My Bitdefender
  • 0 Shopping Cart

Bitdefender
Resource Center

Win32.Bagle.AU@mm

( Win32.Beagle.AR@mm (Symantec) )
Spreading: medium
Damage: very low
Size: ~20Kbytes
Discovered: 2004 Sep 28

SYMPTOMS:

The presence of the following registry keys:

HKCU\SOFTWARE\bawindo
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bawindo with value %system%\bawindo.exe

Presence of the following files:

%system%\re_file.exe
%system%\bawindo.exe
%system%\bawindo.exeopen
%system%\bawindo.exeopenopen

Additionally, depending on the virus format in e-mail,
%windows%\cjector.exe

TECHNICAL DESCRIPTION:

Virus comes archived with PeX. It may come as a two-part package: a small dropper that dumps the main viral body and executes it, or just the viral body.

At execution, it creates the following mutexes:

MuXxXxTENYKSDesignedAsTheFollowerOfSkynet-D
 'D'r'o'p'p'e'd'S'k'y'N'e't'
_-oOaxX|-+S+-+k+-+y+-+N+-+e+-+t+-|XxKOo-_
[SkyNet.cz]SystemsMutex
AdmSkynetJklS003
____--->>>>U<<<<--____
_-oO]xX|-S-k-y-N-e-t-|Xx[Oo-_


Then attempts to delete the following keys from the registry location [HKCU|HKLM]\SOFTWARE\Microsoft\Windows\CurrentVersion\Run:

My AV
Zone Labs Client Ex
9XHtProtect
Antivirus
Special Firewall Service
service
Tiny AV
ICQNet
HtProtect
NetDy
Jammer2nd
FirewallSvr
MsInfo
SysMonXP
EasyAV
PandaAVEngine
Norton Antivirus AV
KasperskyAVEng
SkynetsRevenge
ICQ Net

At every 100milliseconds, searches and kills if present the following processes:

mcagent.exe
mcvsshld.exe
mcshield.exe
mcvsescn.exe
mcvsrte.exe
DefWatch.exe
Rtvscan.exe
ccEvtMgr.exe
NISUM.EXE
ccPxySvc.exe
navapsvc.exe
NPROTECT.EXE
nopdb.exe
ccApp.exe
Avsynmgr.exe
VsStat.exe
Vshwin32.exe
alogserv.exe
RuLaunch.exe
Avconsol.exe
PavFires.exe
FIREWALL.EXE
ATUPDATER.EXE
LUALL.EXE
DRWEBUPW.EXE
AUTODOWN.EXE
NUPGRADE.EXE
OUTPOST.EXE
ICSSUPPNT.EXE
ICSUPP95.EXE
ESCANH95.EXE
AVXQUAR.EXE
ESCANHNT.EXE
ATUPDATER.EXE
AUPDATE.EXE
AUTOTRACE.EXE
AUTOUPDATE.EXE
AVXQUAR.EXE
AVWUPD32.EXE
AVPUPD.EXE
CFIAUDIT.EXE
UPDATE.EXE
NUPGRADE.EXE
MCUPDATE.EXE
pavsrv50.exe
AVENGINE.EXE
APVXDWIN.EXE
pavProxy.exe
navapw32.exe
navapsvc.exe
ccProxy.exe
navapsvc.exe
NPROTECT.EXE
SAVScan.exe
SNDSrvc.exe
symlcsvc.exe
LUCOMS~1.EXE
blackd.exe
FrameworkService.exe
VsTskMgr.exe
SHSTAT.EXE
UpdaterUI.exe

The virus searches for e-mail addresses in files with the following name pattern:

.wab
.txt
.msg
.htm
.shtm
.stm
.xml
.dbx
.mbx
.mdx
.eml
.nch
.mmf
.ods
.cfg
.asp
.php
.wsh
.adb
.tbb
.sht
.xls
.oft
.uin
.cgi
.mht
.dhtm
.jsp

The e-mail format that the virus uses is the following:

From:
Subject: random from the following:

Re: Hello
Re: Thank you!
Re: Thanks :)
Re: Hi

Body: one of the:
:)
:))

Attachement name: one of the:
Price
price
Joke

with the extension .exe, .com, .scr or .cpl.

