In this weeks report on viruses and intruders we will look a backdoor Trojan, known as Beliu.A, and the worms Mydoom.BN and Mytob.P.
Beliu.A has been classified as a backdoor Trojan because it opens a backdoor in computers in order to allow an attacker to access it and carry out malicious actions. To be more specific, Beliu.A connects to the Internet server liubei.8866.org, through which the attacker can gain control of the affected computer and carry out different actions. These actions include downloading, moving and deleting files, running commands and ending processes. It uses port 8080 and HTTP to connect to this server. It could even work in networks protected by firewalls, as port 8080 is usually open to traffic.
Beliu.A normally reaches computers in an email with the subject MOFCOM IPR Report-English Version! and an attachment called International IPR Conventions China Acceded to.doc. This Word document exploits the MS01-028 vulnerability to download the files http://220.127.116.11/ek/normal2.dot and http://18.104.22.168/ek/liu8080.exe, the second of which is this backdoor Trojan.
The first worm in todays report is a new variant of MyDoom, Mydoom.BN. This worm spreads via email using its own SMTP engine and it looks for email addresses to send itself to in the Windows address book and files with different extensions, including htm, xml, wml, asp or wab. To avoid raising suspicion, it does not send itself out to the addresses or domains that appear in an internal list.
The message carrying the code can have different subjects, which include subjects that try to trick the user in thinking that it is a mail delivery error, such as Mail Delivery System, Mail Transaction Failed or Server Report.
The message body also refers to errors, like Mail transaction failed. Partial message is available or The message contains Unicode characters and has been sent as a binary attachment. The attachment contains the virus and can have one of several different names (document, readme, doc, message, etc.) with a Windows executable file extension (pif, scr, exe, cmd or bat).
The last malicious code in todays report is Mytob.P, a worm with backdoor characteristics. This worm spreads by looking in the network for shared resources whose users have used passwords that are easy to guess. It can also spread via email in a message with a spoofed senders address and an attached file. It obtains the email addresses it sends itself to from files on the computer with different extension, such as.htm, .php, .wab, etc.
However, it does not send itself out to certain addresses to avoid being detected rapidly by certain users or companies. For example, it avoids sending itself to addresses that contain the words abuse, admin, gnu, ibm.com, or panda.
The message subject can be a set text (Error, Mail Delivery System, Mail Transaction Failed, Server Report, etc), a random string or could be blank. The message body also refers to an error message and the name of the attachment is taken from a list and has a Windows executable file extension.
On receiving a possibly infected file, Panda Software's technical staff get straight down to work. The file is analyzed and depending on the type, the action taken may include: disassembly, macro scanning, code analysis etc. If the file does in fact contain a new virus, the disinfection and detection routines are prepared and quickly distributed to users.
For more information: http://www.pandasoftware.com/virus_info/