ÇØÄ¿Áî´º½º / ÇØÄ¿´ëÇÐ

Donation bitcoin(±âºÎ¿ë ºñÆ®ÄÚÀÎ ÁÖ¼Ò)

¡¡
1Pq3K39XM5xx4CifGKgppXeavtWNNHH7K4
¡¡
±âºÎÇϽŠºñÆ®ÄÚÀÎÀº "º¸¾È Ãë¾à °èÃþ"À» À§ÇØ »ç¿ëµÇ°í ÀÖ½À´Ï´Ù.
¡¡
¡¡

Donation bitcoin(±âºÎ¿ë ºñÆ®ÄÚÀÎ ÁÖ¼Ò)

¡¡
1Pq3K39XM5xx4CifGKgppXeavtWNNHH7K4
¡¡
±âºÎÇϽŠºñÆ®ÄÚÀÎÀº "º¸¾È Ãë¾à °èÃþ"À» À§ÇØ »ç¿ëµÇ°í ÀÖ½À´Ï´Ù.
¡¡

°øÁö

¡¡

1. MS ¿§Áö ºê¶ó¿ìÀú¿¡¼­ÀÇ °æ°íâÀº 'À©µµ¿ì µðÆæ´õ'¸¦ ²ô½Ã¸é µË´Ï´Ù.

             'À©µµ¿ì µðÆæ´õ ²ô±â'

2. Å©·Ò ºê¶ó¿ìÀú·Î Á¢¼Ó½Ã ³ª¿À´Â ¾Ç¼ºÄÚµå °æ°íâÀº ±¸±Û Å©·ÒÀÇ ¿¡·¯, Áï ¿ÀŽ(ŽÁö ¿À·ù)À̹ǷΠ¹«½ÃÇÏ½Ã¸é µË´Ï´Ù.

3. ÀÌ »çÀÌÆ®´Â ¾ÈÀüÇÏ¸ç ±ú²ýÇÏ´Ù´Â °ÍÀ» ¾Ë·Á µå¸³´Ï´Ù.

4. ¹«°íÇÑ »çÀÌÆ®µé¿¡ ´ëÇÑ °ø·æ ±â¾÷ ºê¶ó¿ìÀúµéÀÇ ¹«Â÷º°ÀûÀÎ 'ŽÁö ¿À·ù ȾÆ÷'°¡ »ç¿ëÀÚµéÀÇ Á¤º¸ °øÀ¯ÀÇ ÀÚÀ¯¸¦ ħÇØÇÏ°í ÀÖ½À´Ï´Ù. ÀÌ¿¡ ´ëÀÀÇÏ¿© ÀÌ ±â¾÷µéÀ» »ó´ë·Î ¼Ò¼ÛÀ» ÁغñÇÏ°í ÀÖ½À´Ï´Ù.

¡¡



ÇØÄ¿Áî´º½º Á¦°ø ¹ÙÀÌ·¯½º °æº¸
2004/6/29(È­)
Bugbear.K ¿ú  
¹ÙÀÌ·¯½º/¿ú ¸íĪ : Bugbear.K ¿ú
¹ß·ÉÀϽà : 6¿ù29ÀÏ
¹ÙÀÌ·¯½º À¯Çü : ¿ú
À§Çèµµ : »ó
ÇØ´ç½Ã½ºÅÛ : À©µµ
W32.Bugbear.K@mm worm is:

A variant of W32.Bugbear.B@mm and W32.Bugbear.E@mm.
A mass-mailing worm that also spreads through network shares.
Polymorphic and also infects .exe files.
Possesses keylogging capabilities.


 
 
Type:  Virus, Worm
Infection Length:  43,520 bytes
 
 
 
Systems Affected:  Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows XP
Systems Not Affected:  DOS, EPOC, Linux, Macintosh, Macintosh OS X, Novell Netware, OS/2, UNIX, Windows 3.x

=====

When W32.Bugbear.K@mm is executed, it performs the following actions:


Copies itself as %System%\<random filename>.exe.

Note: %System% is a variable. The worm locates the System folder and copies itself to that location. By default, this is C:\Windows\System (Windows 95/98/Me), C:\Winnt\System32 (Windows NT/2000), or C:\Windows\System32 (Windows XP).


Drops three files as %System%\<random filename>.dll.

Note: One of the .dll files is detected as PWS.Hooker.Trojan and should be deleted. The other two files are not malicious.


Creates a randomly named file with a .tmp extension in the %System% folder. This is a .zip file containing a copy of the worm.


Creates a randomly named .nls file in the %System% folder. This file is not malicious.


