The Storm Worm is back

Discussion in 'malware problems & news' started by Malcontent, Dec 24, 2007.

Thread Status:
Not open for further replies.
  1. computer geek

    computer geek Registered Member

    Joined:
    Oct 6, 2007
    Posts:
    776
    i'm infected i think, 4 processes 2 say stripshow1,2 2 say virus storm! how on earth did it get there? my mcafee does not detect! but virus total detect with mcafee! help!!!!
     
  2. lucas1985

    lucas1985 Retired Moderator

    Joined:
    Nov 9, 2006
    Posts:
    4,047
    Location:
    France, May 1968
    Probably the rootkit has made your McAfee blind.
     
  3. ErikAlbert

    ErikAlbert Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    9,455
    My guess is that FDISR will catch these constantly changing executables also, because they don't belong in the original archive.
     
  4. lucas1985

    lucas1985 Retired Moderator

    Joined:
    Nov 9, 2006
    Posts:
    4,047
    Location:
    France, May 1968
    All the objects installed by the downloader/dropper will be removed by FD-ISR in the next reboot.
     
  5. Long View

    Long View Registered Member

    Joined:
    Apr 30, 2004
    Posts:
    2,295
    Location:
    Cromwell Country
    "Polymorphic means that the executable is constantly changing".


    you mean as opposed to always saying or doing the same thing ?
     
  6. lucas1985

    lucas1985 Retired Moderator

    Joined:
    Nov 9, 2006
    Posts:
    4,047
    Location:
    France, May 1968
    Polymorphic means that each sample of this malware, while doing the same things (installing a rootkit, initiating outbound connections, etc) is different from the code's point of view. New variants are released within minutes of each other having subtle modifications in the code and using a slightly different version of a custom-made runtime packer.
    All this work is to bypass generic signatures, heuristics (both static and dynamic) and detection of the special runtime packer. Eventually, they produce samples that pass undetected by all AVs, leaving the user "naked" (i.e. should I click on that link or should I double-click clip.mpg.exe)
     
  7. AJohn

    AJohn Registered Member

    Joined:
    Sep 29, 2004
    Posts:
    935
    LOL :)
     
  8. risl

    risl Registered Member

    Joined:
    Dec 8, 2006
    Posts:
    581
    Now that I updated drw it doesn't detect it anymore, it was Trojan.Packed.262 for a while but nothing after update. That detection was deleted and then corrected when I checked live.drweb.com. Weird o_O :thumbd:
     
  9. EraserHW

    EraserHW Malware Expert

    Joined:
    Oct 19, 2005
    Posts:
    588
    Location:
    Italy
    Custom packer that allow authors to repack trojan in a polymorphic way from server.
    Every X minutes trojan is repacked from server using different keys in a way that almost whole trojan code doesn't look anymore the same.
     
  10. solcroft

    solcroft Registered Member

    Joined:
    Jun 1, 2006
    Posts:
    1,639
    I LOLed.

    Yep, that instead of taking some time to actually learn the basics.
     
  11. fcukdat

    fcukdat Registered Member

    Joined:
    Feb 20, 2005
    Posts:
    569
    Location:
    England,UK
    Hi folks(merry xmas all!)

    o_O Possibly something particular to my setup but have any of you seen the rootkit payload recently being deployed ?

    The last few evo's for me have dropped the principal exe & config file in the <windir> but the .sys component has gone AWOL....
     
  12. computer geek

    computer geek Registered Member

    Joined:
    Oct 6, 2007
    Posts:
    776
    not any more! But updates came in today and virustotal detected with mcafee yesterday! Mcafee obviously does not seem to care about their customers!
     
  13. EraserHW

    EraserHW Malware Expert

    Joined:
    Oct 19, 2005
    Posts:
    588
    Location:
    Italy
    New wave on the road
     
  14. fcukdat

    fcukdat Registered Member

    Joined:
    Feb 20, 2005
    Posts:
    569
    Location:
    England,UK
    Happy2008.exe ?

    BTW Are you getting beep.sys modification because it's not firing for me despite what i'm reading elsewhereo_O
     
  15. midway40

    midway40 Registered Member

    Joined:
    Jul 24, 2006
    Posts:
    1,257
    Location:
    SW MS, USA
    Symantec identifies it as a variant of Trojan.Peacomm.D. Not that I am stupid enough to click on EXE attachments in an email, lol.
     
    Last edited: Dec 25, 2007
  16. lucas1985

    lucas1985 Retired Moderator

    Joined:
    Nov 9, 2006
    Posts:
    4,047
    Location:
    France, May 1968
    Got it right, thanks Marco :)
    It's bothersome that such stupid trick is so effective :mad:
    It also shows you that security-savvy people need few security software ;)
    Your Symantec link points to a new reply to this thread LOL
     
  17. midway40

    midway40 Registered Member

    Joined:
    Jul 24, 2006
    Posts:
    1,257
    Location:
    SW MS, USA
    Doh!! Dang sinus meds o_O Link fixed :D
     
  18. Long View

    Long View Registered Member

    Joined:
    Apr 30, 2004
    Posts:
    2,295
    Location:
    Cromwell Country
    The fewer the better :isay:
     
  19. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    I would open it, in the sandbox. :)
     
  20. Cretemonster

    Cretemonster Registered Member

    Joined:
    Mar 31, 2005
    Posts:
    79
    @fd....told you sp1 was killin ya! :p
     
  21. fcukdat

    fcukdat Registered Member

    Joined:
    Feb 20, 2005
    Posts:
    569
    Location:
    England,UK

    Thanks C :thumb:

    Upgrade now in progress...

    Sp2 has landed :D
     
    Last edited: Dec 25, 2007
  22. EraserHW

    EraserHW Malware Expert

    Joined:
    Oct 19, 2005
    Posts:
    588
    Location:
    Italy
    another new variant, 2nd today
     
    Last edited: Dec 25, 2007
  23. jlo

    jlo Registered Member

    Joined:
    Nov 29, 2004
    Posts:
    475
    Location:
    UK
    Yea I just downloaded a new varient. Detected as Rootkit.gen by Antivir, Spambot origin by Dr Web. Missed by KAV but I have sent on a sample on to them (Although sure they will get it from VirusTotal)

    Anyone know if the proactive defense in KAV 7 protects against this if missed by heuristics?

    Cheers. Jlo

    Merry Christmas!
     
  24. jlo

    jlo Registered Member

    Joined:
    Nov 29, 2004
    Posts:
    475
    Location:
    UK

    Now detected by KAV as backdoor.win32.agent.

    Also I asked the question regarding Proactive defense at the KAV forum and am told KAV would stop the storm varients being installed if a user clicked on the file. Good to know!

    Cheers

    Jlo
     
  25. computer geek

    computer geek Registered Member

    Joined:
    Oct 6, 2007
    Posts:
    776
    hmmm, stormlaunchers website seems to have changed after christmas! there is no mrs clause any more.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.