Home / malware Worm:Win32/Mogoogwi.A
First posted on 11 March 2015.
Source: MicrosoftAliases :
There are no other names known for Worm:Win32/Mogoogwi.A.
Explanation :
Threat behavior
Installation
This threat installs itself to the following locations:
- C:\GoogleChrome\GoogleChrome.exe
- C:\MozillaFirefox\GoogleChrome.exe
It can also install the following files in any directory on your PC:
- GoogleUpdate.lnk
- MozillaFirefox.lnk
- My Music.lnk
.lnk - WindowsUpdate.lnk
It changes the following registry entry so that the LNK files run each time you start your PC:
In subkey: "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run"
Sets value: "JavaUpdate"
With data: "\GoogleUpdate.lnk", for example "C:\GoogleChrome\\GoogleUpdate.lnk"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "AdopeUpdate"
With data: "\GoogleUpdate.lnk", for example "C:\GoogleChrome\\GoogleUpdate.lnk"
In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "NewJavaInstall"
With data: "", for example "GoogleChrome.exe"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "AdopeFlash"
With data: "", for example "GoogleChrome.exe"
We have also seen the following malware installed at the same time as this worm:
- Trojan:MSIL/Mogoogwi.A
- Trojan:VBS/Mogoogwi.A
These threats are used to register the malicious LNK files in the registry.
Spreads through
Removable drives
This worm copies itself to the root folder of any removable drives connected to your PC, such as USB flash drives.
It also creates a shortcut LNK file pointing to the worm copy on the removable drive.
Payload
Receives commands from a malicious hacker
This worm tires to connect to the following command and control server to receive commands from a malicious hacker:
- dmad.info
Once connected it can be instructed to:
- Download and upload files and run them on your PC, including other malware.
- Uninstall itself to avoid analysis.
It also sends the following information about your PC to the server:
- Your operating system version and architecture
- Your PC name
- Your user name
- Your security software details
Modifies your firewall settings
This worm can add or remove applications from your firewall exception list.
Analysis by Zarestel Ferrer
Symptoms
The following can indicate that you have this threat on your PC:
- You have these files:
C:\GoogleChrome\GoogleChrome.exe
C:\MozillaFirefox\GoogleChrome.exe
GoogleUpdate.lnk
MozillaFirefox.lnk
My Music.lnk
WindowsUpdate.lnk
- You see these entries or keys in your registry:
In subkey: "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run"
Sets value: "JavaUpdate"
With data: "\GoogleUpdate.lnk", for example "C:\GoogleChrome\\GoogleUpdate.lnk"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "AdopeUpdate"
With data: "\GoogleUpdate.lnk", for example "C:\GoogleChrome\\GoogleUpdate.lnk"
In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "NewJavaInstall"
With data: "", for example "GoogleChrome.exe"
In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "AdopeFlash"
With data: "", for example "GoogleChrome.exe" Last update 11 March 2015