Home / malware Worm:Win32/Taterf.B
First posted on 13 February 2009.
Source: SecurityHomeAliases :
Worm:Win32/Taterf.B is also known as Also Known As:Win32/Frethog.CUM (CA), W32/Lineage.KHE (Panda), Mal/Frethog-B (Sophos), Trojan-GameThief.Win32.Magania.ammv (Kaspersky), Generic PWS.ak (McAfee), Infostealer.Gampass (Symantec).
Explanation :
Worm:Win32/Taterf.B is a worm that spreads via logical drives to steal login and account details for popular online games.
Symptoms
System ChangesThe following system changes may indicate the presence of this malware:The presence of the following files:
<system folder>kamsoft.exe
<system folder>gasretyw<number>.dllThe presence of the following registry modifications:
Added value: "kamsoft"
With data: "<system folder>kamsoft.exe"
To subkey: HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun
Worm:Win32/Taterf.B is a worm that spreads via logical drives to steal login and account details for popular online games.
Installation
Worm:Win32/Taterf.B is composed of a loader component and a payload component. It drops the following files in the system with the attributed "hidden", "system", and "read-only":<system folder>kamsoft.exe - copy of itself, loader component <system folder>gasretyw<number>.dll - payload component; detected as Worm:Win32/Taterf.B.dll where <number> is a number between 0 to 9. Note - <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:WinntSystem32; and for XP and Vista is C:WindowsSystem32. Both of these files are detected as Worm:Win32/Taterf.B. It modifies the system registry so that its dropped copy runs every time Windows starts: Adds value: "kamsoft"
With data: "<system folder>kamsoft.exe"
To subkey: HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun It then injects its payload component into the currently-running "explorer.exe" process.Spreads Via...Logical DrivesWin32/Taterf.B attempts to drop the following files in the root of all drives from C: to Z::m9ma.exe - copy of itself autorun.inf - INF file that enables the worm copy to run automatically when the drive is accessed and Autorun is enabled To ensure that Autorun is enabled, it may modify the following registry entry: Adds value: "NoDriveTypeAutoRun"
With data: "00000091"
To subkey: HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer
Payload
Disables Antivirus ServicesWorm:Win32/Taterf.B attempts to stop the real-time protection service of antivirus products from the following vendors:Kaspersky Rising Modifies System SettingsTo avoid detection, Win32/Taterf.B changes the way that the system handles hidden files and folders by adding the following registry entries:s: Adds value: "CheckedValue"
With data: "0"
To key: HKLMSoftwareMicrosoftWindowsCurrentVersionExplorerAdvancedFolderHiddenSHOWALL Adds value: "Hidden"
With data: "2"
To subkey: HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerAdvanced Adds value: "ShowSuperHidden"
With data: "0"
To subkey: HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerAdvanced Steals User DetailsWin32/Taterf.B steals online game accounts and passwords by monitoring the system, especially the following game processes:pol.exe ageofconan.exe coc.exe knightonline.exe lotroclient.exe turbinelauncher.exe
Analysis by Shawn WangLast update 13 February 2009