So That Was "MyDoom.O" That Just Came Knocking

*From SANS:

Handler's Diary July 26th 2004

Updated July 27th 2004 01:25 UTC

MyDoom-O hits search engines hard.

MyDoom-O hits search engines hard

Overview

The latest version of MyDoom, which started arriving in peoples mail boxes in force today, uses search engines to find more recipients for its message.

Once the virus is started, it searched the users files for domain names. Once it spotted a domain name (e.g. 'example.com'), it will search various search engines for valid e-mail addresses within these domains. These search engines include Lycos, Google, Altavista, Yahoo and possibly others. Some of the search engines, in particular Google and Lycos, had problems handling the large number of queries. As a result, the search engines did not return any result, or returned error messages.

These MyDoom e-mails arrive in a number of different forms. Some claim to be a bounce caused by a message the user sent earlier, others claim to be a message from the users ISP claiming that the user sent spam and should run the attached file.

The virus may be zipped or a plain executable.

During the day, Antivirus vendors added signatures to their signature files. We highly recommend to download the latest signatures. As this is probably not the latest virus, we recommend reviewing your policy with respect to attachements. Executable attachements should not be permitted. Finding a sensible policy for zip files may be more difficult and should be tailored to your business needs. We recommend PGP signed e-mail for attachements, or a web based 'drop box'. A password encrypted zip file will only help if the password is exchanged in advance, if possible out of band (e.g. phone). In the past, viruses used password encrypted zip files to fool anti virus engines.

Details

MyDoom creates the executable files C:\Windows\services.exe and java.exe, and executes them.

The following URL templates are used to query the search engines. '%s' is replaced with the search string.

http://search.lycos.com/default.asp?lpv=1&loc=searchhp&tab=web&query=%s &nbq=%d

http://www.altavista.com/web/results?q=%s&kgs=0&kls=0 &n=%d

http://search.yahoo.com/search?p=%s&ei=UTF-8&fr=fp-tab-web-t&cop=mss&tab= &num=%d

http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF-8&q=%s

The agent id is read from the registry and will match the internet explorer version used on the infected host. The full request will look like:

GET /default.asp?lpv=1&loc=searchhp&tab=web&query=mailto+winternals.com HTTP/1.1

Accept: */*

Accept-Encoding: gzip, deflate

User-Agent: Mozilla/4.0 (compatible; MSIE 5.01; Windows NT 5.0)

Host: search.lycos.com

Connection: Keep-Alive

The virus is UPX packed, after unpacking, the following strings are evident:

(a) Strings that suggest that the virus attempts to decode obfuscated e-mail addresses

.dot. _dot_ (dot) at _at_ (at) .at.

(b) Mail headers for outbound mail

X-Priority: 3

X-MSMail-Priority: Normal

X-Mailer: Microsoft Outlook Express 6.00.2600.0000

X-MIMEOLE: Produced By Microsoft MimeOLE V6.00.2600.0000

Content-Type: multipart/mixed;

boundary="%s"

MIME-Version: 1.0

Date:

Subject: %s

To: %s

From: %s

(c) Strings that are appreantly used to avoid certain e-mail addresses:

mailer-d spam abuse master sample accoun privacycertific bugs listserv submit ntivi support admin page the.bat gold-certs feste help soft site rating your someone anyone nothing nobody noone info winrar winzip rarsoft sf.net sourceforge ripe. arin. google gnu. gmail seclist secur bar. foo.com trend update uslis domain example sophos yahoo spersk panda hotmail msn. msdn. microsoft sarc. syma

MyDoom leaves a log file behind. On our test system, the log file was dropped into C:\Documents and Setting\Locals~1\Temp\zincite.log

Anti Virus Vendor Links:

http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MYDOOM.M

http://us.mcafee.com/virusInfo/default.asp?id=description&virus_k=127033

http://www.sophos.com/virusinfo/analyses/w32mydoomo.html

http://securityresponse.symantec.com/avcenter/venc/data/[email protected]

http://www.f-secure.com/v-descs/mydoom_m.shtml

http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=39711

http://www.pandasoftware.com/virus_info/encyclopedia/overview.aspx?IdVirus=49861&sind=0

http://www.viruslist.com/eng/alert.html?id=1927068

http://www.grisoft.com/virbase/virbase.php?lng=us&type=web&action=view&qvirus=086fda5c5c9e7000