
SonicWALL UTM Research team received reports of a new variant of Momibot worm propagating in the wild. This worm propagates through emails, network and removable drives.
Process of Infection:
An unsuspecting user may receive an email with the malware attachment.
From: {user}
Subject: nake pics as you've requested
Attachment: picofme.zip (59.3KB)
Installation:
Once the user opens and executes the attachment, it will do the following:
Drops a copy of itself:
Registry Changes
Adds the following AutoStart registry entries to ensure that the malware runs on every system startup.
Adds the following registry entries to install the malware as a Service. Service name was derived from appending two existing services already installed in the system.
Mutex
Creates this mutex to ensure only a single instance is running in the memory.
Command & Control (C&C) Server connection:
Upon successful installation, it tries to connect to a remote server to receive further instruction:
This worm will also join the following IRC Channel to receive instruction:
Backdoor Functionality:
SonicWALL Gateway AntiVirus provides protection against this worm via the following signatures:
GAV: Momibot.B_4 (Trojan)
Share This Article

An Article By
An Article By
Security News
Security News