Home / malware Worm:Win32/Slenfbot
First posted on 27 March 2009.
Source: SecurityHomeAliases :
There are no other names known for Worm:Win32/Slenfbot.
Explanation :
Worm:Win32/Slenfbot is a worm that can spread via MSN Messenger, and may spread via removable drives. This worm spreads automatically via shares, but must be ordered to spread via messenger by a remote attacker. The worm also contains backdoor functionality that allows unauthorized access to an affected machine.
Symptoms
There are no specific symptoms that indicate the presence of Worm:Win32/Slenfbot as this is a generic detection and symptoms may vary from one instance of infection to the next.
Worm:Win32/Slenfbot is a worm that can spread via MSN Messenger, and may spread via removable drives. This worm spreads automatically via shares, but must be ordered to spread via messenger by a remote attacker. The worm also contains backdoor functionality that allows unauthorized access to an affected machine.
Installation
When executed, Worm:Win32/Slenfbot copies itself to the <system folder> with a filename that differs according to variant and sets the attributes for this copy to read only, hidden and system. It modifies the registry to run this copy at each Windows start. For example, Worm:Win32/Slenfbot.A copies itself to <system folder>
vsvc64.exe and makes the following modification to the registry: Adds value: "nVidia Display Driver"
With data: "nvsvc64.exe"
To subkey: HKLMSoftwareMicrosoftWindowsCurrentVersionRun Note - <system folder> refers to a variable location that is determined by the malware by querying the Operating System. The default installation location for the System folder for Windows 2000 and NT is C:WinntSystem32; and for XP and Vista is C:WindowsSystem32. The worm makes a further registry modification that causes the copy of the worm that was executed originally to be deleted when the system restarts: Sets value: "PendingFileRenameOperations"
With data: "<original malware executable>"
Under key: HKLMSystemCurrentControlSetControlSession Manager However, it also runs "cmd.exe /c del <original malware executable> nul" to immediately delete the original copy of the worm.When first run, the worm checks if Messenger is running by looking for a Window with the class name "MSBLWindowClass". If it finds this window, it displays the following fake error message:Spreads Via…MSN MessengerThis worm can be ordered to spread via Messenger by a remote attacker using the worm's backdoor functionality (see Payload below for additional detail). When the attacker orders the worm to spread via MSN Messenger, they must provide the following three parameters:A URL containing a list of possible messages to send, along with the worm itself, to MSN Messenger contacts. The worm chooses from this list at random. A file name for a ZIP archive. The worm creates a ZIP archive containing a copy of itself in the temporary folder with this name. The worm sends this ZIP archive to MSN Messenger contacts. A file name for the worm's executable inside the ZIP archive. Removable Drives
Worm:Win32/Slenfbot may attempt to spread via removable drives, except drives A and B. It does this by creating a directory called RECYCLER in the root of the removable drive. In then creates another directory underneath that with a name such as S-1-6-21-1257894210-1075856346-012573477-2315. The worm copies itself into this directory, with a file name such as “folderopen.exe”. For example: E:RECYCLERS-1-6-21-1257894210-1075856346-012573477-2315folderopen.exe The worm also creates an autorun.inf file in the root directory of the drive in order to launch the worm if, for example, the drive is connected to another machine. The worm sets the hidden and system attributes for all of the aforementioned directories and files. Note: Due to a bug, Slenfbot may only create one directory rather than two, such as: E:RECYCLERS-1-6-21-1257894210-1075856346-012573477-2315folderopen.exe
Payload
Backdoor FunctionalitySlenfbot attempts to connect to a particular IRC server via a particular TCP Port. The channel and port number differ according to variant. It joins a channel and waits for commands. Using this backdoor, an attacker can perform the following actions on an affected machine:remove itself join another IRC channel download and execute arbitrary files spread via MSN Messenger send arbitrary files via MSN Messenger When the attacker orders the worm to send an arbitrary file via MSN Messenger, they must provide all of the parameters used when spreading vis Messenger, plus a fourth:A URL for a file to download. The worm places this file in the ZIP archive, which it sends to MSN Messenger contacts, in place of itself. Modifies Hosts FileSlenfbot replaces <system folder>driversetchosts with a file that contains the following: # Copyright (c) 1993-1999 Microsoft Corp.
