Threat Description

Busan

Details

Aliases: Busan, Worm.Win32.Busan
Category: Malware
Type:
Platform: W32

Summary


This worm spreads by copying itself to all accessible network resources. The worm is Windows application (C++ PE EXE-file). It's packed by UPX and is around 14kB large.When executed, the worm sends a message through ICQ to the author of the worm, then copies itself to Windows directory with name "files32.sys", and also copies a file "mh32.dll" there. This is a keyboard hooker. Then the worm tries to copy itself with name "auto.exe" to following directory:

C:\WINDOWS\All Users\Start Menu\Program Files\StartUp\  

Because of a bug, this fails. Next the worm copies itself to all accessible network shares.After that the worm registers itself in the system register in a key:

[HKEY_CLASSES_ROOT\exefile\shell\open\command]  @="files32.sys \"%1\" %*"  

This means that when executing any EXE-file the worm will be started.The worm collects information from the local system and tries to send them to the worm writer. This includes addresses, passwords and results of the keyboard snooper.The worm tries download a file "worm31.bmp" from a web-site in the Internet, but this page has been removed and the download fails.[Kaspersky Lab, 13th of April 2003]



Removal


Automatic action

Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.

More

Detailed instructions for F-Secure security products are available in the documentation found in the Downloads section of our Home - Global site.

You may also refer to the Knowledge Base on the F-Secure Community site for further assistance.








SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More