Worm:W32/NetSky.Z

Classification

Malware

Email-Worm

W32

NetSky.Z, W32/NetSky.Z@mm, I-Worm.Netsky.aa, Netsky.Z

Summary

NetSky.Z worm was found on April 21st, 2004. This variant is very close to previous Netsky variants. The worm spreads in emails, but does not spread to local network and P2P and does not uninstall Bagle worm. The worm has a backdoor that listens on port 665.

Removal

Automatic action

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

Suspect a file is incorrectly detected (a False Positive)?

A False Positive is when a file is incorrectly detected as harmful, usually because its code or behavior resembles known harmful programs. A False Positive will usually be fixed in a subsequent database update without any action needed on your part. If you wish, you may also:

  • Check for the latest database updates

    First check if your F-Secure security program is using the latest detection database updates, then try scanning the file again.

  • Submit a sample

    After checking, if you still believe the file is incorrectly detected, you can submit a sample of it for re-analysis.

    NOTE If the file was moved to quarantine, you need to collect the file from quarantine before you can submit it.

  • Exclude a file from further scanning

    If you are certain that the file is safe and want to continue using it, you can exclude it from further scanning by the F-Secure security product.

    Note You need administrative rights to change the settings.

Find out more

Knowledge Base

Find the latest advice in our Community Knowledge Base.

User Guide

See the user guide for your product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details

The worm's file is a PE executable 22016 bytes long packed with a new or modified file compressor. Some of the worm's text strings are encrypted.

Installation to system

Upon execution NetSky.Z copies itself as Jammer2nd.exe file to Windows folder and adds a startup key for this file into System Registry:

[HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"Jammer2nd" = "%WinDir%\Jammer2nd.exe"

where %WinDir% represents Windows folder name.

Additionally the worm creates a few files with .LOG extension in Windows folder. These files contain binary and MIME-encoded copies of the worm's executable that will be sent in emails.

Spreading in email

Before spreading in email the worm collects email addresses. It scans all files on all drives from C: to Z: except CD-ROM drives. If any file with the following extensions is found, the worm opens it and searches for email addresses there:

.cfg
 .mbx
 .mdx
 .pl
 .htm
 .html
 .asp
 .wab
 .doc
 .eml
 .txt
 .php
 .vbs
 .rtf
 .uin
 .shtm
 .cgi
 .dhtm
 .ods
 .stm
 .xls
 .adb
 .tbb
 .dbx
 .mht
 .mmf
 .nch
 .sht
 .oft
 .msg
 .jsp
 .wsh
 .xml
 .ppt

The worm spreads itself in emails It sends messages with different subject lines, body text and attachment names. Here's the list of subjects that the worm uses:

Important
Document
Hello
Information
Hi

The message body is composed from one the following strings:

Important details!
Important notice!
Important document!
Important bill!
Important data!
Important!
Important textfile!
Important informations!

The attachment name is selected from the following variants:

Details.zip
Notice.zip
Important.zip
Bill.zip
Data.zip
Part-2.zip
Textfile.zip
Informations.zip

The ZIP attachments contain worm's executables with one of the following names:

Informations.txt
[lots of spaces]
 .exe
Textfile.txt
[lots of spaces]
 .exe
Part-2.txt
[lots of spaces]
 .exe
Data.txt
[lots of spaces]
 .exe
Bill.txt
[lots of spaces]
 .exe
Important.txt
[lots of spaces]
 .exe
Notice.txt
[lots of spaces]
 .exe
Details.txt
[lots of spaces]
 .exe

Backdoor

The worm has a backdoor that listens on TCP port 665. It allows to download and execute files on an infected computer.

Payload

NetSky.Z has a payload. It performs a DoS (Denial of Service) attack on the following websites from 2nd to 5th of May, 2004:

www.educa.ch
www.medinfo.ufl.edu
www.nibis.de