词条 | Slenfbot |
释义 |
Slenfbot is the classification for a family of malicious software (malware), which infects files on Microsoft Windows systems. Slenfbot was first discovered in 2007 and, since then, numerous variants have followed; each with slightly different characteristics and new additions to the worm's payload, such as the ability to provide the attacker with unauthorized access to the compromised host. Slenfbot primarily spreads by luring users to follow links to websites, which contain a malicious payload. Slenfbot propagates via instant messaging applications, removable drives and/or the local network via network shares. The code for Slenfbot appears to be closely managed, which may provide attribution to a single group and/or indicate that a large portion of the code is shared amongst multiple groups. The inclusion of other malware families and variants as well as its own continuous evolution, makes Slenfbot a highly effective downloader with a propensity to cause even more damage to compromised systems. AliasesThe majority of Antivirus (A/V) vendors use the following naming conventions when referring to this family of malware (the * at the end of the names is a wildcard for all the possible classifications and/or distinctions for this malware family):
Publicly Known EffortsNone publicly known. Malware ProfileSummarySlenfbot is a worm that spreads using links to websites containing malicious software (malware) via instant messaging programs, which may include MSN/Windows Live Messenger, AOL Instant Messenger (AIM), Yahoo Messenger, Google Chat, Facebook Chat, ICQ and Skype. The worm propagates automatically via removable drives and shares, or on the local network through the Windows file sharing service (i.e., Server or LanmanServer service). Slenfbot also contains backdoor capabilities that allow unauthorized access to an affected machine.[1][2][3][4][5][6] The code appears to be closely controlled, which may provide attribution to one group and/or that the malware authors share a significant portion of the code. Slenfbot has been seen in the wild since 2007, obtained new features and capabilities over time, and subsequent variants have systematically gained similar, if not the same, feature sets. Because of this, Slenfbot continues to operate as an effective infector and dynamic downloader of additional malware; thus, making it a highly functional delivery mechanism for other spyware, information stealers, spam bots as well as other malware.[4] InstallationWhen executed, Slenfbot copies a duplicate of the malicious payload to the %SYSTEM% folder with a filename, which varies per the particular variant and sets the attributes for the copy to read only, hidden and system to hide the contents in Windows Explorer. The worm then makes changes to the registry to maintain persistence so that the malware executes a duplicate copy on each subsequent startup of the system (e.g. copying the malicious executable to the HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Run subkey). Several variants may modify the registry during installation to add the malware to the list of applications that are authorized to access the Internet; thus, allowing the malware to communicate without raising Windows security alerts and run unimpeded by the Windows Firewall.[1][2][3][4][5][6] In some cases, variants may instead modify the registry to install the malicious payload as a debugger for the benign system file ctfmon.exe so that ctfmon.exe executes on system startup, which leads to the execution of the malware.[1] In most cases, Slenfbot will attempt to delete the original copy of the worm. Some variants may make additional modifications to the registry in order to delete the originally executed copy of the worm when the system restarts.[1][2][3][5][6] Some Slenfbot variants may, on initial execution, test to see if MSN/Windows Live Messenger is currently running by looking for a window with the class name "MSBLWindowClass". If the worm finds the window, the malware may display a fake error message.[1] If Slenfbot is launched from a removable drive, some variants may open Windows Explorer and display the contents of the affected drive. Certain Slenfbot variants may inject a thread into explorer.exe, which periodically checks for the presence of the malware in the System folder. If the file is not found, the malware downloads a new copy from a specified server and launches the new copy.[1][4][6] Method of PropagationInstant MessagingSlenfbot uses instant messaging as an attack vector to spread the worm to other accounts and contacts. The remote attacker may use the worm’s backdoor capabilities to instruct Slenfbot to spread via MSN/Windows Live Messenger, AOL Instant Messenger (AIM), Yahoo Messenger, Google Chat, Facebook Chat, ICQ and Skype. The worm connects to a remote server and sends a copy of a URL, which contains a list of possible messages to send randomly; creates a ZIP archive, which contains a copy of the malware; and then sends the ZIP archive to other instant messaging client contacts.[1][2][3][4][5][6] Following are some examples of the messages the worm may spread:
