W32/Netsky.C. Se propaga por e-mail y redes P2P
Nombre |
W32/Netsky.C |
Tipo |
Gusano de Internet |
Alias |
Netsky.C, Moodown.C, I-Worm.Moodown.c, Win32/Netsky.C,
W32/Netsky.c@MM, W32/Netsky.C.worm, WORM_NETSKY.C, W32/Netsky-C |
Fecha |
25/feb/04 |
Plataforma |
Windows 32-bit |
Tamaño |
25,352 bytes (Petite), 28,160 bytes (Aspack), 24,064 (UPX) |
Fuente : http://www.vsantivirus.com/netsky-c.htm |
Este gusano, escrito en Microsoft Visual C++ y comprimido con
las utilidades Petite, Aspeck o UPX (y posiblemente otras), fue reportado por
primera vez el 25 de febrero de 2004, y se considera de gran propagación en
algunos países. Los datos adjuntos pueden llegar en un archivo .ZIP, o con
extensiones de ejecutables, y pueden mostrar el icono de archivos de Word.
Cuando se ejecuta, el gusano se copia a si mismo en el directorio de Windows:
c:\windows\winlogon.exe
NOTA: La carpeta "c:\windows" puede variar de acuerdo al
sistema operativo instalado ("c:\winnt" en NT, "c:\windows", en 9x, Me, XP,
etc.).
El gusano crea la siguiente entrada en el registro, para autoejecutarse en cada
reinicio:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
ICQNet = c:\windows\winlogon.exe -stealth
Luego, intenta borrar las siguientes claves del registro,
utilizadas por otros gusanos (Mydoom A y B), y por algunos antivirus (Kaspersky):
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
au.exe =
d3dupdate.exe =
Explorer =
KasperskyAv =
OLE =
Taskmon =
Windows Services Host =
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
DELETE ME =
Explorer =
KasperskyAv =
msgsvr32 =
Sentry =
service =
system. =
Taskmon =
Windows Services Host =
HKCR\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}
\InProcServer32
HKCU\Software\Microsoft\Windows
\CurrentVersion\Explorer\PINF
HKLM\System\CurrentControlSet\Services\WksPatch
El gusano busca direcciones electrónicas en archivos con las
siguientes extensiones, en todas las unidades de disco y mapeadas en red, de la
C a la Z, excepto unidades de CD-Rom:
.adb
.asp
.dbx
.doc
.eml
.htm
.html
.msg
.oft
.php
.pl
.rtf
.sht
.tbb
.txt
.uin
.vbs
.wab
Si el gusano detecta alguna carpeta cuyo nombre contenga la
cadena "shar" en unidades de disco de la C a la Y que no sean CD o DVD, se copia
a si mismo a dichas carpetas con los siguientes nombres (incluye aplicaciones
P2P como Kazaa, Kazaa Lite, BearShare, eDonkey2000, ICQ, Kmd, Limewire y
Shareaza):
1000 Sex and more.rtf.exe
3D Studio Max 3dsmax.exe
ACDSee 9.exe
Adobe Photoshop 9 full.exe
Adobe Premiere 9.exe
Ahead Nero 7.exe
Best Matrix Screensaver.scr
Clone DVD 5.exe
Cracks & Warez Archive.exe
Dark Angels.pif
Dictionary English - France.doc.exe
DivX 7.0 final.exe
Doom 3 Beta.exe
E-Book Archive.rtf.exe
Full album.mp3.pif
Gimp 1.5 Full with Key.exe
How to hack.doc.exe
IE58.1 full setup.exe
Keygen 4 all appz.exe
Learn Programming.doc.exe
Lightwave SE Update.exe
Magix Video Deluxe 4.exe
Microsoft Office 2003 Crack.exe
Microsoft WinXP Crack.exe
MS Service Pack 5.exe
Norton Antivirus 2004.exe
Opera.exe
Partitionsmagic 9.0.exe
Porno Screensaver.scr
RFC Basics Full Edition.doc.exe
Screensaver.scr
Serials.txt.exe
Smashing the stack.rtf.exe
Star Office 8.exe
Teen Porn 16.jpg.pif
The Sims 3 crack.exe
Ulead Keygen.exe
Virii Sourcecode.scr
Visual Studio Net Crack.exe
Win Longhorn Beta.exe
WinAmp 12 full.exe
Windows Sourcecode.doc.exe
WinXP eBook.doc.exe
XXX hardcore pic.jpg.exe
Cuando detecta una conexión a Internet establecida, el gusano
comienza a propagarse a si mismo.
Para ello envía mensajes con las siguientes características:
De: [una dirección falsa]
Asunto: [uno de los siguientes]
[vacío]
believe me
dear
Delivery Failed
denied!
error
exception
excuse me
fake?
good morning
hello
Here is it
hey
hi
illegal...
