首页
社区
课程
招聘
[IT业界] 百度国际杀毒团队捕获通过多态感染型蠕虫病毒
发表于: 2013-10-23 21:40 779

[IT业界] 百度国际杀毒团队捕获通过多态感染型蠕虫病毒

2013-10-23 21:40
779
本帖最后由 ttrobert 于 2013-10-23 12:03 编辑

基本信息
病毒名称: Worm.Win32.Mabezat.Al
病毒别名: Worm.Win32.Mabezat.b
病毒类型: 感染型蠕虫病毒
样本长度: 244,079字节
样本MD5:**********
样本SHA1:**********
文件类型: PE_EXE
原始文件名: N/A
首次出现时间:2013-07-31
感染范围:N/A
感染目标:Windows

样本概述
百度国际杀毒团队反病毒监测网捕获了一个多态感染型蠕虫病毒,除了通过文件感染传播,还通过电子邮件附件、网络共享、移动驱动器和CD刻录进行传播,并对某个时间段生成的文件进行加密。

详细分析
运行后的流程
释放%Root%\Documents and Settings\tazebama.dll文件,加载并执行tezebama.dll,tazebama.dll释放下列病毒副本:
%SystemDrive%\Documents and Settings\hook.dl_
%SystemDrive%\Documents and Settings\tazebama.dl_
创建tazebama.dl_进程,并运行被感染样本的原始代码。

文件列表
操作        文件        MD5
新增        %SystemDrive%\Documents and Settings\
tazebama.dl_        D57DB1296AA405E1BA6AC12304C959EA
新增        %SystemDrive%\Documents and Settings\
hook.dl_        D57DB1296AA405E1BA6AC12304C959EA
新增        %SystemDrive%\Documents and Settings\
tazebama.dll        B6A03576E595AFACB37ADA2F1D5A0529
新增        %SystemDrive%\Documents and Settings\
Administrator\Application Data\tazebama\
zPharaoh.dat        
新增        %SystemDrive%\Documents and Settings\
Administrator\Application Data\tazebama\
tazebama.log        
新增        autorun.inf        
新增         zPharaoh.exe        70c53885a5d7be8753ff83015e1c50f9

1.jpg
图1:样本文件衍生关系

3.3        代码分析
1)        传播的细节
i.        通过邮件传播
根据下列网站来判断是否连接网络,
2.jpg
图2:判断网络连接

通过邮件进行传播,邮件内容有如下几种:
标题:hi
内容:    Unfortunately, I received unformatted email with an attached file from you. I couldn',27h,'t understand what is behind the words I wish you next time send me a readable file! I forwarded the attached file again to evaluate your self.
附件: notes.rar

标题: ÇóêYóÇÑ
内容: ÇáóáÇã úáíßã¡¡¡ÇáÑóÇáé Çáêí êã à ÑóáåÇ ãä Tèáßã íæã ÇáÃíÏ ÇáóÇèTáã äóêØú Yåã Çáã TÕæÏ Yí ÇáãáY ÇáãÑYT. æáTÏ ÃÑYTä Ç Yí åDå ÇáÑóÇáéÇáãáY ááãÑÇìúé. äÑìæ ãäßã ÇáêßÑ ã èãÑÇìúé ãíêæìÇáãáY æÅÑóÇáå áä Ç ãÑé ÃÎÑì
附件: doc2.rar

标题:  ÑóÇáé êìÑíèíé
内容: ÑóÇáé êìÑíèíé. íÑìì êíãíá ÇáãáY ÇáãÑYT æÇáêÃßÏ ãä Çäå íúãá èÔßáÕííí æÅúáÇãí ÅDÇíÏË ÎØÃ ãÇ..
附件: doc2.rar

标题: ABOUT PEOPLE WITH WHOM MATRIMONY IS PROHIBITED
内容:
1 : If a man commits adultery with a woman, then it is not permissible for him to marry her mother or her daughters.
2 : If a woman out of sexual passion and with evil intent commits sexual intercourse with a man, then it is not permissible for the mother or daughters of that woman to merry that man. In the same way, the man who committed sexual intercourse with a woman, because prohibited for her mother and daughters.
Download the attached article to read.
附件: PROHIBITED_MATRIMONY.rar

