Threat Description

Beglur

Details

Aliases: Beglur, I-Worm.Beglur
Category: Malware
Type: Worm
Platform: W32

Summary


Beglur is a mass-mailer that spreads as an attachment to e-mails mentioning Saddam Hussein and Osama Bin Laden. The worm uses IFrame exploit to automatically start its attachments on recipients' computers.



Removal


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More scanning & removal options

More information on scanning or removal options is available in the documentation for your F-Secure security product on the Downloads section of our Home - Global site.

You may also refer to the Knowledge Base on the F-Secure Community site for more information.

Contact Support

For further assistance, F-Secure customers can request support online via the Request support or the Chat forms on our Home - Global site.



Technical Details


The worm's file is a Windows PE executable 8774 bytes long packed with UPX file compressor. The unpacked file size is about 27 kilobytes.

When the worm's file is started, it copies itself to Windows System folder as BGLR32.EXE and modifies SHELL= variable in SYSTEM.INI file or System Registry (depending on Windows version) to be always run with Windows.

Then the worm starts to scan all files on a C: drive. If it finds files with the following extensions:

.TXT  .MHT  .HTM  .HTML  .EML  .JSE  .ASP   

the worm will look for e-mail addresses inside those files.

The worm gets information about user's SMTP server address from the Registry. If this information is unavailable, the worm tries to use the following SMTP server:

smtp.hotpop.com   

E-mail messages sent by the worm look like that:

From:

Baath [baath@iraq.com]

Subject:

For World of Peace!   

Body:

Saddam Hussien has been captured but Osama Bin Laden still have a power  and US will never captured this person until somebody captured Bush.  God Bless You!!  A.Q.T.E   

Attachment:

BGLR32.EXE   

The worm uses IFrame exploit that allows the infected attachment to start automatically on older and unpatched versions of certain e-mail clients.



Detection


Detection was published on December 18th, 2003 in the following FSAV updates:

Detection Type: PC
Database: 2003-12-18_03



Technical Details:Alexey Podrezov, December 19th, 2003


SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More