I'm back!
important
info
its me
last chance!
lol
moin
notice!
notification
oh
private?
question
Question
re:
Re: <5664ddff?$??2>
Re: does it?
Re: does it?
Re: excuse me
Re: hello
Re: hey
Re: hi
Re: important
Re: information
Re: Re: Re: Re:
Re: unknown
read it immediatelly
report
something for you
Status
stolen
take it
trust me
warning
what's up?
Yep
you?
Texto del mensaje: [uno de los siguientes]
[vacío]
*lol*
;-)
<...>
<?}
<<<Failure>>>
<09580985869gj>
<Antispam complete>
<Attached Msg>
<Attachment from Poland>
<Attachment Signature 34933920>
<Automailer>
<bad gateway>
<Click the attachment to decrypt>
<Deliver Error>
<Failed message available>
<Mail failed>
<Message Error>
<null>
<scanned by norton antivirus>
<Server Error>
<Transfer complete>
<Warning from the Government>
a crazy doc about you
abuse?
account?
already?
another pic, have fun! ... :->
Antispam is turned off. See file!
are you a photographer?
are you a teacherin the picture?
are you cranky?
are you the naked one?
are you the naked person!
are you the one?
attachi#
Authentification required. Read the att...
be mad?
best?
bob the builder
child or adult?
child porn?
classroom test of you?
copyright?
correct it!
did you ask me for that?
did you know from this document?
did you know that?
did you see her already?
did you sent it to me?
do not give up!
do not open the attachment!
do not show this anyone!
do not use my document!
do not use this creditcard!
do not visit the pages on the list I se...
do you have an orgasm in the picture?
do you have sex in the picture?
do you have the bug also?
do you have?
do you know the thief?
do you know this????
do you think so?
doc about me?
doc?
docs?
does it belong to you?
does it belong to you?
does it match?
does it matter?
drugs? ...
excellent!
explain!
fast food...
feel free to use it.
File is bad.
File is damaged.
File is self-decryting.
forgotten?
from the chatter (my photo!)
from your lover ;-)
gonna?
good work!
great job!
great xxx!
great!
greetings
help attached
her.
here is it.
here is my advice.
here is my photo!
here is the $%%454$
here is the <censored>
here is the document.
here is the next one!
here is yours!
here, the cheats
here, the introduction
here, the serials
how?
i am desperate
i am speachless about your document!
I don't know your document!
i don't think so.
i don't want your xxx pics!
i found that about you!
i found this document about you.
i have received this.
I have your password!
i hope thats not true!
i know your document!
i like your doc!
i lost that
i need you!
i saw you last week!
I 've found your bill!
I wait for an answer!
i wait for your comment about it.
i want more...
illegal st. of you?
important?
in your mind?
incest?
information about you?
Instant patches.
instruct me about this!
is that criminal?
is that possible?
is that the reality?
is that true?
is that your account?
is that your account?
is that your attachment?
is that your beast?
is that your car?
is that your car?
is that your cd?
is that your creditcard?
is that your domain?
is that your family?
is that your finger?
is that your message?
is that your name?
is that your photo?
is that your porn pic?
is that your privacy?
is that your slip?
is that your TAN?
is that your website?
is that your wife?
is that your work?
is that yours?
is the pic a fake?
is this information about you?
it's a secret!
its private from me
it's so similar as yours!
i've found it about you
kill him on the picture!
kill the writer of this document!
let it!
lets talk about it!
Login required! Read the attachment!
love letter?
man or women?
meaning of that?
message?
Microsoft
misc. and so on. see you!
modifications?
money?
msg
my advice....
never!
new patch is available!
ok...
old photos about you?
only encrypted!
pages?
personal message!
picture?
poor quality!
possible?
pretty pic about you?
pwd?
read it immediately!
read the details.
really?
reply
schoolfriend?
see this!
see your name!
solve the problem!
something about you!
something is going ...
something is going wrong!
something is not ok
stuff about you?
such as yours?
take it easy!
tell me more about your document!
test it
that is interesting...
that's a funny text.
that's not the truth?
thats wrong!
the information is wrong!
the truth?
this file is bad!
this is an attachment message!
this is nothing for kids!
time to fear?
Transaction failed. Show the doc!
trial?
try this patch!
what do you think about it?
what means that?
what still?
what?
who?
why should I?
why?
wrong calculation! (see the attachment!...
xxx ?
xxx about you?
xxx service
yes.
you are a bad writer
you are bad
You are infected. Read the details!
you are naked in this document!
you are sexy in this doc!
you cannot hide yourself! (see photo)
you earn money, see the attachment!
you feel the same.
you have a sexy body in the pic!
you have done a mistake in the document...
you have tried to steal!
you look like an ape!
you look like an rat?
you won the rk!
your account is expired!
your are naked?
your attachment? verify it.
