Home / malwarePDF  

Worm:Win32/Ambler.A


First posted on 04 January 2010.
Source: SecurityHome

Aliases :

Worm:Win32/Ambler.A is also known as Trojan.Win32.Vilsel.ppi (Kaspersky), Trojan.Generic.CJ.AIET (BitDefender), Win32/Spy.Ambler.BB (ESET), Trojan-Downloader.Win32.BHO.lcp (Kaspersky), BHO.JTM (AVG), Win32/Spy.Ambler.M (ESET).

Explanation :

Worm:Win32/Ambler.A is a worm that spreads via networked and removable drives, and attempts to steal sensitive information, such as passwords, from an affected computer.
Top

Worm:Win32/Ambler.A is a worm that spreads via removable drives, and attempts to steal sensitive information, such as passwords, from an affected computer.

Installation
When run, Worm:Win32/Ambler.A drops several randomly-named files onto the system. These file names vary from one instance of Ambler to the next, but in the wild one example has been observed to create the following files:

  • <system folder>\inform.dat (an encrypted copy of itself)
  • <system folder>\klpl1.dll
  • <system folder>\uiv
  • Note - <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:\Winnt\System32; and for XP, Vista, and 7 is C:\Windows\System32. Ambler launches the dropped DLL component and registers itself as a BHO. It makes a number of registry modifications in order to facilitate its actions on the affected computer. For example, one variant made the following registry modifications: Sets value: "(Default)"
    With data: "DCOM service"Sets value: "Locale" With data: "EN"Sets value: "StubPath"
    With data: "rundll32 klpl1.dll,laspi"Sets value: "IsInstalled"
    With data: "1"Sets value: "Version"
    With data: "4,3,6,3"To subkey: HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{859374EE-7A74-4844-A161-33A579B1C4A6} Sets value: "BN"
    With data: "@g[g."To subkey: HKLM\Software\MSN Sets value: "(default)"
    With data: "msn helper"To subkey: HKLM\SOFTWARE\Classes\CLSID\{D62023F8-B0B6-4381-8C85-D07E5C45CA76} Sets value: "(default)"
    With data: "klpl1.dll"To subkey: HKLM\SOFTWARE\Classes\CLSID\{D62023F8-B0B6-4381-8C85-D07E5C45CA76}\InprocServer32 Sets value: "(default)"
    With data: "glok"To subkey: HKLM\SOFTWARE\Classes\CLSID\{D62023F8-B0B6-4381-8C85-D07E5C45CA76}\ProgID Sets "(default)"
    With data: "{7357e059-704b-43b2-b82a-024510b52945}"To subkey: HKLM\SOFTWARE\Classes\CLSID\{D62023F8-B0B6-4381-8C85-D07E5C45CA76}\TypeLib Sets value: "DisableTaskMgr"
    With data: "1"To subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System Sets value: "DisableRegistryTools"
    With data: "1"To subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System Sets "dcom"
    With data: "rundll32.exe klp1l.dll,ID"To subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnceSpreads via€¦ Removable drivesAmbler may attempt to spread via removable drives. It does this by creating a directory called RECYCLER in the root of the removable drive. In then copies itself into this directory, with a file name such as €œrecycld.exe€. For example: <targeted drive>:\RECYCLER\recycld.exe The worm also creates an autorun.inf file in the root directory of the drive in order to launch the worm if, for example, the drive is connected to another machine. The worm sets the hidden and system attributes for all of the aforementioned directories and files.

    Payload
    Steals sensitive informationThis worm attempts to steal stored passwords from the following locations:
  • Microsoft Outlook Express
  • Internet Explorer password protected sites
  • MSN Explorer Signup
  • Internet Explorer auto complete fields
  • Internet Explorer auto complete passwords
  • Internet cookies
  • Passwords stored in pstore.dll
  • It may then create the following files in the <system folder> in order to store the stolen data:

    m1.dat
    o6.dat
    br1.dat
    ca.dat
    nk.dat
    o3.dat
    l4.dat
    jc.dat
    c2d.dat
    idm.dat
    pld.dat
    q1.dat
    ck.dat
    bx.dat
    xd.dat Stolen data is sent to a remote attacker. In the wild, Worm:Win32/Ambler.A has been observed to contact testthenewsource.net for this purpose.


    Analysis by Tim Liu

    Last update 04 January 2010

     

    TOP