MalwareIntelligence is a site dedicated to research on all matters relating to anti-malware security, criminology computing and information security in general, always from a perspective closely related to the field of intelligence.

21.6.09

Symbiosis malware present. Koobface

Koobface is a worm designed to exploit the user profiles of popular social networks like MySpace and FaceBook in order to obtain sensitive and confidential information of their victims, although the latest versions limiting their goal FaceBook. In fact, the word Koobface is a transposition of the word Facebook.

His early versions date back to late 2008 and since then continues In-the-Wild with an infection rate of concern. Thus, the same company released a series of preventive measures to minimize the potential risk of infection, which is constantly latent for users who use the social network.

In principle, the usual means of dissemination used Koobface is via web through visual Social Engineering and is the first facet of propagation.

The second facet (infection) channeled their malicious actions in a very common at present, based on a combination of malware, creating a symbiosis where each component of ambient display instructions to seek a common objective and comprehensive.

But let's see which are these components that form a part of the stage of infection of the variant Koobface. NBO. This worm, detected nowadays by approximately 31 companies antivirus of 41 (75.61 %), on having infected the system establishes connection with the following URL's:

    http://oberaufseher.net/img/cmd.php 
    http://pornfat.net/img/cmd.php

    It also downloads the following malware:

    TrojanDownloader.Small.OCS Troyano 
    Tinxy.AD Troyano 
    Tinxy.AF Troyano 
    BHO.NOE Troyano 
    Koobface.NBH gusano 
    PSW.LdPinch.NEL Troyano
      From the technical point of view, some data can be collected in the brief preliminary analysis of each of the malicious code downloaded by Koobface:

      The trojan TrojanDownloader.Small.OCS has a detection rate of 35/40 (87.5%) creates keys in the registry and backs himself. 

        HKLM\SOFTWARE\Microsoft\MSSMGR\   
        HKLM\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon\Notify\winccf32   
        C:\WINDOWS\system32\winccf32.dll (copy of itself). 

        Tinxy.AF, another trojan, it also creates files in the system and has a detection rate of slightly less than the previous 30/40 (75.00%). 

          C:\windows\ld09.exe   
          C:\docume~1\user\locals~1\temp\podmena.bat 

          The trojan Tinxy.AD has a detection rate of 35/40, was detected by approximately 87.50% of the virus. Creates a copy of itself and makes use of the tool to enable a NetShell DLL, open ports, and specify a proxy. 

            C:\WINDOWS\system32\SYSDLL.exe (copy of itself)   
            netsh add allowedprogram "SYSDLL" C:\WINDOWS\System32\SYSDLL.exe ENABLE   
            netsh firewall add portopening TCP 80 SYSDLL ENABLE   
            netsh firewall add portopening TCP 7171 SYSDLL ENABLE   
            netsh winhttp set proxy proxy-server="http=localhost:7171" Agrega la informaciĆ³n del proxy en:HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings" /v ProxyServer /d "http=localhost:7171" /f 

            BHO.NOE is another of the trojans as part of the process of infection Koobface, with a detection rate of 92.11% (35/38), create a folder and a file. 

              C:\WINDOWS\system32\796525   
              C:\WINDOWS\system32\796525\796525.dll

              As to PSW.LdPinch.NEL trojan, detected by 34 antivirus of 40 (85.00%), is designed to steal passwords from different web browsers, mail clients, IM clients and other services.

              Finally, download a variant of the family, the worm Koobface.NBH, in this case, the detection rate was 27/40 (approx. 67.50%).

              As we can see, the infection of this malware isn't just limited to malicious instructions they have, but it goes beyond that and download another. This action is a common behavior in the present, where the fusion of Web applications and control of botnets and the administration of different types of malware, joining forces with a common goal: improving the economics of crime. 

              Jorge Mieres

              0 comentarios:

              Post a Comment