The infected e-mail will not be send to e-mail addresses that contain:

@hotmail
@msn
@microsoft
rating@
f-secur
news
update
anyone@
bugs@
contract@
feste
gold-certs@
help@
info@
nobody@
noone@
kasp
admin
icrosoft
support
ntivi
unix
linux
listserv
certific
sopho
@foo
@iana
free-av
@messagelab
winzip
google
winrar
samples
abuse
panda
cafee
spam
@avp.
noreply
local
root@
postmaster@

The virus will create copies of itself in all directories that contain the string "shar" under the following names:

Microsoft Office 2003 Crack, Working!.exe
Microsoft Windows XP, WinXP Crack, working Keygen.exe
Microsoft Office XP working Crack, Keygen.exe
Porno, sex, oral, anal cool, awesome!!.exe
Porno Screensaver.scr
Serials.txt.exe
KAV 5.0
Kaspersky Antivirus 5.0
Porno pics arhive, xxx.exe
Windows Sourcecode update.doc.exe
Ahead Nero 7.exe
Windown Longhorn Beta Leak.exe
Opera 8 New!.exe
XXX hardcore images.exe
WinAmp 6 New!.exe
WinAmp 5 Pro Keygen Crack Update.exe
Adobe Photoshop 9 full.exe
Matrix 3 Revolution English Subtitles.exe
ACDSee 9.exe

The virus, as usual, creates a backdoor, this time on port 81.
It will attempt to download a file from the following websites:

