Packed:W32/Tibs.AB

Classification

Malware

Packed

W32

Packed:W32/Tibs.AB, Packed.Win32.Tibs.ab

Summary

This program is packed using a packer program associated with numerous other malware.

Removal

Automatic action

Based on the settings of your F-Secure security product, it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.

Find out more

Knowledge Base

Find the latest advice in our Community Knowledge Base.

User Guide

See the user guide for your product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details

Packed:W32/Tibs.AB identifies packed files with similar functionality to Email-Worm:W32/Zhelatin. Tibs.AB files are usually downloaded by clicking malicious links in heavily spammed email messages

Execution

On execution, the malware creates these files:

  • %windir%\system32\windev-[random_numbers].sys
  • %windir%\system32\windev-peers.ini

And then hides them.

Activity

A noticeable characteristic for this malware is that it tries to connect to a lot of predefined IP addresses using UDP. A text file is also dropped which contains a possible lists of clients for the worm's peer-to-peer network. The details for the peer names and access ports are encoded. Example of the text file:

 [config]
[local]
[peers]
61CBE5C404F4C715C809A8588F42950C=9A2542751EBF00
61CBE5C4CB3D735B77590054E92865F3=9A2542BB1EBF00
8024083AF066B98A86BF0B0BF1135EF7=55198859159800
80A32744A44A3359F3F4B39D19E8E32B=53258C841C4400 

Rootkit

The installed component has rootkit functionality that can enable its process to be hidden from unsuspecting users.

Registry Modifications

The malware sets these values:

  • HKLM\System\CurrentControlSet\Services\windev-[random_numbers] ImagePath = %systemdir%\windev-[random_numbers].sys

Note: Usually %systemdir% is C:\Windows\system32

Date Created: -

Date Last Modified: -