Home / malware Worm:Win32/Gamarue.P
First posted on 19 March 2013.
Source: MicrosoftAliases :
There are no other names known for Worm:Win32/Gamarue.P.
Explanation :
Installation
In the wild we have seen Worm:Win32/Gamarue.P arrive within an attached file to a spam email.
The subject of the email and the name of the attachment varies. Recent variations of the subject line include:
- "ACH transaction notification"
- "Track Advice Notification: Consignment <random letters and numbers>", for example "Track Advice Notification: Consignment RYR1211342"
The following is an example of the email message body:
ACH transaction is completed. $0423 has been successfully transferred.
If the transaction was made by mistake please contact our customer service.
Receipt of payment is attached.
*** This is an automatically generated email, please do not reply ***
The attached file is a .zip file that may look life a .pdf file, to trick you into opening it. Some examples include:
- AUSPOST_Track_Advice_Notification.pdf.zip
- AWB-Avis 973-57256084.pdf.zip
- AWB-Avis_765-94666621.pdf.zip
- FuelCard-ebill6614419.PDF.zip
- FuelCard-ebill7791516.PDF.zip
- FuelCard-ebill8773152.PDF.zip
- ITINERARY5959454.zip
- Payment receipt - 884993762994.zip
- Payment_notification_id_43897345.zip
The email tells you to open the attachment to view a receipt. The attachment contains a malicious executable file, for example €œpayment receipt - 884993762994.exe€Â.
If you open the executable file, the worm copies itself to the %ALLUSERPROFILE% folder on your computer. It uses a name in the format €œ<random name>.<extension>€Â, where <extension> may be one of the following:
- bat
- cmd
- com
- exe
- pif
- scr
For example, the file could be called "dxnaya.exe". It sets the system and hidden attributes for this file.
Worm:Win32/Gamarue.P also modifies the following registry entry to ensure that its copy runs at each Windows start:
In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run
Sets value: "59870"
With data: "%ALLUSERS%\<random string>.<extension>", for example "C:\Documents and Settings\all users\dxnaya.exe"
It also creates an instance of the system process €œmsiexec.exe€ and "svchost.exe". It then injects its code into these processes to make removal more difficult.
These processes are then detected as VirTool:Win32/Injector.gen!DH
Spreads via€¦
Removable drives
Worm:Win32/Gamarue.P may create copies of itself on removable drives.
It also places an autorun.inf file in the root directory of the targeted drive. Such autorun.inf files contain instructions for the operating system so that when the removable drive is accessed from another computer supporting the Autorun feature, the malware is launched automatically.
This is particularly common malware behavior, generally used in order to spread malware from computer to computer.
It should be noted that autorun.inf files on their own are not necessarily a sign of infection, as they are used by legitimate programs and installation media.
Payload
Downloads other files
Worm:Win32/Gamarue.P may connect to the following servers via HTTP POST to report that it has infected your computer and to download additional arbitrary files:
Related encyclopedia entries
- barcolo.biz
- barthuilorpo.biz
- bromekasrte.biz
- coretec.pl
- elmara.ru
- fixt.su
- jolkipolik.biz
- kitro.pl
- margnijkie.biz
- mokilapol.biz
- morolaoply.biz
- mrakoboss.ru
- ophia.ru
- ripnhuipn.ru
- tguniverse.com
- wguniverse.com
Win32/Gamarue
Analysis by Wei li
Last update 19 March 2013