Threat Description

Email-Worm:​W32/Waledac.A

Details

Aliases: Trojan:​W32/Waledac.A (Microsoft)
Category: Malware
Type: Email-Worm
Platform: W32

Summary



This type of worm is embedded in an e-mail attachment, and spreads using the infected computer's e-mailing networks.



Removal



Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.



Technical Details



Waledac is a worm that is capable of harvesting and forwarding password information.

It is capable of receiving commands from a remote server. Commands include instructions on functions to perform (for example, update malware components or send information from the infected computer).

Installation

Waledac spreads in an e-mail attachment. The name of the e-mail attachment is always "ecard.exe". The contents of the e-mail message varies and may use any of the following subject lines:

  • A Christmas card from a friend
  • A special card just for you A special card just for you, Christmas Ecard Notification Notification Christmas Ecard, Christmas Ecard Special Delivery Special Delivery Christmas Ecard, Christmas Wishes! Christmas Wishes!
  • Christmas card for you Christmas card for you, Christmas greetings e-card is waiting for you Christmas greetings e-card is waiting for you, Christmas greetings for you Christmas greetings for you, Christmas greetings from your friend Christmas greetings from your friend, Greeting for you! Greeting for you!
  • Happy Christmas! Happy Christmas!
  • Have a warm an lovely Christmas! Have a lovely warm an Christmas!
  • I made an Ecard for U! I made an Ecard for U!
  • I sent you the ecard I sent you the ecard .Joyful Christmas! Joyful Christmas!
  • Merry Christmas 'N Happy New Year! Merry Christmas' N Happy New Year!
  • Merry Christmas 2009! Merry Christmas 2009!
  • Merry Christmas To You! Merry Christmas To You!
  • Merry Christmas card for you! Merry Christmas card for you!
  • Merry Christmas e-card is waiting for you Merry Christmas e-card is waiting for you, Merry Christmas greetings for you Merry Christmas greetings for you, Merry Christmas wishes just for you Merry Christmas wishes just for you, Merry Christmas! Merry Christmas!
  • Merry Xmas! Merry Xmas!
  • Warmest Wishes For Christmas! Warmest Wishes For Christmas!
  • Wish You A Merry Christmas! Wish You A Merry Christmas!
  • Xmas card for you Xmas card for you
  • Xmas card is waiting for you Xmas card is waiting for you, You Have An E-card Waiting For You! You Have An E-Card Waiting For You!
  • You Received an Ecard. You Received an Ecard.
  • You have a Christmas Greeting! You have a Christmas Greeting!
  • You have a greeting card, You have a greeting card, You have received a Christmas E-card You have received a Christmas e-card, You have received a Christmas greetings card You have received a Christmas card greetings, You have received an E-card You have received an E-card, You've got a Christmas E-card You've got a Christmas e-card, You've got a Christmas greetings card You've got a Christmas card greetings, You've got a Merry Christmas E-card You've got a Merry Christmas E-card, You've got a Merry Christmas greeting card You've got a Merry Christmas greeting card, You've got a Xmas e-card You've got a Xmas e-card, You've got an e-card You've got an e-card

If the user executes the worm by double-clicking on the attachment, the worm is installed on the system, saving a copy of itself to the Windows system registry. The worm then amends the registry so that the copy saved on the directory is run during every system startup.

Propagation

Once installed on the system, the worm searches through all files on local and removable drives for e-mail addresses. The worm is able to search through all files EXCEPT:

  • .avi
  • .mov
  • .wmv
  • .mp3
  • .wave
  • .wav
  • .wma
  • .ogg
  • .vob
  • .jpg
  • .jpeg
  • .gif
  • .bmp
  • .exe
  • .dll
  • .ocx
  • .class
  • .msi
  • .zip
  • .7z
  • .rar
  • .jar
  • .gz
  • .hxw
  • .hxh
  • .hxn
  • .hxd

The worm then spams copies of itself to the harvested e-mail addresses.

Data Stealing

Once information has been gathered, it is encrypted and forwarded (using the extension HTM, PNG or PHP) to a remote server.