#
# This is a sample LMHOSTS file used by the Microsoft TCP/IP for Windows.
# This text is followed by 90 blank lines, presumably to make the file appear empty on casual inspection. After the blank lines it writes several entries to direct the following anti-virus and security related domains to localhost (127.0.0.1): bbs.360safe.com
blog.hispasec.com
blog.threatfire.com
customer.symantec.com
discussions.virtualdr.com
download.mcafee.com
file.ikaka.com
forum.piriform.com
forum.securitycadets.com
forum.tweaks.com
forums.techguy.org
guru0.grisoft.cz
guru1.grisoft.cz
guru2.grisoft.cz
guru3.grisoft.cz
guru4.grisoft.cz
guru5.grisoft.cz
hjt-data.trend-braintree.com
hjt.networktechs.com
liveupdate.symantec.com
liveupdate.symantecliveupdate.com
mast.mcafee.com
scanner.virus.org
secubox.aldria.com
securityresponse.symantec.com
update.symantec.com
updates.symantec.com
virscan.org
www.2-spyware.com
www.360.cn
www.analysis.seclab.tuwien.ac.at
www.antivir.es
www.antivirus.about.com
www.antivirus.comodo.com
www.auditmypc.com
www.avast.com
www.avg-antivirus.net
www.avira.com
www.avp.com
www.bitdefender.com
www.bleedingthreats.net
www.bleepingcomputer.com
www.ca.com
www.castlecops.com
www.clamav.net
www.clamwin.com
www.computing.net
www.csrrt.org
www.cwsandbox.org
www.daniweb.com
www.download.f-secure.com
www.eradicatespyware.net
www.eset.com
www.experts-exchange.com
www.f-prot.com
www.f-secure.com
www.firewallguide.com
www.forospyware.com
www.fortiguardcenter.com
www.fortinet.com
www.forums.majorgeeks.com
www.free-av.com
www.free.avg.com
www.free.grisoft.com
www.freespywareremoval.info
www.futurenow.bitdefender.com
www.geekstogo.com
www.grisoft.com
www.hijackthis.de
www.housecall.trendmicro.com
www.ikarus.net
www.infosecpodcast.com
www.kaspersky-labs.com
www.kaspersky.com
www.majorgeeks.com
www.mcafee.com
www.Merijn.org
www.net-security.org
www.networkworld.com
www.norman.com
www.offensivecomputing.net
www.onlinescan.avast.com
www.pandasecurity.com
www.pantip.com
www.pchell.com
www.pctools.com
www.prevx.com
www.research.sunbelt-software.com
www.safer-networking.org
www.sandboxie.com
www.siteadvisor.com
www.soccersuck.com
www.sophos.com
www.spyany.com
www.spybot.info
www.spywaredb.com
www.spywareinfo.com
www.spywareterminator.com
www.symantec.com
www.techimo.com
www.techspot.com
www.techsupportforum.com
www.thecomputerpitstop.com
www.threatexpert.com
www.trendmicro.com
www.trendsecure.com
www.tweaksforgeeks.com
www.viruschief.com
www.virusinfo.prevx.com
www.viruslist.com
www.virusspy.com
www.virustotal.com
www.webphand.com
www.whatthetech.com
www.wilderssecurity.com
zhidao.baidu.com Deletes FilesWhen first executed, Slenfbot runs the following commands:
CMD /C del /F /S /Q *.zip
CMD /C del /F /S /Q *.com
CMD /C del /F /S /Q "%HOMEPATH%My DocumentsMy Recieved Files*.zip
CMD /C del /F /S /Q "%HOMEPATH%My DocumentsMy Recieved Files*.com These commands will delete files names named *.zip and *.com in the current directory and the user's "Received Files" directory, the location where Windows Messenger, by default, stores files it downloads. The intention of this is obviously to delete the original copy of the worm that was received via Messenger.Modifies System Settings
Slenfbot deletes the following registry keys (and any subkeys and values they contain):
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSafeBootMinimal
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSafeBootNetwork It also makes the following registry modifications:
