W32/Bagle.j@MM

This page shows details and results of our analysis on the malware W32/Bagle.j@MM

Overview

This is a virus detection. Viruses are programs that self-replicate recursively, meaning that infected systems spread the virus to other systems, which then propagate the virus further. While many viruses contain a destructive payload, it's quite common for viruses to do nothing more than spread from one system to another.


Minimum DAT

4332 (2004-03-02)

Updated DAT

5090 (2007-08-03)

Minimum Engine

5400.1158

File Length

Varies

Description Added

2004-03-02

Description Modified

2004-03-13

Malware Proliferation

Characteristics

-- Update March 13, 2004 --
Due to decreased prevalence, the risk assessment of this threat has been lowered to Low-Profiled.

-- Update March 2nd 4:38pm PST --
The risk assessment of this threat has been raised to medium due to increased prevalence.

If you think that you may be infected with Bagle.j, and are unsure how to check your system, you may download the Stinger tool to scan your system and remove the virus if present.  This is not required for McAfee users as McAfee products are capable of detecting and removing the virus with the latest update. (see the removal instructions below for more information).
Note: Receiving an email alert stating that the virus came from your email address is not an indication that you are infected as the virus often forges the from address.

This is a mass-mailing worm with the following characteristics:

  • contains its own SMTP engine to construct outgoing messages
  • harvests email addresses from the victim machine
  • the From: address of messages is spoofed
  • attachment can be a password-protected zip file, with the password included in the message body.
  • contains a remote access component (notification is sent to hacker)
  • copies itself to folders that have the phrase shar in the name (such as common peer-to-peer applications; KaZaa, Bearshare, Limewire, etc)

Mail Propagation

The message-bodies are constructed with several parts, to effectively customize the email, to make it appear to be a legitimate warning notification. The details are as follows:

From : (address is spoofed)
Subject :

  • E-mail account security warning.
  • Notify about using the e-mail account.
  • Warning about your e-mail account.
  • Important notify about your e-mail account.
  • Email account utilization warning.
  • Notify about your e-mail account utilization.
  • E-mail account disabling warning.

Body Text:

Greeting -

  • Dear user of (user's domain) ,
  • Dear user of (user's domain) gateway e-mail server,
  • Dear user of e-mail server "(user's domain) ",
  • Hello user of (user's domain) e-mail server,
  • Dear user of "(user's domain) " mailing system,
  • Dear user, the management of (user's domain) mailing system wants to let you know that,

(Where the user's domain is chosen from the To: address. For example the user's domain for user@mail.com  would be "mail.com")

Main message body -

  • Your e-mail account has been temporary disabled because of unauthorized access.
  • Our main mailing server will be temporary unavaible for next two days, to continue receiving mail in these days you have to configure our free
    auto-forwarding service.
  • Your e-mail account will be disabled because of improper using in next
    three days, if you are still wishing to use it, please, resign your
    account information.
  • We warn you about some attacks on your e-mail account. Your computer may contain viruses, in order to keep your computer and e-mail account safe, please, follow the instructions.
  • Our antivirus software has detected a large ammount of viruses outgoing from your email account, you may use our free anti-virus tool to clean up your computer software.
  • Some of our clients complained about the spam (negative e-mail content) outgoing from your e-mail account. Probably, you have been infected by a proxy-relay trojan server. In order to keep your computer safe, follow the instructions.

Attachment explanation -

  • For more information see the attached file.
  • Further details can be obtained from attached file.
  • Advanced details can be found in attached file.
  • For details see the attach.
  • For details see the attached file.
  • For further details see the attach.
  • Please, read the attach for further details.
  • Pay attention on attached file.

Password information -  (if received as a ZIP file) 

  • For security reasons attached file is password protected. The password is "(five random numbers) ".
  • For security purposes the attached file is password protected. Password is "(five random numbers) ".
  • Attached file protected with the password for security reasons. Password is (five random numbers) .
  • In order to read the attach you have to use the following password: (five random numbers) .

Closing -

  • The Management,
  • Sincerely,
  • Best wishes,
  • Have a good day,
  • Cheers,
  • Kind regards,

The (user's domain) team                           http://www.(user's domain)

(Where the first part of the closing is selected from the list. The second part is always present.)

Attachment: (May be .EXE .PIF or .ZIP)

  • Attach
  • Information
  • Readme
  • Document
  • Info
  • TextDocument
  • TextFile
  • MoreInfo
  • Message

The virus copies itself into the Windows System directory as IRUN4.EXE. For example:

  • C:\WINNT\SYSTEM32\IRUN4.EXE

It also creates a file IRUN4.EXEOPEN which may either be another copy of itself or a ZIP file (~13KB) to be sent in email.

    The following Registry key is added to hook system startup:

    • HKEY_CURRENT_USER\Software\Microsoft\Windows\
      CurrentVersion\Run "ssate.exe" = C:\WINNT\SYSTEM32\irun4.exe

    Like its predecessors, this worm checks the system date. If it is the 25th of April 2005 or later, the worm simply exits and does not propagate.