标题: Windows secrets
内容:
The attached article is on \"how to make a folder password\". If your are interested in this article download it, if you are not delete it.
附件: FolderPW_CH(1).rar

标题: Canada immigration
内容:
The debate is no longer about whether Canada should remain open to immigration. That debate became moot when Canadians realized that low birth rates and an aging population would eventually lead to a shrinking populace. Baby bonuses and other such incentives couldn't convince Canadians to have more kids, and demographic experts have forecasted that a Canada without immigration would pretty much disintegrate as a nation by 2050.\nDownload the attached file to know about the required forms.\nThe sender of this email got this article from our side and forwarded it to you.
附件: IMM_Forms_E01.rar

标题: Viruses history
内容:
Nowadays, the viruses have become one of the most dangerous syste ms to attack the computers. There are a lot of kinds of viruses. The common and popular kind is called "Trojan.Backdoor" which run s as a backdoor of the victim machine. This enables the virus to 'have a full remote administration of the victim machine. To read the full story about the viruses history since 1970 download the attached  and decompress It by WinRAR.
The sender has red the story and forwarded it to you.
附件: virushistory.rar

标题: Web designer vacancy
内容:
'Fortunately, we have recently received your CV/Resume from moiste  web site and we found it matching the job requirements we offer. If your are interested in this job Please send us an updated CV s' howing the required items with the attached file that we sent. Thanks & Regards, Ajy Bokra Computer department. AjyBokra@webconsulting.com
附件: JobDetails.rar

标题: MBA new vision
内容:
MBA (Master of business administration ) one of the most required  degree around the world. We offer a lot of books helping you to gain this degree. We attached one of our .doc word formatted book s on "Marketing basics" to download.'
Our web site 1a9K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4c8S2P5X3g2#2L8Y4k6Q4x3X3g2W2k6s2g2Q4x3X3g2U0M7W2)9J5c8X3#2T1j5g2)9J5c8X3W2F1k6X3!0Q4x3X3g2Z5N6r3@1`.
Contacts:
Human resource
Ajy klaf
AjyKolav@tazeunv.com
The sender has added your name to be informed with our services.
附件: Marketing.rar

标题: problem
内容:
When I had opened your last email I received some errors have been saved in the attached file .Please inform me with those errors as soon as possible.
附件: outlooklog.rar

邮件的附件中的文件为病毒变形后的副本,它是通过获取shell32.dll中的文件夹图标、RAR文件图标、DOC图标来进行伪装,并通过software\\microsoft\\windows\\CurrentVersion \\App Paths\\WinRAR.exe进行压缩。
3.jpg
图3:文件图标修改程序
\  4.jpg
图4:修改后的文件图标

变形后的感染副本的文件名有:
GoogleToolbarNotifier.exe
PanasonicDVD_DigitalCam.exe
Antenna2Net.exe
RadioTV.exe
Microsoft MSN.exe
Sony Erikson DigitalCam.exe
IDE Conector P2P.exe
Windows Keys Secrets.exe
FaxSend.exe
RecycleBinProtect.exe
Disk Defragmenter.exe
CD Burner.exe
ShowDesktop.exe
BrowseAllUsers.exe
LockWindowsPartition.exe
Win98compatibleXP.exe
MakeUrOwnFamilyTree.exe
WindowsXp StartMenu Settings.exe
Recycle Bin.exe
Adjust Time.exe
Microsoft Windows Network.exe
HP_LaserJetAllInOneConfig.exe
FloppyDiskPartion.exe
msjavx86.exe
AmericanOnLine.exe
Crack_GoogleEarthPro.exe
Lock Folder.exe
InstallMSN11En.exe
InstallMSN11Ar.exe
JetAudio dump.exe
KasperSky6.0 Key.doc.exe
Office2007 Serial.txt.exe
Office2003 CD-Key.doc.exe
Make Windows Original.exe
NokiaN73Tools.exe
WinrRarSerialInstall.exe
My Documents                                                                                     .exe
Readme.doc .exe
My documents .exe