Sets value: "Disabletaskmgr"
With data: "1"
Under key HKCUSOFTWAREMicrosoftWindowsCurrentVersionPoliciesSystem
Sets value: "DisableSR"
With data: "1"
Under key HKLMSOFTWAREMicrosoftWindows NTCurrentVersionSystemRestore
Sets value: "DisableConfig"
With data: "1"
Under key HKLMSOFTWAREPoliciesMicrosoftWindows NTSystemRestore Sets value: "Disableregistrytools"
With data: "1"
Under key HKCUSOFTWAREMicrosoftWindowsCurrentVersionPoliciesSystem
Sets value: "NoClose"
With data:"1"
Under key HKLMSOFTWAREMicrosoftWindowsCurrentVersionpoliciesExplorer
Sets value: "Start"
With data: "4"
Under key HKLMSYSTEMCurrentControlSetServiceswscsvc Terminates Processes
Slenfbot may terminate the following processes on an affected machine:
123.COM
123.EXE
360HOTFIX.EXE
360RPT.EXE
360SAFE.EXE
360TRAY.EXE
A2HIJACKFREESETUP.EXE
ACAAS.EXE
ACAEGMGR.EXE
ACAIS.EXE
ACALS.EXE
AFMAIN.EXE
AHNSDSV.EXE
ALERTMAN.EXE
ALMON.EXE
ALSVC.EXE
APM.EXE
APORTS.EXE
APT.EXE
ASHMAISV.EXE
ASHSERV.EXE
ASHWEBSV.EXE
ASVIEWER.EXE
ASWCLNR.EXE
ASWUPDSV.EXE
AUTORUNS.EXE
AVENGER.EXE
AVGARKT.EXE
AVGSCANX.EXE
AVGUARD.EXE
AVGUI.EXE
AVGUPD.EXE
AVGWDSVC.EXE
AVIRARKD.EXE
BC5CA6A.EXE
BDAGENT.EXE
BDSS.EXE
BOXMOD.EXE
CATCHME.EXE
CCENTER.EXE
CF9409.EXE
COMBOFIX.EXE
CPORTS.EXE
CPROCESS.EXE
DARKSPY105.EXE
DELAYDELFILE.EXE
DLLCOMPARE.EXE
DRWEB32W.EXE
DRWEBSCD.EXE
DUBATOOL_AV_KILLER.EXE
EULALYZERSETUP.EXE
F-PROT.EXE
F-PROT95.EXE
F-STOPW.EXE
FAMEH32.EXE
FAST.EXE
FCH32.EXE
FIH32.EXE
FILEALYZ.EXE
FILEFIND.EXE
FIXPATH.EXE
FNRB32.EXE
FOLDERCURE.EXE
FP-WIN.EXE
FPORT.EXE
FPROT.EXE
FSAA.EXE
FSAV.EXE
FSAV32.EXE
FSAV530STBYB.EXE
FSAV530WTBYB.EXE
FSAV95.EXE
FSB.EXE
FSBL.EXE
FSGK32.EXE
FSM32.EXE
FSMA32.EXE
FSMB32.EXE
GMER.EXE
HACKMON.EXE
HELIOS.EXE
HIJACKTHIS.EXE
HOOKANLZ.EXE
HOSTSFILEREADER.EXE
ICESWORD.EXE
IEFIX.EXE
INSTALLWATCHPRO25.EXE
KAKASETUPV6.EXE
KAV.EXE
KAVSVC.EXE
KILLAUTOPLUS.EXE
KILLBOX.EXE
LIVESRV.EXE
LORDPE.EXE
MAKEREPORT.EXE
MCAGENT.EXE
MCSHIELD.EXE
MCUPDATE.EXE
MCVSRTE.EXE
MCVSSHLD.EXE
MSASCUI.EXE
MSCONFIG.EXE
MSMPENG.EXE
MSNFIX.EXE
MYPHOTOKILLER.EXE
NETALYZ.EXE
NETSTAT.EXE
NMAIN.EXE
NOD32.EXE
NOD32CC.EXE
NOD32KRN.EXE
NOD32KUI.EXE
NOD32M2.EXE
OBJMONSETUP.EXE
OLLYDBG.EXE
PAVARK.EXE
PCTSAUXS.EXE
PCTSGUI.EXE
PCTSSVC.EXE
PCTSTRAY.EXE
PG2.EXE
PGSETUP.EXE
PORTDETECTIVE.EXE
PORTMONITOR.EXE
PROCDUMP.EXE
PROCESSMONITOR.EXE
PROCEXP.EXE
PROCMON.EXE
PROJECTWHOISINSTALLER.EXE
PSKILL.EXE
RAV.EXE
RAVLITE.EXE
RAVMOND.EXE
RAVTASK.EXE
REANIMATOR.EXE
REG.EXE
REGALYZ.EXE
REGCOOL.EXE
REGEDIT.EXE
REGISTRAR_LITE.EXE
REGSCANNER.EXE
REGSHOT.EXE
REGX2.EXE
RKD.EXE
ROOTALYZER.EXE
ROOTKITBUSTER.EXE
ROOTKITNO.EXE
ROOTKITREVEALER.EXE
ROOTKIT_DETECTIVE.EXE
RTVSCAN.EXE
SAVADMINSERVICE.EXE
SAVSERVICE.EXE
SCFMANAGER.EXE
SCFSERVICE.EXE
SCHED.EXE
SDFIX.EXE
SEEM.EXE
SPF.EXE
SPIDERML.EXE
SPIDERNT.EXE
SPIDERUI.EXE
SPYBOTSD.EXE
SPYBOTSD160.EXE
SRENGLDR.EXE
SRENGPS.EXE
STARTDRECK.EXE
SUPERKILLER.EXE
SYSANALYZER_SETUP.EXE
TASKKILL.EXE
TASKLIST.EXE
TASKMAN.EXE
TASKMGR.EXE
TASKMON.EXE
TCPVIEW.EXE
TEATIMER.EXE
UISCAN.EXE
ULIBCFG.EXE
UNHACKME.EXE
UNIEXTRACT.EXE
UNLOCKER1.8.7.EXE
VSMON.EXE
VSSERV.EXE
WIRESHARK.EXE
WITSETUP.EXE
XCOMMSVR.EXE
ZLCLIENT.EXE Uses StealthSlenfbot is also capable of hiding its process from task manager.Additional InformationSlenfbot variants create a mutex that also differs according to variant. For example, Worm:Win32/Slenfbot.A creates the mutex "I3.1".
Analysis by Hamish O'DeaLast update 27 March 2009