Email-Worm:W32/Sober.I

Classification

Category :

Malware

Type :

Worm

Aliases :

Sober.I, W32/Sober.I@mm, I-Worm.Sober.i, W32/Sober.j@MM, W32/Sober.H@mm, W32.Sober.I@mm, WORM_SOBER.I

Summary

F-secure has raised alert level of this virus to Radar LEVEL 2:

Email Worm Sober.I is spreading, mostly in Europe. It sends highly variable German and English emails with an attachment. The virus drops several files to infected systems, including spool32dir.exe.

Removal

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    Note: If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note: You need administrative rights to change the settings.

Technical Details

The worm is written in Visual Basic. The worm's file is a UPX packed PE executable with length of 56 KiBytes.

Installation to system

When the worm's file is started it shows the following messagebox:

Then the worm installs itself to system. It makes two copies itself to Windows System folder with a semi-randomly generated name and EXE extension. The following text strings are used to generate the file names of the worm's executable:

sys
host
dir
expoler
win
run
log
32
disc
crypt
data
diag
spool
service
smss32
 

After that the worm creates startup keys for its files in Windows Registry. The key names are also semi-randomly generated from the above given list. The following keys are created:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]  "" = "%WinSysDir%\.exe"  
[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]  "" = "%WinSysDir%\.exe %srun%"  
[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]  "" = "%WinSysDir%\.exe"  
[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]  "" = "%WinSysDir%\.exe %srun%"   

During its installation cycle the worm creates the following files in Windows System folder:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe %srun%"

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe"

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe %srun%"
 

These files have zero length and they are used to disable previous variants of Sober if they are installed on an infected computer.

Additionally the worm creates the following files:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe %srun%"

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe"

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe %srun%"
 

These files are MIME-encoded copies of the worm's executable file and a ZIP archive with the worm's file. These files will be used for spreading of the worm in email messages.

Spreading in emails

The worm sends email messages with English and German texts and its file attached. The attached file can be an executable or a ZIP archive containing the worm's executable. The worm composes several different types of messages and the content of these messages is variable. Here's an example of a English message sent by the worm:

Before spreading the worm scans files with certain extensions on all hard disks to harvest email addresses. Files with the following extensions are scanned:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe %srun%"

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe"

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe %srun%"
 

The found email addresses and user names are saved in these 2 files that the worm created in Windows System folder:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe %srun%"

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe"

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe %srun%"
 

When the worm is active in memory it blocks access to these files as well as to its MIME-encoded files and its executable file.

The worm ignores email addresses that contain any of the following substrings:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe %srun%"

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe"

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe %srun%"
 

If the worm sends infected messages to domains with suffixes '.de', '.ch', '.at', '.li' or to 'gmx.' domain, it composes messages in German, otherwise English messages are composed.

The worm can compose English messages from the following text string arrays:

Subject (one of the following):

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe %srun%"

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe"

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe %srun%"
 

Message body (one of the following):

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe %srun%"

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe"

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe %srun%"
 

Attachment name (one of the following):

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe %srun%"

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe"

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe %srun%"
 

Sober's attachment name can contain a random number and can have one of the following extensions:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe %srun%"

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe"

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe %srun%"
 

Also the attachment can be sent in a ZIP archive. In this case the worm's file inside the archive will have double extension. The first extension is selected from the following list:

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe"

[HKCU\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe %srun%"

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe"

[HKLM\Software\Microsoft\Windows\CurrentVersion\Run]
"" = "%WinSysDir%\.exe %srun%"
 

The subject of an infected email can have 'FwD:' or 'Re:' string.

Sober.I can place a fake anti-virus scanner report in the message body trying to persuade a recipient that the message was scanned by an on-line scanner and no infection was found.