Eng
  1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar


Busan


Aliases:


Busan
Worm.Win32.Busan

Malware

W32

Summary

This worm spreads by copying itself to all accessible network resources. The worm is Windows application (C++ PE EXE-file). It's packed by UPX and is around 14kB large.When executed, the worm sends a message through ICQ to the author of the worm, then copies itself to Windows directory with name "files32.sys", and also copies a file "mh32.dll" there. This is a keyboard hooker. Then the worm tries to copy itself with name "auto.exe" to following directory:

C:\WINDOWS\All Users\Start Menu\Program Files\StartUp\

Because of a bug, this fails. Next the worm copies itself to all accessible network shares.After that the worm registers itself in the system register in a key:

[HKEY_CLASSES_ROOT\exefile\shell\open\command]
 @="files32.sys \"%1\" %*"

This means that when executing any EXE-file the worm will be started.The worm collects information from the local system and tries to send them to the worm writer. This includes addresses, passwords and results of the keyboard snooper.The worm tries download a file "worm31.bmp" from a web-site in the Internet, but this page has been removed and the download fails.[Kaspersky Lab, 13th of April 2003]



Disinfection & Removal

Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.









Submit a sample




Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Give And Get Advice




Give advice. Get advice. Share the knowledge on our free discussion forum.