W32/Bagle.A@mm

description-logoAnalysis

  • Virus is 32bit with a file size of 15,872 bytes
  • The first PE section of the virus is named "Beagle", a derivative of the virus name
  • The virus may have been received in an email message as an attachment with a randomly created file name - the file has an .EXE extension
  • If the virus attachment is opened or run, it will first check the system date and if the value is later than January 28, 2004, the virus will exit
  • Otherwise, the virus instructions will continue - the virus runs the Windows application CALC as a diversion, while in the background it will begin searching the hard drive for email addresses
  • The virus looks into files with the extensions .wab, .txt, .htm and .html for valid email addresses - the virus will create an email with an infectious attachment and send itself to each email address found
  • The virus attempts to use an external SMTP email server in order to send itself, using SMTP protocol to connect and use the server - the virus looks up the MX record for the domain of each email address found in order to spoof email messages
  • For instance, if the virus finds the addresses joesmith @ company1.com and joesmith @ company2.com, the virus will look up the MX record for "company1.com" and attempt to connect with that server, passing to the server the email address joesmith
  • The virus will create a spoofed email containing where the To and From fields are values of email addresses found on the victim computer
  • The MIME email message may be in this format -

    From: [email address found on infected system]
    To: [email address found on infected system]
    Subject: Hi
    Body:
    Test =)
    [random characters]
    Test, yep
    Attachment: [filename].exe

  • The virus writes itself into the undefinedWindowsundefined\System32 folder and modifies the registry to auto run at next Windows startup -

    HKEY_LOCAL_MACHINE\Software\Windows\CurrentVersion\Run\
    d3dupdate.exe = C:\WINNT\System32\bbeagle.exe

  • The virus may make two additional registry entries, without regard to the actual 32 bit operating system -

    HKEY_CURRENT_USER\Software\windows98\
    frun = 01,00,00,00
    uid = (random numeric value)

  • The virus may attempt to open TCP port 6777 and await instructions from a hacker or group of hackers

  • The infected system may attempt to connect with any of the following hard-coded web sites and send information using a server-side script file named '1.php' - the virus will pass a variable string of "?p=undefinedlu&id=undefineds" where "p" is the port 6667 and undefineds is some numeric value -
    o 216.98.134.247
    o 216.98.136.248
    o 64.176.228.13
    o antol-co.ru
    o bose-audio.net
    o vipweb.ru
    o vvcgn.de
    o wh9.tu-dresden.de
    o www.5x12.ru
    o www.auto-hobby-essen.de
    o www.bags-dostavka.mags.ru
    o www.ballonfoto.com
    o www.beasty-cars.de
    o www.bhamidy.de
    o www.bino88.de
    o www.cdromca.com
    o www.dmdesign.de
    o www.dvd-filme.com
    o www.elrasshop.de
    o www.getyourfree.net
    o www.grefrathpaenz.de
    o www.it-msc.de
    o www.kunst-in-templin.de
    o www.leonzernitsky.com
    o www.marder-gmbh.de
    o www.medi-martin.de
    o www.micronuke.net
    o www.montania.de
    o www.mystic-vws.de
    o www.polohexe.de
    o www.polozicke.de
    o www.sc-erbendorf.de
    o www.smeangol.com
    o www.stadthagen.org
    o www.sttngdata.de
    o www.twr-music.de

recommended-action-logoRecommended Action

  • Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option
  • Block inbound/outbound (EXT -> INT/INT -> EXT) access to TCP port 6777
  • Enable blocking of .EXE file attachments by SMTP, POP3 and IMAP

Telemetry logoTelemetry

Detection Availability

FortiGate
Extreme
FortiClient
Extended
FortiMail
Extended
FortiSandbox
Extended
FortiWeb
Extended
Web Application Firewall
Extended
FortiIsolator
Extended
FortiDeceptor
Extended
FortiEDR

Version Updates

Date Version Detail
2023-01-10 90.09530
2022-12-01 90.08342
2021-02-16 84.08100 Sig Updated
2020-11-29 82.17800 Sig Added