Creates several randomly named .dat files, and a .bak file in the %Windir% folder. These files are not malicious.

Note: %Windir% is a variable. The worm locates the Windows installation folder (by default, this is C:\Windows or C:\Winnt) and copies itself to that location.


Adds the value:

"<random value>" = "%System%\<random filename>.exe"

in the registry key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

so that the worm runs when Windows starts.


The worm is also a polymorphic file infector that attempts to append its code to the following files in the %Windir% folder and %ProgramFiles% folder:

scandskw.exe
regedit.exe
mplayer.exe
hh.exe
notepad.exe
winhelp.exe
Internet Explorer\iexplore.exe
adobe\acrobat 7.0\reader\acrord32.exe
WinRAR\WinRAR.exe
Windows Media Player\mplayer2.exe
Real\RealPlayer\realplay.exe
Outlook Express\msimn.exe
Far\Far.exe
CuteFTP\cutftp32.exe
Adobe\Acrobat 6.0\Reader\AcroRd32.exe
Adobe\Acrobat 5.0\Reader\AcroRd32.exe
Adobe\Acrobat 4.0\Reader\AcroRd32.exe
ACDSee32\ACDSee32.exe
MSN Messenger\msnmsgr.exe
WS_FTP\WS_FTP95.exe
QuickTime\QuickTimePlayer.exe
StreamCast\Morpheus\Morpheus.exe
Zone Labs\ZoneAlarm\ZoneAlarm.exe
Trillian\Trillian.exe
Lavasoft\Ad-aware 6\Ad-aware.exe
AIM95\aim.exe
Winamp\winamp.exe
DAP\DAP.exe
ICQ\Icq.exe
kazaa\kazaa.exe
winzip\winzip32.exe

Note: %ProgramFiles% is a variable that refers to the path to the program files folder. By default, this is C:\Program Files.


Scans all hard disks, looking for folders that contain any of the following strings:

BEAR
DONKEY
DOWNLOAD
FTP
HTDOCS
HTTP
MORPHEUS
ICQ
KAZAA
LIME
MULE
SHAR
UPLOAD


If a file within these folders contain files with a .exe extension, the worm will attempt to infect that file.

Otherwise, it will copy itself as <original filename.ext>.exe (where .ext is the original file's extension).


Collects the email address from the default email program's Inbox and from the files with the following extensions:

.dbx
.tbb
.eml
.mbx
.nch
.mmf
Inbox
.ods
.htm
.asp
.txt
.sht

Uses its own SMTP engine to email itself to the email addresses that it collects.

The email will have the following characteristics:

Subject: (One of the following)
Hello!
update
hmm..
Payment notices
Just a reminder
look
history screen
Announcement
various
Introduction
Interesting...
I need photo!!!
Stats
Please Help...
Report
Greetings!
[Fwd: look] ;-)
Today Only
New Contests
Lost & Found
bad news
wow!
fantastic
Me nude
Old photos
empty account
photos
Is that your password?
I love you!
new reading
Friendly
photo
Warning!
Love
You are fat!
News
Fwd:
I cannot forget you!
Sex pictures
Your Gift
Re:
good news!
sexy
Hi!
!!! WARNING !!!
Greets!


Attachment: (One of the following)

a000032.jpg .scr
song.wav .scr
music.mp3 .scr
video.avi .scr
photo.jpg .scr
girls.jpg .scr
pic.jpg .scr
message.txt .scr
image.jpg .scr
news.doc .scr
myphoto.jpg .scr
you.jpg .scr
love.jpg .scr
readme.txt .scr


Locates the following information from the infected computer and sends it to the attacker:

Cookies
Clipboard contents
Logged keystrokes
Text from open windows


                    ´äº¯/°ü·Ã ¾²±â Æû¸ÞÀÏ ¹ß¼Û
NoI¢ÆN¢ÆD¢ÆE¢ÆXDate
222   Korgo.W ¿ú °æº¸ 2004/07/04
221   Refest Æ®·ÎÀÌ °æº¸ 2004/07/02
220   Bugbear.K ¿ú 2004/06/29
219   Æ®·ÎÀÌ-ÇÏÀÌÀçÄ¿ 2004/06/27
218   Korgo.Q º¯Á¾ ¿ú 2004/06/25
217   Korgo.O º¯Á¾ ¿ú 2004/06/23
216   Anisc ¹ÙÀÌ·¯½º °æº¸ 2004/06/21
215   Korgo.L º¯Á¾ ¿ú 2004/06/19

 
óÀ½ ÀÌÀü ´ÙÀ½       ¸ñ·Ï