Threat Description

Worm:​W32/Dabber

Details

Aliases: Worm:​W32/Dabber.A, Dabber.A, Worm.Win32.Dabber.a
Category: Malware
Type: Worm
Platform: W32

Summary



Worm:W32/Dabber.A only affects systems that had been previously infected by Worm:W32/Sasser, as it spreads through a vulnerability in the FTP server of the Sasser worm. Once installed, Dabber removes registry values installed by other malware and installs its own backdoor.



Removal



Manual Disinfection

Manual disinfection of Dabber consists of the following steps:

  • Remove the following registry value:
    • [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]"sassfix" = "%SystemDir%\package.exe"
  • Restart the computer
  • Delete the file 'package.exe' from the System and all Startup directories

Note

Computers infected by the Dabber worm must also be disinfected of the Sasser worm as well. For disinfection details and a removal tool, please see the Worm:W32/Sasser description.



Technical Details



Worm:W32/Dabber was written in the Visual C++ programming language, and spreads in a UPX + Pe_Patch compressed form. The unpacked size of the worm is around 70 KiB. Once active on the infected machine, Dabber opens 9898/TCP and installs a general purpose backdoor that can be used to download and execute arbitrary programs.

Also, in an attempt to disable different other viruses, Dabber removes a large number of registry values.

System Infection

When Dabber enters the system, it creates a copy of itself in the Windows System Directory, using the file name 'package.exe'. This copy is added to the Registry as

  • [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]"sassfix" = "%SystemDir%\package.exe"

Two additional copies are placed to the common user Startup Directories, also using the name 'package.exe'.

Network Propagation

Dabber spreads by exploiting a vulnerability in the FTP server of Sasser.

The worm scans random hosts for open 5554/TCP ports, where the Sasser FTP server also listens. If the port is open, Dabber attacks the host with an exploit that opens a shell on the host on 8967/TCP.

Using the shell, Dabber forces the victim machine to download the worm body from the attacker host using TFTP. Dabber has its own TFTP server to serve the victims. Summary of TCP ports used by the worm:

  • 5554/TCP: sasser's FTP server on the infected machines
  • 8967/TCP:Temporary shell opened by the exploit on the vulnerable hosts
  • 9898/TCP:Backdoor port opened by Dabber


Detection


Detection in F-Secure Anti-Virus was published on May 14th, 2004 in update:
Database: 2004-05-14_01




SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More