Home / malware Worm:Win32/Morto.D
First posted on 29 November 2011.
Source: SecurityHomeAliases :
There are no other names known for Worm:Win32/Morto.D.
Explanation :
Worm:Win32/Morto.D is malware that loads, decrypts, and executes the main Morto payload.
Top
Worm:Win32/Morto.D is malware that loads, decrypts, and executes the main Morto payload.
Installation
Worm:Win32/Morto.D is a DLL file that performs the main Morto payload.
When executed, it is installed as the following files:
- %windir%\clb.dll
- %windir%\offline web pages\cache.txt
If updated by the malware, a back-up of the first file is created as "clb.dll.bak".
Note that a legitimate file also named "clb.dll" exists by default in the Windows system folder. Because of how files in Windows are searched for and run, the malware file "clb.dll" is actually run instead of the legitimate file.
Spreads via...
Network access via RDP port 3389
Worm:Win32/Morto.D attempts to spread to other computers by checking for those connected via RDP sessions to other computers by default. It also enumerates IP addresses on the affected computer's subnet and attempts to connect to these computers using certain user names and passwords
Payload
Contacts remote host
Worm:Win32/Morto.D connects to the following hosts to download additional information and update its components:
- fc<random number>.j<removed>mt.net
- j<removed>fr.co.be
- j<removed>fr.co.cc
- j<removed>fr.info
- j<removed>fr.net
- qf<removed>l.co.be
- qf<removed>l.co.cc
- qf<removed>l.net
- sc.j<removed>mt.net
Newly downloaded components are saved as files using the following naming format:
<random characters>~MTMP<4 hexadecimal digits>.exe
Performs denial of service attacks
Worm:Win32/Morto.D may be ordered to perform denial-of-service (DoS) attacks against specified targets.
Terminates security processes
Worm:Win32/Morto.D terminates processes that contain the following strings in their name. The selected strings indicate that the worm is attempting to stop processes related to popular security-related applications.
- 360rp
- ACAAS
- ArcaConfSV
- AvastSvc
- FPAVServer
- FortiScand
- GDFwSvc
- K7RTScan
- KVSrvXP
- MPSvc
- MsMpEng
- NSESVC.EXE
- PavFnSvr
- RavMonD
- SavService
- SpySweeper
- Vba32Ldr
- a2service
- avguard
- avgwdsvc
- avpmapp
- ccSvcHst
- cmdagent
- coreServiceShell
- freshclam
- fsdfwd
- knsdave
- kxescore
- mcshield
- scanwscs
- vsserv
- zhudongfangyu
Clears system event log
Worm:Win32/Morto.D deletes the following system event logs:
Additional information
- Application log
- Security log
- System log
If this file is running as a service or within the context of the "rundll32.exe" process, it attempts to read the payload component in the drive "\\tsclient\a\moto", which is a drive used by the Morto family to spread. It then compares the data stored in this drive to that saved in the subkey "HKLM\SYSTEM\Wpa\md". If the data is identical, it executes the payload component.
Analysis by Zarestel Ferrer
Last update 29 November 2011