邮件附件文件名有:
windows.rar
office_crack.rar
serials.rar
passwords.rar
windows_secrets.rar
source.rar
imp_data.rar
documents_backup.rar
backup.rar
MyDocuments.rar

在全盘搜索时,根据文件后缀进行判断,如果是下列文件后缀:
.XML
.PHP
.LOG
.CHM
.HLP
.CPP
.PAS
.XLS
.PPT
.PDF
.ASPX
.HTML
.RTF
.TXT
.CS
.HTM
读取文件内容,判断是否有邮件地址,如果有则取邮件地址加入到发送邮件的列表,过滤掉有MICROSOFT、KASPER、PANDA字符串的邮箱地址,同一个文件只取一个邮件地址。邮件地址记录在\Documents and Settings\Administrator\Application Data\tazebama\zPharaoh.dat文件中。zPharaoh.dat 文件头部的字符串为tazebama Trojan log file,其他为搜索到的邮箱地址:
5.jpg
图5:tazebama Trojan log 文件内容
Tazebama.log仅记录字符串tzeebama Trojan log file。

ii.        局域网传播
扫描局域网共享目录,并感染其中的文件。
6.jpg
图6:局域网传播
使用的用户名为:Administrator 和Anonymous,密码为随机的弱口令,比如123456789之类的,使用的是a-z,A-Z,0-9这些字符组成的。
复制病毒副本到Start Menu\\Programs\\Startup目录和Documents and Settings目录:
7.jpg
图7:Startup目录下复制病毒文件
当感染数目等于2000或者小于等于2的时候写入名为My Documents[空格].exe的文件。
8.jpg
图8:写入My Documents .exe的文件
iii.        CD刻录传播
        在Local Settings\\Application Data\\Microsoft\\CD Burning目录下释放病毒副本,导致用户刻录CD时将病毒副本刻录到CD中。
9.jpg
图9:感染CD记录
2)        感染和变形的细节
全盘扫描感染.EXE .SCR 和.LNK指向的PE文件,除了system32、windows、winnt三个目录下的文件.
10.jpg
图10:全盘扫描感染.EXE .SCR 和.LNK指向的PE文件
感染的代码是经过多态加密的,所以每次感染的PE文件的HASH都不一样。多态感染,在多态代码写入程序之前经过加密已经随机填充了一部分数据,下面为注入的代码初始化时将头部的一段数据的5个字节进行了随机填充。
11.jpg
图11:注入的代码的随机填充

入口代码中的解密key随机:
12.jpg
图12:解密Key

同时也感染移动存储设备,在每个驱动器的根目录下生成病毒副本zPharaoh.exe和一个指向这个文件的autorun.inf文件。autorun.inf生成之前名称为1.taz,写入指向数据之后被改名。

搜索下列后缀的文件进行加密,加密的条件为:日期大于等于2012月份大于等于10日期大于等于16.
13(1).jpg
图13:加密日期判断
.hlp   
.pdf   
.html   
.txt   
.aspx.cs
.aspx   
.psd   
.mdf   
.rtf   
.htm   
.ppt   
.php   
.asp   
.pas   
.cpp   
.xls   
.doc   
.rar   
.zip   
.mdb   
.bas   
.txt   
并在文件末尾加上TAZEBAMA 和用于加密和解密的key以及标志字符串3515。
13.jpg
图13:Key文件
14.jpg
图14:加密的程序
3)        注册表更改
恢复硬盘或光驱的AutoRun功能为默认:
HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
NoDriveTypeAutoRun        DELETE

设置不显示隐藏文件和文件后缀名:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Hidden    SET   1
ShowSuperHidden     SET 0
HideFileExt    SET  1

4.事件总结
通过百度杀毒云平台监测,发现该恶意程序为感染型蠕虫病毒。我们提醒广大用户,请及时更新杀毒软件的病毒库,对此百度国际化杀毒团队已经通知相关合作伙伴,建议用户立即升级自有安全产品或安装以避免造成了敏感信息泄漏。
百度杀毒:国际版下载地址641K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8X3q4F1N6r3W2$3K9i4u0#2M7#2)9J5k6h3u0S2K9h3c8#2i4K6u0W2j5$3!0E0

[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

收藏
免费 0
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回