    The worm uses the following icon, to make it appear that the file is a WordPad document:
     

    This worm attempts to terminate the process of security programs with the the following filenames:

    • ATUPDATER.EXE
    • AUPDATE.EXE
    • AUTODOWN.EXE
    • AUTOTRACE.EXE
    • AUTOUPDATE.EXE
    • AVLTMAIN.EXE
    • AVPUPD.EXE
    • AVWUPD32.EXE
    • AVXQUAR.EXE
    • CFIAUDIT.EXE
    • DRWEBUPW.EXE
    • ICSSUPPNT.EXE
    • ICSUPP95.EXE
    • LUALL.EXE
    • MCUPDATE.EXE
    • NUPGRADE.EXE
    • OUTPOST.EXE
    • UPDATE.EXE

    The worm opens port 2745 (TCP) on the victim machine.

    Symptoms

    • Port 2745 (TCP) open on the victim machine
    • Outgoing messages matching the described characteristics
    • Files/Registry keys as described

    Method of Infection

    Mail Propagation

    This virus constructs messages using its own SMTP engine. Target email addresses are harvested from files with the following extensions on the victim machine:

    • .ADB
    • .ASP
    • .CFG
    • .CGI 
    • .DBX
    • .EML
    • .HTM
    • .MDX
    • .MMF
    • .MSG
    • .NCH
    • .ODS
    • .PHP
    • .PL
    • .SHT
    • .TBB
    • .TXT
    • .UIN
    • .WAB
    • .XML

    The virus spoofs the sender address by using a harvested address in the From: field.

    The virus avoids sending itself to addresses containing the following:

    • @hotmail.com
    • @msn.com
    • @microsoft
    • @avp.
    • noreply
    • local
    • root@
    • postmaster@

    Peer To Peer Propagation

    Files are created in folders that contain the phrase shar :

    • ACDSee 9.exe
    • Adobe Photoshop 9 full.exe
    • Ahead Nero 7.exe
    • Matrix 3 Revolution English Subtitles.exe
    • Microsoft Office 2003 Crack, Working!.exe
    • Microsoft Office XP working Crack, Keygen.exe
    • Microsoft Windows XP, WinXP Crack, working Keygen.exe
    • Opera 8 New!.exe
    • Porno pics arhive, xxx.exe
    • Porno Screensaver.scr
    • Porno, sex, oral, anal cool, awesome!!.exe
    • Serials.txt.exe
    • WinAmp 5 Pro Keygen Crack Update.exe
    • WinAmp 6 New!.exe
    • Windown Longhorn Beta Leak.exe
    • Windows Sourcecode update.doc.exe
    • XXX hardcore images.exe

    Remote Access Component

    The virus listens on TCP port 2745 for remote connections. It attempts to notify the author that the infected system is ready to accept commands, by contacting various websites, calling a PHP script on the remote sites. At the time of this writing this script does not exist on any of these sites.

  • http://postertog.de/scr.php
  • http://www.gfotxt.net/scr.php
  • http://www.maiklibis.de/scr.php

  • Removal

    All Users :
    Use specified engine and DAT files for detection and removal.

    Alternatively, the following EXTRA.DAT packages are available (working with EXTRA.DAT files ).

    EXTRA.DAT
    SUPER EXTRA.DAT

    Additional Windows ME/XP removal considerations

    If you see detection of this threat on your system, a reboot and additional scan may be required to clean this completely.

    Manual Removal Instructions
    To remove this virus "by hand", follow these steps:

    1. Reboot the system into Safe Mode (hit the F8 key as soon as the Starting Windows text is displayed, choose Safe Mode.
    2. Delete the file following from your WINDOWS System directory (typically C:\Windows\System or C:\Winnt\System32)
      IRUN4.EXE    
      IRUN4.EXEOPEN
    3. Edit the registry
      • Delete the "ssate.exe" value from
        • HKEY_CURRENT_USER\Software\Microsoft\
          Windows\CurrentVersion\Run
    4. Reboot the system into Default Mode

    Stinger
    Stinger has been updated to assist in detecting and repairing this threat.

    Sniffer Customers:
    Filters have been developed that will look for traffic for the .G, .H and .J variants of W32/Bagle [Sniffer Distributed 4.1/4.2/4.3, Sniffer Portable 4.7/4.7.5, and Netasyst].

    McAfee Threatscan
    ThreatScan signatures that can detect the W32/Bagle.j@MM virus are available from:

    ThreatScan Signature version:  2004-03-02

    ThreatScan users can detect the virus by running a ThreatScan task using the following settings:

    • Select the "Remote Infection Detection" category and "Windows Virus Checks" template.

    -or- 

    • Select the "Other" category and "Scan All Vulnerabilities" template.

    For additional information:
    Run the "ThreatScan Template Report"
    Look for module number #4069

    ThreatScan users can detect the remote access component by running a Resource Discovery Task using the following settings:

    -Select TCP Port scan
    -Enter port: 2745

    McAfee Desktop Firewall
    To prevent possible remote access McAfee Desktop Firewall users can block incoming TCP port 2745.

    Variants