
Today SonicWALL UTM Research team received samples using the newly patched MS08-067 - Windows Server Service vulnerability. We have received at least 10 distinct copies of this exploit malware. Filenames were n.exe (where =1 or 2 or 3).
The malware is 397,312 bytes in size. When executed, it drops following malicious file in the system folder:
It starts a service as "sysmgr (System Maintenance Service)" and deletes the original copy of the malware from the folder where it was executed.
It tries to communicate with following domains over HTTP:
The trojan generates a URL based on the operating system and antivirus information, in the following format: IPADDRESS/test2.php?abc=A?def=B
Where A is numeric and represents an associated type of antivirus application and B is also numeric and defines the operating system. The two values vary depending on the host computer.
It also performs following registry modifications:
This malware has a very low detection at the time of this writing: Win32/Gimmiv.A , Generic Dropper , Mal/Generic-A .
SonicWALL Gateway AntiVirus provides protection against this malware via GAV: MS08-067 (Exploit) signature.
SonicWALL has also released generic IPS signatures that will detect and prevent attacks targetting this vulnerability. Please to refer to MS08-067 Server Service Buffer Overflow (Oct 23, 2008) for a detailed description of the vulnerability.
Share This Article

An Article By
An Article By
Security News
Security News