W32/Vanebot.AT

description-logoAnalysis

  • Sample is packed with Themida.
  • Copies itself to the undefinedSystemundefined\dllcache folder as winsntp.exe, then runs this copy.
  • Deletes the original file after execution.
    Registry Modification
  • Adds the following registry entries:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_MEMOREX_NETWORK_ANALYSIS_TOOL
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Memorex Network Analysis Tool

    Network Propagation
  • Attempts to connect to $IPC shares in the network by using the following user names and passwords:
    • 00
    • 000
    • 0000
    • 00000
    • 000000
    • 0000000
    • 00000000
    • 12
    • 123
    • 1234
    • 12345
    • 123456
    • 1234567
    • 12345678
    • 123456789
    • abc
    • abc123
    • access
    • adm
    • admin
    • alpha
    • anon
    • anonymous
    • asdfgh
    • backdoor
    • backup
    • beta
    • bin
    • coffee
    • computer
    • crew
    • database
    • debug
    • default
    • demo
    • free
    • go
    • guest
    • hello
    • install
    • internet
    • login
    • mail
    • manager
    • money
    • monitor
    • network
    • new
    • newpass
    • nick
    • nobody
    • nopass
    • one
    • oracle
    • pass
    • passwd
    • password
    • poiuytre
    • private
    • pub
    • public
    • qwerty
    • random
    • real
    • remote
    • root
    • ruler
    • sa
    • secret
    • secure
    • security
    • server
    • setup
    • shadow
    • shit
    • sql
    • super
    • sys
    • system
    • telnet
    • temp
    • test
    • test1
    • test2
    • visitor
    • web
    • windows
    • www

  • Propagates by exploiting the "SQL Server 7.0 Service Pack Password" Vulnerability.
    Instant Messenger Propagation
  • Sends copies itself to all contacts in the following messenger applications:
    • AOL Instant Messenger
    • ICQ
    • MSN Messenger
    • Yahoo Messenger

    Backdoor Behavior
  • Stops the following antivirus services:
    • Norton AntiVirus Auto Protect Service
    • Mcshield
    • Panda Antivirus

  • Sets itself up as an FTP server.
  • Steal confidential information such as passwords.
  • Attempts to terminate certain processes that have the following strings:
    • Ad-aware
    • anti
    • avg
    • avp
    • blackice
    • firewall
    • f-pro
    • hijack
    • kav
    • lockdown
    • mcafee
    • nod32
    • norton
    • proc
    • reged
    • spybot
    • spyware
    • troja
    • viru
    • vsmon
    • zonea

  • Connects to an Internet Relay Chat (IRC) server and listens for commands that allow the remote attacker to perform any of the following actions:
    • Remove itself from the system
    • Join a channel
    • Part from a channel
    • Update IRC nick
    • Download files
    • Update itself
    • Spread through instant messengers
    • Scan for exploits
    • Log keystrokes
    • Flood specified servers with SYN packets
    • Kill processes
    • Get system information
    • Format drives
    • Sniff the network

recommended-action-logoRecommended Action

    FortiGate Systems
  • Check the main screen using the web interface for your FortiGate unit to ensure that the latest AV/NIDS database has been downloaded and installed on your system - if required, enable the "Allow Push Update" option.
    FortiClient Systems
  • Quarantine/delete files that are detected and replace infected files with clean backup copies.
    Patch
  • Download and install the patch for the >"SQL Server 7.0 Service Pack Password" Vulnerability : http://www.microsoft.com/technet/security/bulletin/MS00-035.mspx.

Telemetry logoTelemetry

Detection Availability

FortiClient
Extreme
FortiMail
Extreme
FortiSandbox
Extreme
FortiWeb
Extreme
Web Application Firewall
Extreme
FortiIsolator
Extreme
FortiDeceptor
Extreme
FortiEDR