Your bill.
your body?
your design is not good!
your document is not good
your document is silly!
your eyes?
your face?
your hero in the picture?
your icq number?
your job? (I found that!)
your lie is going around the world!
your name is wrong!
your personal record?
your photo is poor
Your provider will be disabled!
your TAN number?
yours?
Datos adjuntos: [seleccionado al azar de la siguiente
lista]:
454543403
aboutyou
associal
attach2
attachment
auction
bill
birth
card
class_photos
concert
creditcard
death
description
details
dinner
disco
doc
doc_ang
document
final
found
freaky
friend
id
image
important
incest
information
injection
intimate stuff
jokes
letter
location
mail2
mails
masturbation
material
me
message
misc
moonlight
more
msg
msg2
music
myaunt
mydate
naked1
naked2
news
nomoney
note
nothing
number_phone
object
old_photos
part2
party
paypal
pic
portmoney
poster
posting
privacy
product
ps
ranking
regards
regid
release
response
schock
secrets
sexual
sexy
shower
story
stuff
swimmingpool
talk
tear
textfile
topseller
transfer
trash
undefinied
unfolds
update
violence
visa
warez
webcam
website
wife
word_doc
worker
your_stuff
yours
El archivo adjunto tendrá una o dos extensiones. En todos los
casos la primera extensión será una de las siguientes:
.doc
.htm
.rtf
.txt
La segunda extensión (en caso de tenerla) podría ser una de
las siguientes (la segunda extensión queda oculta en una instalación por defecto
de Windows, vea en las referencias "Mostrar las extensiones verdaderas de los
archivos"):
.com
.exe
.pif
.scr
El adjunto también podría ser un archivo .ZIP. En ese caso el
mismo tendrá el mismo nombre de su contenido, pero con la extensión .ZIP.
Ejemplos de adjuntos:
454543403.exe
disco.htm.exe
intimate stuff.scr
jokes.zip (contiene por ej. "jokes.rtf.com")
stuff.zip (contiene por ej. "stuff.exe")
visa.zip (contiene por ej. "visa.pif")
party.zip (contiene por ej. "party.txt.com")
El gusano evita enviar mensajes a direcciones que contengan
cualquiera de las siguientes cadenas:
abuse
antivi
aspersky
avp
cafee
fbi
f-pro
f-secur
icrosoft
itdefender
orman
orton
spam
ymantec
Crea el mutex (semáforo) "[SkyNet.cz]SystemsMutex", para no
ejecutarse más de una vez en memoria.
Si la fecha es 26 de febrero de 2004, y el gusano se ejecuta entre las 6 y las 9
de la mañana, se emiten por el PC Speaker una serie de sonidos (beeps) en forma
continua.
Herramientas de limpieza automática
Descargue y ejecute cualquiera de estas herramientas en su computadora, para una
limpieza automática de la misma. Siga las instrucciones en pantalla.
PQREMOVE de Panda Software (1.36 Mb) (español)
http://updates.pandasoftware.com/pq/gen/netskyc/pqremove.com
Symantec Removal Tool (156 Kb) (inglés)
http://securityresponse.symantec.com/avcenter/FxNetsky.exe
McAfee AVERT Stinger (734 Kb) (inglés)
http://download.nai.com/products/mcafee-avert/stinger.exe
Future Time Srl (NOD 32) (290 Kb)
http://www.nod32.it/cgi-bin/mapdl.pl?tool=NetskyC
Reparación manual
Antivirus
1. Actualice sus antivirus con las últimas definiciones
2. Ejecútelos en modo escaneo, revisando todos sus discos
3. Borre los archivos detectados como infectados
Borrar manualmente archivos agregados por el virus
Desde el Explorador de Windows, localice y borre los siguientes archivos:
c:\windows\winlogon.exe
IMPORTANTE: No borre
C:\WINDOWS\SYSTEM32\WINLOGON.EXE, ya que es un archivo legítimo de Windows.
Pinche con el botón derecho sobre el icono de la "Papelera de reciclaje" en el
escritorio, y seleccione "Vaciar la papelera de reciclaje".
Editar el registro
Nota: algunas de las ramas en el registro aquí mencionadas, pueden no estar
presentes ya que ello depende de que versión de Windows se tenga instalada.
1. Ejecute el editor de registro: Inicio, ejecutar, escriba REGEDIT y pulse
ENTER
2. En el panel izquierdo del editor, pinche en el signo "+" hasta abrir la
siguiente rama:
HKEY_LOCAL_MACHINE
\SOFTWARE
\Microsoft
\Windows
\CurrentVersion
\Run
3. Pinche en la carpeta "Run" y en el panel de la derecha,
bajo la columna "Nombre", busque y borre la siguiente entrada:
ICQNet
4. Use "Registro", "Salir" para salir del editor y confirmar
los cambios.
5. Reinicie su computadora (Inicio, Apagar el sistema, Reiniciar).
Enlaces relacionados
domingo, 25 mayo 2014 |