The information is randomly sent to any one of the following IP addresses:

  • 116.122.25.144
  • 116.16.203.123
  • 116.254.87.118
  • 116.73.41.45
  • 116.74.181.12
  • 118.101.212.97
  • 118.39.80.191
  • 119.1.16.8
  • 119.154.9.151
  • 119.99.195.58
  • 121.243.167.55
  • 124.115.101.170
  • 124.13.227.4
  • 124.21.244.186
  • 124.79.29.116
  • 125.163.244.92
  • 125.36.151.115
  • 125.41.87.82
  • 125.45.67.194
  • 148.245.125.199
  • 151.33.215.0
  • 165.194.27.11
  • 189.41.17.132
  • 189.41.30.130
  • 189.42.164.145
  • 194.120.84.9
  • 199.203.64.235
  • 200.120.152.186
  • 200.125.92.244
  • 200.165.243.185
  • 200.55.160.124
  • 200.82.185.119
  • 201.212.68.161
  • 201.216.3.229
  • 201.231.145.111
  • 201.27.196.253
  • 201.79.228.217
  • 209.83.88.3
  • 209.87.251.55
  • 210.119.19.61
  • 212.69.49.12
  • 213.66.99.225
  • 217.129.86.162
  • 217.26.165.146
  • 220.224.231.73
  • 221.223.130.74
  • 24.116.119.157
  • 24.209.2.161
  • 24.222.92.246
  • 24.24.186.141
  • 24.82.3.140
  • 60.218.245.51
  • 60.31.94.54
  • 61.102.212.18
  • 61.238.16.83
  • 64.184.89.202
  • 68.41.238.247
  • 68.91.129.102
  • 69.37.168.16
  • 70.61.170.203
  • 71.121.79.208
  • 72.177.194.167
  • 72.24.203.145
  • 72.241.49.144
  • 72.38.168.67
  • 76.124.149.22
  • 76.25.195.117
  • 76.89.100.221
  • 76.9.39.158
  • 77.109.39.105
  • 77.252.98.96
  • 77.29.194.238
  • 77.65.140.248
  • 77.81.248.158
  • 80.117.119.193
  • 80.183.57.117
  • 80.232.245.52
  • 80.66.240.179
  • 81.111.41.240
  • 81.172.96.184
  • 81.18.72.138
  • 81.184.102.33
  • 81.31.167.5
  • 81.31.183.214
  • 81.84.31.144
  • 82.154.44.107
  • 82.233.183.147
  • 82.56.63.197
  • 82.61.43.115
  • 82.78.142.146
  • 83.131.228.111
  • 83.132.209.172
  • 83.191.233.15
  • 83.31.140.66
  • 84.109.6.14
  • 84.122.132.201
  • 84.125.99.94
  • 84.16.228.132
  • 84.228.137.182
  • 84.237.134.103
  • 84.26.190.246
  • 84.3.93.129
  • 85.130.29.52
  • 85.130.30.117
  • 85.133.206.120
  • 85.152.62.104
  • 85.185.119.42
  • 85.196.183.244
  • 85.201.43.175
  • 85.232.254.214
  • 85.255.109.83
  • 85.64.79.166
  • 86.100.217.214
  • 86.107.149.138
  • 86.126.20.9
  • 86.126.37.96
  • 86.4.67.129
  • 86.66.131.160
  • 87.110.51.157
  • 87.16.10.84
  • 87.5.40.197
  • 87.67.94.212
  • 87.69.73.78
  • 87.69.83.37
  • 87.97.40.218
  • 88.148.101.139
  • 88.160.7.118
  • 88.222.201.105
  • 89.1.27.149
  • 89.138.89.17
  • 89.141.52.164
  • 89.160.77.132
  • 89.165.120.134
  • 89.165.68.177
  • 89.165.78.95
  • 89.39.168.174
  • 89.45.136.200
  • 89.74.204.108
  • 89.75.11.4
  • 89.77.53.132
  • 92.112.248.195
  • 92.249.152.117
  • 93.126.72.83
  • 93.172.160.70
  • 93.177.144.51
  • 98.197.170.70
  • 98.221.243.14
  • 99.144.153.58
  • 99.236.47.238
  • 99.244.169.127

These IP addresses are hard-coded to Waledac.A.

Registry Modifications

Sets these values:

  • [HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\]PromoReg = %ExecutablePath%

Creates these keys:

  • [HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion]RList = %HexadecimalValue%
  • [HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion]MyID = %HexadecimalValue%





SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More