Win32/Mytob [Threat Name] go to Threat

Win32/Mytob.D [Threat Variant Name]

Category worm
Short description

Win32/Mytob.D is a worm that spreads via e-mail and by exploiting a vulnerability in Microsoft Windows . The file is run-time compressed using UPX .

Installation

When executed, the worm copies itself into the %system% folder using the following name:

  • wfdmgr.exe

In order to be executed on every system start, the worm sets the following Registry entries:

  • [HKLM\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • “LSA” = “wfdmgr.exe”
  • [HKLM\­Software\­Microsoft\­Windows\­CurrentVersion\­RunServices]
    • “LSA” = “wfdmgr.exe”
  • [HKCU\­Software\­Microsoft\­Windows\­CurrentVersion\­Run]
    • “LSA” = “wfdmgr.exe”

The following Registry entries are created:

  • [HKLM\­Software\­Microsoft\­OLE]
    • “LSA” = “wfdmgr.exe”
  • [HKCU\­Software\­Microsoft\­OLE]
    • “LSA” = “wfdmgr.exe”
  • [HKLM\­System\­CurrentControlSet\­Control\­Lsa]
    • “LSA” = “wfdmgr.exe”
  • [HKCU\­System\­CurrentControlSet\­Control\­Lsa]
    • “LSA” = “wfdmgr.exe”
Spreading via e-mail

E-mail addresses for further spreading are searched for in local files with one of the following extensions:

  • *.wab
  • *.adb
  • *.tbb
  • *.dbx
  • *.asp
  • *.php
  • *.sht
  • *.htm
  • *.pl

Addresses containing the following strings are avoided:

  • .gov
  • .mil
  • abuse
  • accoun
  • acketst
  • admin
  • anyone
  • arin.
  • avp
  • be_loyal:
  • berkeley
  • borlan
  • bsd
  • bugs
  • certific
  • contact
  • example
  • fcnz
  • feste
  • fido
  • foo.
  • fsf.
  • gnu
  • gold-certs
  • google
  • gov.
  • help
  • hotmail
  • iana
  • ibm.com
  • icrosof
  • icrosoft
  • ietf
  • info
  • inpris
  • isc.o
  • isi.e
  • kernel
  • linux
  • listserv
  • math
  • mit.e
  • mozilla
  • msn.
  • mydomai
  • nobody
  • nodomai
  • noone
  • not
  • nothing
  • ntivi
  • page
  • panda
  • pgp
  • postmaster
  • privacy
  • rating
  • rfc-ed
  • ripe.
  • root
  • ruslis
  • samples
  • secur
  • sendmail
  • service
  • site
  • soft
  • somebody
  • someone
  • sopho
  • spm
  • submit
  • support
  • syma
  • tanford.e
  • the.bat
  • unix
  • usenet
  • utgers.ed
  • webmaster
  • www
  • you
  • your
  • -._!
  • -._!@

Some of the following strings may be used to form the sender address:

  • adam
  • alex
  • alice
  • andrew
  • anna
  • bill
  • bob
  • brenda
  • brent
  • brian
  • claudia
  • dan
  • dave,
  • david
  • debby
  • fred
  • george
  • helen
  • jack
  • james
  • jane
  • jerry
  • jim
  • jimmy
  • joe
  • john
  • jose
  • julie
  • kevin
  • leo
  • linda
  • maria
  • mary
  • matt
  • michael
  • mike
  • peter
  • ray
  • robert
  • sam
  • sandra
  • serg
  • smith
  • stan
  • steve
  • ted
  • tom

Subject of the message is one of the following:

  • Error
  • Status
  • STATUS
  • Server Report
  • SERVER REPORT
  • Mail Transaction Failed
  • Mail Delivery System
  • hello
  • HELLO
  • hi
  • HI
  • test
  • TEST

Body of the message is one of the following:

Mail transaction failed. Partial message is available. The message contains Unicode characters and has been sent as a binary attachment. The message cannot be represented in 7-bit ASCII encoding and has been sent as a binary attachment. test

The body can be blank or it may contain random strings.


The attachment is either an executable of the worm, or a ZIP archive containing it.


Its filename is one of the following:

  • body
  • message
  • test
  • data
  • file
  • text
  • doc
  • readme
  • document

If the attachment is an executable file, the name has one of the following extensions:

  • bat
  • cmd
  • exe
  • scr
  • pif
  • zip

A double extension may be used.


The first is one of the following:

  • htm
  • txt
  • doc

The second is one of the following:

  • pif
  • scr
  • exe

Many space characters can be used to separate the two extensions.

Other information

The worm generates random IP addresses.


By connecting to remote machines to port 445 it tries to exploit the LSASS buffer overflow vulnerability [MS04-011] .


If it succeeds, a copy of the worm is retrieved from the attacking machine using FTP protocol.


The worm contains a backdoor.


The worm is able to update itself or execute an arbitrary file.


It can send various information about the infected computer to an attacker.

Please enable Javascript to ensure correct displaying of this content and refresh this page.