Threat Encyclopedia

Selected viruses, spyware, and other threats: sorted alphabetically

Win32/Bagle.J

Win32/Bagle.J is a worm spreading in the form of an e-mail file attachment and via shared P2P network folders. Its body is compressed using the UPX utility and its size is 12 kB.

As sender identification it uses one of the following e-mail addresses:

management@
administration@
staff@
noreply@
support@

The e-mail domain of the e-mail address is the same as the recipient's e-mail domain.
As a Subject the worm uses one of the following phrases:

E-mail account security warning.
Notify about using the e-mail account.
Warning about your e-mail account.
Important notify about your e-mail account.
Email account utilization warning.
Notify about your e-mail account utilization.
E-mail account disabling warning.

The body of e-mail message is consists of a number of elements, which the worm combines together.
Beginning phrase:

Dear user of %s,
Dear user of %s gateway e-mail server,
Dear user of e-mail server "%s",
Hello user of %s e-mail server,
Dear user of "%s" mailing system,
Dear user, the management of %s mailing system wants to let you know that,

Main body phrase:

Your e-mail account has been temporary disabled because of unauthorized access.

Our main mailing server will be temporary unavaible for next two days, to continue receiving mail in these days you have to configure our free auto-forwarding service.

Your e-mail account will be disabled because of improper using in next three days, if you are still wishing to use it, please, resign your account information.

We warn you about some attacks on your e-mail account. Your computer may contain viruses, in order to keep your computer and e-mail account safe, please, follow the instructions.

Our antivirus software has detected a large ammount of viruses outgoing from your email account, you may use our free anti-virus tool to clean up your computer software.

Some of our clients complained about the spam (negative e-mail content) outgoing from your e-mail account. Probably, you have been infected by a proxy relay trojan server. In order to keep your computer safe, follow the instructions.

For more information see the attached file.
Further details can be obtained from attached file.
Advanced details can be found in attached file.
For details see the attach.
For details see the attached file.
For further details see the attach.
Please, read the attach for further details.
Pay attention on attached file.

The end of the message body:

The Management,
Sincerely,
Best wishes,
Have a good day,
Cheers,
Kind regards,

The %s team
http://www.%s

Note: % is a substitution for the mail domain of the recipient.

The name of the attachment is one of the following:

Attach
Information
Readme
Document
Info
TextDocument
TextFile
MoreInfo
Message

The attachment has one of the following extensions: ".pif", ".zip" If the file extension is ZIP, then the archive is protected by a random password made of 5 numbers. This password can be found in the message body as follows:

For security reasons attached file is password protected. The password is "<password>".
For security purposes the attached file is password protected. Password is "<password>".
Attached file protected with the password for security reasons. Password is <password>.
In order to read the attach you have to use the following password: <password>.

The ZIP file contains the worm in a file with a random file name.
The worm acquires addresses for its spreading from files with the following extensions:

.wab
.txt
.msg
.htm
.xml
.dbx
.mdx
.eml
.nch
.mmf
.ods
.cfg
.asp
.php
.adb
.tbb
.sht
.uin
.cgi

The worm doesn't spread to e-mail addresses of the following domains and usernames:

@hotmail.com
@msn.com
@microsoft
@avp.
noreply
local
root@
postmaster@

The worm searches the local disk drives for folders which name contains the string "shar" and copies itself into them using one of the following file names:

Microsoft Office 2003 Crack, Working!.exe
Microsoft Office XP working Crack, Keygen.exe
Microsoft Windows XP, WinXP Crack, working Keygen.exe
Porno Screensaver.scr
Porno, sex, oral, anal cool, awesome!!.exe
Porno pics arhive, xxx.exe
Serials.txt.exe
Windown Longhorn Beta Leak.exe
Windows Sourcecode update.doc.exe
XXX hardcore images.exe
Opera 8 New!.exe
WinAmp 5 Pro Keygen Crack Update.exe
WinAmp 6 New!.exe
Matrix 3 Revolution English Subtitles.exe
Adobe Photoshop 9 full.exe
Ahead Nero 7.exe
ACDSee 9.exe

The worm copies itself into the %system% directory using the name " irun4.exe".

In the Registry key HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run the worm creates a new entry named: "ssate.exe" with value: "%system%\irun4.exe" By changing the registry keys the worm makes sure it will be started after each restart of computer.

The worm tries to shut down the following processes:

ATUPDATER.EXE
AVWUPD32.EXE
AVPUPD.EXE
LUALL.EXE
DRWEBUPW.EXE
ICSSUPPNT.EXE
ICSUPP95.EXE
UPDATE.EXE
NUPGRADE.EXE
ATUPDATER.EXE
AUPDATE.EXE
AUTODOWN.EXE
AUTOTRACE.EXE
AUTOUPDATE.EXE
AVXQUAR.EXE
CFIAUDIT.EXE
MCUPDATE.EXE
NUPGRADE.EXE
OUTPOST.EXE
AVLTMAIN.EXE

Win32/Bagle.J just like his predecedors tries to open a backdoor on the port number 2745. By doing that it enables an attacker to run any program on the infected computer.
The worm connects to the following addresses and sends out the port number it opened:

http://postertog.de/scr.php
http://www.gfotxt.net/scr.php
http://www.maiklibis.de/scr.php

The worm terminates itself on April 25 th 2005.

The text strings found in the Bagle and Nesky worm variants indicate a possible rivalry between the author/s of Bagle/Netsky malware. Some of the strings use offending language and openly refer to a 'war'.

The detection of Win32/Bagle.J using sample is added since version 1.645 .