is constant.
If the created IDC file is executed it will recreate the binary file and will execute it. After the execution is terminated, the binary file will be removed.Last update 13 September 2006