
SonicWALL UTM Research team received reports of a new variant of a Peer-to-Peer (P2P) Worm spreading in the wild. It propagates through P2P channels as well as spammed e-mail. The e-mail contains the malicious file inside the zip attachment.
Below are sample e-mails:
Subject:
Attachment:
Email Body:
You have got a personal message on Facebook from your friend.
To read it please check the attachment.
Thanks,
The Facebook Team
===================================================
Hello!
You have received a Hallmark E-Card from your friend.
To see it, check the attachment.
There's something special about that E-Card feeling. We invite you to make a friend's day and send one.
Hope to see you soon,
Your friends at Hallmark
===================================================
The e-mail message looks like below:
Once the user runs the executable file, it will do the following activities:
File Operation:
Added Files
Registry Operation:
Added Entries
Allows program to run without user notification:
Ensures this Worm runs on every Windows startup.
Ensures this Worm bypass the Firewall.
Malware Propagation:
This Worm drops copies on P2P shared folders using filenames taken from its list:
List of the P2P apps:
Filenames it uses when copying itself to P2P folders which are key generator and cracking tools of popular commercial applications:
Mass-Mailing
This Worm harvests email addresses from the system and send spam emails with an attachment of itself.
Network Activity:
The following HTTP request were observed from this Worm:
Pop-up Advertisements
The following are the search domains this worm monitors for keyword terms:
The following are the keyword terms it monitors and once found displays pop-up advertisements from the domain "tetrosearch.com" or "oxoblaster.com":
The Worm is also known as Worm/BlackControl.H , Inject-AAI and Troj/Agent-OLK
SonicWALL Gateway AntiVirus provides protection against these Worm via the following signatures:
Share This Article

An Article By
An Article By
Security News
Security News