Type
Win32 worm
Sophos has received many reports of this worm from the wild.
Description
W32/Bagle-AF is a member of the W32/Bagle family of email worms.
W32/Bagle-AF spreads by email. The email addresses are collected from files on the computer containing the following file extensions:
WAB, TXT, MSG, HTM, SHTM, STM, XML, DBX, MBX, MDX, EML, NCH, MMF, ODS, CFG, ASP, PHP, PL, WSH, ADB, TBB, SHT, XLS, OFT, UIN, CGI, MHT, DHTM, JSP.
W32/Bagle-AF uses its own internal SMTP engine to spread.
The worm sends a HTML based email with the following characteristics:
Sender:
The sender address is always spoofed.
Attachment Name:
The basename of the attachment is choosen from the following list:
Information
Details
text_document
Updates
Readme
Document
Info
Details
Message
W32/Bagle-AF is able to send itself as an encrypted ZIP file, a CPL file or a normal executable file with the extension EXE, COM or SCR.
Subject line:
Re: Msg reply
Re: Hello
Re: Yahoo!
Re: Thank you!
Re: Thanks
RE: Text message
Re: Document
Incoming message
Re: Incoming Message
RE: Incoming Msg
RE: Message Notify
Notification
Changes..
Update
Fax Message
Protected message
RE: Protected message
Forum notify
Site changes
Re: Hi
Encrypted document
Mesage text:
When the worm arrives in an unencrypted (i.e directly executable) file the message text is one of the following:
Read the attach.
Your file is attached.
More info is in attach.
See attach.
Please, have a look at the attached file.
Your document is attached.
Please, read the document.
Attach tells everything.
Attached file tells everything.
Check attached file for details.
Check attached file.
Pay attention at the attach.
See the attached file for details.
Message is in attach
Here is the file.
When the worm attaches itself as an encrypted file the password is included in the email as an bitmap image and the message text is one of the following:
For security reasons attached file is password protected.
The password is <bitmap file>
For security purposes the attached file is password protected.
Password -- <bitmap file>
Attached file is protected with the password for security reasons.
Password is <bitmap file>
In order to read the attach you have to use the following
password: <bitmap file>
Note: Use password <bitmap file> to open archive
Archive password: <bitmap file>
Password - <bitmap file>
Password: <bitmap file>
The ZIP file contains an executable with the extensions EXE, COM or SCR and
a benign text file with one of the extensions INI, CFG, TXT, VXD, DEF OR DLL.
The worm the tries to remove registry run entries for several security
and anti-virus related products. The following entries are removed from
HKLM\Software\Microsoft\Windows\CurrentVersion\Run if they exist:
My AV
Zone Labs Client Ex
9XHtProtect
Antivirus
Special Firewall Service
service
Tiny AV
ICQNet
HtProtect
NetDy
Jammer2nd
FirewallSvr
MsInfo
SysMonXP
EasyAV
PandaAVEngine
Norton Antivirus AV
KasperskyAVEng
SkynetsRevenge
ICQ Net
W32/Bagle-AF copies itself to the Windows system folder and creates a registry entry to run itself on startup under:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
W32/Bagle-AF then creates copies of itself in all folders containing the substring SHAR on all drives. The worm uses the following filenames:
Microsoft Office 2003 Crack, Working!.exe
Microsoft Windows XP, WinXP Crack, working Keygen.exe
Microsoft Office XP working Crack, Keygen.exe
Porno, sex, oral, anal cool, awesome!!.exe
Porno Screensaver.scr
Serials.txt.exe
KAV 5.0
Kaspersky Antivirus 5.0
Porno pics arhive, xxx.exe
Windows Sourcecode update.doc.exe
Ahead Nero 7.exe
Windown Longhorn Beta Leak.exe
Opera 8 New!.exe
XXX hardcore images.exe
WinAmp 6 New!.exe
WinAmp 5 Pro Keygen Crack Update.exe
Adobe Photoshop 9 full.exe
Matrix 3 Revolution English Subtitles.exe
ACDSee 9.exe
http://www.sophos.com/virusinfo/analyses/w32bagleaf.html