The ZIP file includes a file name for the Slenfbot executable, and may also contain a URL for a file to download in situations where the attacker instructs the worm to send arbitrary file(s).[1][5][6] Removable DrivesSlenfbot may spread to removable drives by creating a directory called “RECYCLER” in the root directory of the removable drive. The malware will then create a subdirectory in the “RECYCLER” folder (e.g. “S-1-6-21-1257894210-1075856346-012573477-2315”), and copy the malicious payload to the directory using a different name for the executable (e.g. “folderopen.exe”). Slenfbot may also create an autorun.inf file in the root directory of the drive so that the worm may execute if the drive is connected to another system.[1][6] Certain variants may download an updated copy of Slenfbot from a location specified in the worm, and write the file to a directory (e.g. using the name “~secure”). For all the locations the worm copies itself to, Slenfbot sets the hidden and system attributes on the respective directories and files.[1][5][6] In some circumstances due to a programming issue, Slenfbot may only create one directory rather than two (e.g. “E:\\RECYCLERS-1-6-21-1257894210-1075856346-012573477-2315\\folderopen.exe”).[1] File and Print SharesSlenfbot may spread to accessible shares upon successful compromise of a system. The worm may also spread to file and print shares by exploiting known vulnerabilities such as MS06-040 or MS10-061, which pertain to issues with the Server and Print Spooler services, respectively. The attacker would have to instruct the worm to spread to the remote system via exploit or instant messaging in order to continue the propagation of Slenfbot.[1][5][6][7][8] Payload
PreventionThe following steps may help prevent infection:
RecoverySlenfbot uses stealth measures to maintain persistence on a system; thus, you may need to boot to a trusted environment in order to remove it. Slenfbot may also make changes to your computer such as changes to the Windows Registry, which makes it difficult to download, install and/or update your virus protection. Also, since many variants of Slenfbot attempt to propagate to available removable/remote drives and network shares, it is important to ensure the recovery process thoroughly detects and removes the malware from any and all known/possible locations. One possible solution would be to use Microsoft’s Windows Defender Offline Beta to detect and remove Slenfbot from your system. For more information on Windows Defender Offline, go to: http://windows.microsoft.com/en-US/windows/what-is-windows-defender-offline [1][2][3] See also
References1. ^1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 {{cite web|url=http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?name=Win32%2FSlenfbot |title=Win32/Slenfbot |author=Microsoft Malware Protection Center |publisher=Microsoft |date=2008-08-26 |accessdate=2012-06-17}} {{Botnets}}2. ^1 2 3 4 5 6 {{cite web|url=http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Worm%3aWin32%2fStekct.A |title=Worm:Win32/Stekct.A |author=Microsoft Malware Protection Center |publisher=Microsoft |date=2012-02-15 |accessdate=2012-06-17}} 3. ^1 2 3 4 5 6 7 {{cite web|url=http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Worm%3aWin32%2fStekct.B |title=Worm:Win32/Stekct.B |author=Microsoft Malware Protection Center |publisher=Microsoft |date=2012-02-29 |accessdate=2012-06-17}} 4. ^1 2 3 4 5 6 7 {{cite web|url=https://blogs.technet.com/b/mmpc/archive/2008/09/17/win32-slenfbot-just-another-irc-bot.aspx |title=Win32/Slenfbot - Just Another IRC bot? |author=Microsoft Malware Protection Center |publisher=Hamish O'Dea |date=2008-09-17 |accessdate=2012-06-17}} 5. ^1 2 3 4 5 6 7 8 9 10 11 12 13 {{cite web|url=http://gsa.ca.com/virusinfo/virus.aspx?ID=73380 |title=Win32/Slenfbot |author=Methusela Cebrian Ferrer |publisher=CA Technologies |date=2008-10-01 |accessdate=2012-06-17}} 6. ^1 2 3 4 5 6 7 8 9 10 11 12 13 {{cite web|url=http://www.eset.eu/encyclopaedia/win32-slenfbo-ad-net-worm-kolab-xho-trojan-meredrop?lng=en |title=Win32/Slenfbot.AD |author=ESET Threat Encyclopaedia |publisher=ESET |date=2011-01-17 |accessdate=2012-06-17}} 7. ^{{cite web|url=https://technet.microsoft.com/en-us/security/bulletin/ms06-040 |title=Microsoft Security Bulletin MS06-040 |author=Microsoft Security Tech Center |publisher=Microsoft |date=2006-08-08 |accessdate=2012-06-17}} 8. ^{{cite web|url=https://technet.microsoft.com/en-us/security/bulletin/MS10-061 |title=Microsoft Security Bulletin MS10-061 |author=Microsoft Security Tech Center |publisher=Microsoft |date=2010-09-14 |accessdate=2012-06-17}} 9. ^{{cite web|url=http://malwr.com/ |title=Malwr.com |accessdate=2012-06-17}} 10. ^{{cite web|url=https://www.virustotal.com/ |title=VirusTotal |accessdate=2012-06-17}} 11. ^{{cite web|url=http://anubis.iseclab.org/ |title=Anubis |accessdate=2012-06-17}} 12. ^{{cite web|url=http://wepawet.iseclab.org/ |title=Wepawet |accessdate=2012-06-17}} 13. ^{{cite web|url=http://www.sparkingdawn.com/2012/05/steckt-evl-new-facebook-virus/ |title=Stekct.Evl |author=Kurt Avish |publisher=Sparking Dawn |date=2012-05-22 |accessdate=2012-06-17}} 14. ^{{cite web|url=http://www.hacktik.com/protection-from-facebook-chat-steckt-evi-virus.html/ |title=Stekct.Evi |author=Maninder Singh |publisher=HackTik |date=2012-05-22 |accessdate=2012-06-17}} 5 : Computer network security|Multi-agent systems|Distributed computing projects|Spamming|Botnets |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。