http://www.bottombouncer.com/
http://www.bottombouncer.com/
http://www.anthonyflanagan.com/
http://www.bradster.com/
http://www.traverse.com/
http://www.ims-i.com/
http://www.realgps.com/
http://www.aviation-center.de/
http://www.gci-bln.de/
http://www.pankration.com/
http://www.jansenboiler.com/
http://www.corpsite.com/
http://www.everett.wednet.edu/
http://www.onepositiveplace.org/
http://www.raecoinc.com/
http://www.wwwebad.com/
http://www.corpsite.com/
http://www.wwwebmaster.com/
http://www.wwwebad.com/
http://www.dragcar.com/
http://www.wwwebad.com/
http://www.oohlala-kirkland.com/
http://www.calderwoodinn.com/
http://www.buddyboymusic.com/
http://www.smacgreetings.com/
http://www.tkd2xcell.com/
http://www.curtmarsh.com/
http://www.dontbeaweekendparent.com/
http://www.soloconsulting.com/
http://www.lasermach.com/
http://www.generationnow.net/
http://www.flashcorp.com/
http://www.kencorbett.com/
http://www.FritoPie.NET/
http://www.leonhendrix.com/
http://www.transportation.gov.bh/
http://www.transportation.gov.bh/
http://www.jhaforpresident.7p.com/
http://www.DarrkSydebaby.com/
http://www.cntv.info/
http://www.sugardas.lt/
http://www.adhdtests.com/
http://www.argontech.net/
http://www.customloyal.com/
http://www.ohiolimo.com/
http://www.topko.sk/
http://www.alupass.lu/
http://www.sigi.lu/
http://www.redlightpictures.com/
http://www.irinaswelt.de/
http://www.bueroservice-it.de/
http://www.kranenberg.de/
http://www.kranenberg.de/
http://www.the-fabulous-lions.de/
http://www.the-fabulous-lions.de/
http://www.mongolische-renner.de/
http://www.mongolische-renner.de/
http://www.capri-frames.de/
http://www.capri-frames.de/
http://www.aimcenter.net/
http://www.boneheadmusic.com/
http://www.fludir.is/
http://www.sljinc.com/
http://www.tivogoddess.com/
http://www.fcpages.com/
http://www.andara.com/
http://www.freeservers.com/
http://www.programmierung2000.de/
http://www.asianfestival.nl/
http://www.aviation-center.de/
http://www.gci-bln.de/
http://www.mass-i.kiev.ua/
http://www.jasnet.pl/
http://www.atlantisteste.hpg.com.br/
http://www.fludir.is/
http://www.rieraquadros.com.br/
http://www.metal.pl/
http://www.handsforhealth.com/
http://www.angelartsanctuary.com/
http://www.firstnightoceancounty.org/
http://www.chinasenfa.com/
http://www.chinasenfa.com/
http://www.ulpiano.org/
http://www.gamp.pl/
http://www.vikingpc.pl/
http://www.woundedshepherds.com/
http://www.cpc.adv.br/
http://www.velocityprint.com/
http://www.esperanzaparalafamilia.com/
http://www.celula.com.mx/
http://www.mexis.com/
http://www.wecompete.com/
http://www.vbw.info/
http://www.gfn.org/
http://www.aegee.org/
http://www.deadrobot.com/
http://www.cscliberec.cz/
http://www.ecofotos.com.br/
http://www.amanit.ru/
http://www.bga-gsm.ru/
http://www.innnewport.com/
http://www.knicks.nl/
http://www.srg-neuburg.de/
http://www.mepmh.de/
http://www.mepbisu.de/
http://www.kradtraining.de/
http://www.polizeimotorrad.de/
http://www.sea.bz.it/
http://www.uslungiarue.it/
http://www.gcnet.ru/
http://www.aimcenter.net/
http://www.vandermost.de/
http://www.vandermost.de/
http://www.szantomierz.art.pl/
http://www.immonaut.sk/
http://www.eurostavba.sk/
http://www.spadochron.pl/
http://www.pyrlandia-boogie.pl/
http://www.kps4parents.com/
http://www.pipni.cz/
http://www.selu.edu/
http://www.travelchronic.de/
http://www.fleigutaetscher.ch/
http://www.irakli.org/
http://www.oboe-online.com/
http://www.oboe-online.com/
http://www.pe-sh.com/
http://www.idb-group.net/
http://www.ceskyhosting.cz/
http://www.ceskyhosting.cz/
http://www.hartacorporation.com/
http://www.glass.la/
http://www.glass.la/
http://www.24-7-transportation.com/
http://www.fepese.ufsc.br/
http://www.ellarouge.com.au/
http://www.bbsh.org/
http://www.boneheadmusic.com/
http://www.sljinc.com/
http://www.tivogoddess.com/
http://www.fcpages.com/
http://www.szantomierz.art.pl/
http://www.elenalazar.com/
http://www.ssmifc.ca/
http://www.reliance-yachts.com/
http://www.worest.com.ar/
http://www.kps4parents.com/
http://www.coolfreepages.com/
http://www.scanex-medical.fi/
http://www.jimvann.com/
http://www.orari.net/
http://www.himpsi.org/
http://www.mtfdesign.com/
http://www.jldr.ca/
http://www.relocationflorida.com/
http://www.rentalstation.com/
http://www.approved1stmortgage.com/
http://www.velezcourtesymanagement.com/
http://www.sunassetholdings.com/
http://www.compsolutionstore.com/
http://www.uhcc.com/
http://www.justrepublicans.com/
http://www.pfadfinder-leobersdorf.com/
http://www.featech.com/
http://www.vinirforge.com/
http://www.magicbottle.com.tw/
http://www.giantrevenue.com/
http://www.couponcapital.net/
http://www.crystalrose.ca/

The virus will become inactive after the date 25.04.2006.

Removal instructions:

Let BitDefender delete all files it finds infected.

ANALYZED BY:

Daniel Ionita Virus Researcher.
Premium Virus & Spyware Removal
One shot malware cleanup by our certified professionals
Free tools & Free removal tools
Experience the powerful free apps and free removal tools designed by Bitdefender! Get extra protection for your PC, smartphone and social networks with these cool apps and plugins.
Bitdefender's Security News & Alerts
Stay safe online. Click here if you want to receive the latest news and alerts on computer threats, viruses and scams.

Bitdefender e-Guides Series

The Bitdefender e-Guides series is a learning initiative aiming to provide the Bitdefender reader and user community with valuable information about e-threats and the security issues of the IT&C realm, while also offering practical advice and feasible solutions to their on-line defense needs. The Bitdefender security analysts share their knowledge in malware prevention, identification and annihilation, with an emphasis on on-line privacy and different technologies, countermeasures and cybercrime prevention methods.

Covering topics that range from kids and family's on-line protection, safe social networking and preventing data safety breaches to securing enterprise environments, the e-Guides series is intended for a broad audience of small organizations and individual users concerned about the safety and integrity of their networks and systems. The e-Guides also address issues pertaining to the daily activity of IT&C Systems Security Managers, System and Network Administrators, Security Technology Developers, Analysts, and Researchers.

