Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Bobax


Aliases:


Bobax
TrojanProxy.Win32.Bobax.a

Malware

W32

Summary

Bobax is a new, Sasser-like trojan proxy that uses the MS04-011 (LSASS.EXE) vulnerability to propagate. When instructed to do so it scans random IP addresses for vulnerable computers.



Disinfection & Removal

Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.



Technical Details

The Bobax executable is packed with a modified version of UPX.

The strings within its body are encoded using a simple scrambling function.

It opens a HTTP server on the infected machine, to further distribute itself upon infection of new hosts.

When attempting to find new targets, it will probe the port 5000 ( Universal Plug and Play (UPnP) ) , a sign of a machine running Windows XP. If found, it will attempt infection of the target by means of using the LSASS exploit made famous by the Sasser worm.

When Bobax infects a host, the exploit uses HTTP to download the executable from a webserver which listens on a random port on the attacker host. The data is downloaded into a dropper file called 'svc.exe'.

The dropper drops a DLL to the temporary directory with a random name. The DLL is launched by injecting it to Explorer with a technique called DLL Injection. Because the code runs as a thread in Explorer it's not visible as a separate process.



Detection

Detection for this malware was published on May 16th, 2004 in the following F-Secure Anti-Virus updates:

Detection Type: PC
Database: 2004-05-16_01



Description Created: Gergely Erdelyi & Ero Carrera, May 16th, 2004;



Submit a sample




Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice




Give advice. Get advice. Share the knowledge on our free discussion forum.