Safe Blogging Guide

Tips and tricks on how to keep your blog and your identity safe

Safe Blogging Guide

Blogging is one of the most popular forms of written expression on the web, with more than 150 million indexed blogs worldwide. While regular readers are looking for pieces of information and articles, cyber-crooks take a different interest in them. Finding private information and getting cheap storage space for their malware campaigns are only two of the multitude of users they may subject your blog to.

This material covers the basic guidelines for safe blogging and is especially focused on individual blogs that are either self-hosted or provided as a service by major blog providers.



Securing Wireless Networks Guide

Tips and tricks on how to shield your home network from intruders

Securing Wireless Networks Guide

This document is intended for computer users who have deployed or plan to deploy a home wireless network. At a time when wireless communication has become a significant part of our lives, cyber-criminals try to exploit every security breach in the wireless configuration in order to intercept traffic or use the internet connection for illegal purposes.

The following guide will teach you the best practices when using unsecured wireless networks, as well as how to properly configure your home router or access point to prevent others from abusing your network.



Protecting Children On-line Guide

How to secure and defend the digital experience of your kids


This document is intended for family, parents and teachers and its purpose is to help secure the digital activities of kids and teens. In an age when the mass production and accessibility of computers have turned these devices into regular family or household commodities, children get familiar with PCs and Internet from a very fresh age. Despite its obvious communication-related benefits, the WWW can also be a hazardous place for kids, with e-threats directly targeting their age group and their home or school computers.

This e-Guide covers the main risks and dangers for kids on-line, such as cyber-bulling, exposure to inappropriate content, on-line addiction and other harmful online actions, while also focusing on topics such as malware, phishing, ID theft and spam, to which teenagers, just as any other Internet users, are exposed nowadays. A Safety Tips section helps parents and teachers better understand and deal with these issues in relation to the kids.



Silver Surfers On-line Safety Guide

How to protect valuable ideas and assets from cyber-hacking


This document is intended for families and senior citizens and its purpose is to help them browse the web safely and enjoy their on-line activities.

At a first glance, it would appear that senior citizens are exposed to cybercrime just as much as any other inexperienced Internet user, irrespective of their age. However, as this e-Guide shows through several case studies, there are several risks and dangers targeting directly silver surfers, such as pension delivery and fallacious tax paying methods or income-related scams. Examples, tips and advice complement the case studies and provide readers with useful guidelines in their daily on-line routine.



Preventing Data Breaches Guide

How to protect valuable ideas and assets from cyber-hacking


The e-guide was designed to cover the various potential sore points of business data safety, from the matter of the network's physical integrity to the complicated mechanisms of business targeted cybercrime (e.g. banker Trojans, phishing). This material is also intended to match, though not in as much detail as a full-fledged technical description, the features of the various consumer and business oriented Bitdefender solutions to the situations in which they might come in handy to IT administrators.

Consulting this document would be useful in the process of deciding what's best for small to medium-sized networks security and a solid basis for further comparative research on this subject.

Premium Virus & Spyware Removal
One shot malware cleanup by our certified professionals
Free tools & Free removal tools
Experience the powerful free apps and free removal tools designed by Bitdefender! Get extra protection for your PC, smartphone and social networks with these cool apps and plugins.
Bitdefender's Security News & Alerts
Stay safe online. Click here if you want to receive the latest news and alerts on computer threats, viruses and scams.
Premium Virus & Spyware Removal
One shot malware cleanup by our certified professionals
Free tools & Free removal tools
Experience the powerful free apps and free removal tools designed by Bitdefender! Get extra protection for your PC, smartphone and social networks with these cool apps and plugins.
Bitdefender's Security News & Alerts
Stay safe online. Click here if you want to receive the latest news and alerts on computer threats, viruses and scams.

test

Bitdefender E-Threats Landscape Reports

The purpose of this report is to provide a comprehensive investigation of the threats’ landscape. Bitdefender’s security experts thoroughly analyze and examine the menaces of the each semester, focusing on software vulnerabilities and exploits, different types of malware, as well as countermeasures, cyber crime prevention and law enforcement.The E-Threats Landscape Report concentrates mainly on the latest trends, but it also contains facts and data and concerning the previously investigated periods, as well as several predictions related to the upcoming semesters.This document is primarily intended for IT&C System’s Security Managers, System and Network Administrators, Security Technology Developers, Analysts, and Researchers, but it also addresses issues pertaining to a broader audience, like small organizations or individual users concerned about the safety and integrity of their networks and systems.

H2 2012 E-Threat Landscape Report - Overview

For the first half of the year, zero-day vulnerabilities played an essential role in disseminating malware with exploit packs as a favorite vector of infection. The dangerous zero-day exploit in the Java Runtime Environment (CVE-2012-4681) was documented and proof of concept was added to Metasploit, which became public knowledge before a fix was made available.

As a direct result, three billion devices running Java were vulnerable to remote code exploitation for roughly 48 hours. A second exploit hit in September and targeted Internet Explorer 9. Successful exploitation would allow remote compromise of the system with the installation of the Poison Ivy backdoor. Both zero-day exploits were used in advanced persistent attacks.

2012 saw fluctuations in the amount of junk e-mail as a proportion of e-mail traffic. The year began with a slight decrease in spam e-mails, but spam constantly gained ground towards the middle of the year. According to data gathered from the Bitdefender Antispam lab, the second half saw growth again, with small variations towards the end of 2012. The increase in the number of junk e-mails was nonetheless minor, by only 5%, leading to a rough value of 73% of the total number of e-mails sent worldwide.

Download now the full H2 2012 E Threat Landscape Report (pdf)

Download now the overview H2 2012 E Threat Landscape Executive Summary (pdf)


Archive

2012
Download now H1 2012 E Threat Landscape Report (pdf)

2011
Download now H1 2011 E-Threats Landscape Report - Executive Summary (pdf)
Download now H2 2011 E-Threat Landscape Report (pdf)
Download now H2 2011 E-Threat Landscape Report - Executive Summary (pdf)

2010
Download now H2 2010 E-Threats Landscape Report - Executive Summary (pdf)
Download now H2 2010 E-Threats Landscape Report (pdf)
Download now H1 2010 E-Threats Landscape Report - Executive Summary (pdf)
Download now H1 2010 E-Threats Landscape Report (pdf)

2009
Download now H1 2009 Malware and Spam Review Executive Summary (pdf)
Download now H1 2009 E-Threats Landscape Report (pdf)
Download now H2 2009 Malware and Spam Review (pdf)
Download now H2 2009 E-Threats Landscape Report - Executive Summary (pdf)

2008
Download now H1 2008 E-Threats Landscape Report (pdf)
Download now H2 2008 E-Threats Landscape Report (pdf)

Premium Virus & Spyware Removal
One shot malware cleanup by our certified professionals
Free tools & Free removal tools
Experience the powerful free apps and free removal tools designed by Bitdefender! Get extra protection for your PC, smartphone and social networks with these cool apps and plugins.
Bitdefender's Security News & Alerts
Stay safe online. Click here if you want to receive the latest news and alerts on computer threats, viruses and scams.
Premium Virus & Spyware Removal
One shot malware cleanup by our certified professionals
Free tools & Free removal tools
Experience the powerful free apps and free removal tools designed by Bitdefender! Get extra protection for your PC, smartphone and social networks with these cool apps and plugins.
Bitdefender's Security News & Alerts
Stay safe online. Click here if you want to receive the latest news and alerts on computer threats, viruses and scams.

Who to ask? Below you have a list of all of our media representatives who are ready to answer any question you might have.



Razvan Stoica
PR Coordinator
UK
+40 212 063 470
publicrelations[at]bitdefender[dot]com



Catalin Cosoi
Chief Security Strategist
Head of Communications
+40 212 063 470
publicrelations[at]bitdefender[dot]com



Andrei Taflan
Global PR Manager
+40 212 063 470
publicrelations[at]bitdefender[dot]com


Premium Virus & Spyware Removal
One shot malware cleanup by our certified professionals
Free tools & Free removal tools
Experience the powerful free apps and free removal tools designed by Bitdefender! Get extra protection for your PC, smartphone and social networks with these cool apps and plugins.
Bitdefender's Security News & Alerts
Stay safe online. Click here if you want to receive the latest news and alerts on computer threats, viruses and scams.