Follow:

 

Worm:Win32/Pushbot.BE


Worm:Win32/Pushbot.BE is a worm that spreads via MSN Messenger when commanded to by a remote attacker. This worm contains backdoor functionality that allows unauthorized access and control of an affected machine.


What to do now

Manual removal is not recommended for this threat. To detect and remove this threat and other malicious software that may have been installed, run a full-system scan with an up-to-date antivirus product such as the Microsoft Safety Scanner (http://go.microsoft.com/fwlink/?LinkId=212742). For more information, see http://www.microsoft.com/protect/computer/viruses/vista.mspx.

Threat behavior

Worm:Win32/Pushbot.BE is a worm that spreads via MSN Messenger when commanded to by a remote attacker. This worm contains backdoor functionality that allows unauthorized access and control of an affected machine.
Installation
When executed, Worm:Win32/Pushbot.BE copies itself to %windir%\wkssvc.exe and sets the attributes of this file to read-only, hidden and system. It then modifies the registry to ensure that this copy is executed at each Windows start:
 
Adds value: "Windows Console"
With data: "wkssvc.exe"
To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
 
It also displays a message box with the title "Windows Microsoft Viewer" containing the text:
 
"Picture can not be displayed."
 
It creates a mutex named "sfkgjs55555g" in order to ensure that multiple copies of the worm do not run simultaneously.
 
Spreads Via…
MSN Messenger
Using backdoor functionality (see Payload section below for additional detail) Worm:Win32/Pushbot.BE can be ordered to spread via MSN Messenger by a remote attacker. It sends a message to all of the infected user's contacts.
The worm can be ordered to spread in two different ways. It can be ordered to send a zipped copy of itself, or it can be ordered to send messages, which can contain URLs pointing to a remotely hosted copy of itself.
When sending itself inside a ZIP archive, it uses one of the following messages:
 
Hey, check out this great photo from my trip to England!
Have I shown you this new picture of my cat :)
Did you see this picture, it's hilarious!!!!!
 
The filename of the ZIP may be variable, and is provided by the remote controller via the IRC backdoor.
 
When sending a URL, the message is provided by the controller via the IRC backdoor. It has been observed to include a URL pointing to a copy of the worm executable on the domain 'mainmsn.net'.
 
Payload
Backdoor Functionality: Port 2007
Once installed, the worm connects to IRC server 'c.united-crew.org' on port 2007 and awaits instructions. Using the backdoor, a remote attacker can perform a number of actions of the affected machine, including the following:
  • Spread via MSN Messenger
  • Update itself
  • Remove itself
  • Download and execute arbitrary files
Modifies Hosts File
The worm modifies the Windows Hosts File in order to stop users from visiting the following sites:
82.165.237.14
82.165.250.33
avp.com
ca.com
casablanca.cz
customer.symantec.com
d-eu-1f.kaspersky-labs.com
d-eu-1h.kaspersky-labs.com
d-eu-2f.kaspersky-labs.com
d-eu-2h.kaspersky-labs.com
d-ru-1f.kaspersky-labs.com
d-ru-1h.kaspersky-labs.com
d-ru-2f.kaspersky-labs.com
d-ru-2h.kaspersky-labs.com
d-us-1f.kaspersky-labs.com
d-us-1h.kaspersky-labs.com
d66.myleftnut.info
dispatch.mcafee.com
download.mcafee.com
downloads-us1.kaspersky.com
downloads1.kaspersky.com
downloads1.kaspersky.ru
downloads2.kaspersky.com
downloads2.kaspersky.ru
downloads3.kaspersky.ru
downloads4.kaspersky.ru
downloads5.kaspersky.ru
ebay.com
eset.casablanca.cz
eset.com
f-secure.com
ftp.downloads1.kaspersky-labs.com
ftp.downloads2.kaspersky-labs.com
grisoft.com
kaspersky-labs.com
kaspersky.com
liveupdate.symantec.com
liveupdate.symantecliveupdate.com
mast.mcafee.com
mcafee.com
metalhead2005.info
microsoft.com
moneybookers.com
my-etrust.com
nai.com
networkassociates.com
nod32.com
norton.com
pandasoftware.com
paypal.com
rads.mcafee.com
secure.nai.com
securityresponse.symantec.com
sophos.com
symantec.com
trendmicro.com
u2.eset.com
u3.eset.com
u4.eset.com
u7.eset.com
update.symantec.com
updates-us1.kaspersky.com
updates.symantec.com
updates1.kaspersky-labs.com
updates1.kaspersky.com
updates2.kaspersky-labs.com
updates2.kaspersky.com
updates3.kaspersky-labs.com
updates3.kaspersky.com
us.mcafee.com
viruslist.com
virustotal.com
www.amazon.ca
www.amazon.co.uk
www.amazon.com
www.amazon.fr
www.avp.com
www.ca.com
www.ebay.com
www.eset.com
www.f-secure.com
www.grisoft.com
www.kaspersky.com
www.mcafee.com
www.microsoft.com
www.moneybookers.com
www.my-etrust.com
www.nai.com
www.networkassociates.com
www.nod32.com
www.norton.com
www.pandasoftware.com
www.paypal.com
www.sophos.com
www.symantec.com
www.trendmicro.com
www.viruslist.com
www.virustotal.com

Symptoms

System Changes
The following system changes may indicate the presence of Worm:Win32/Pushbot.BD:
  • Presence of the following file: %windir%\wkssvc.exe
  • Presence of the following registry modification:
    Adds value: "Windows Console"
    With data: "wkssvc.exe"
    To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
  • Display of the following message:

Prevention


Alert level: Severe
First detected by definition: 1.45.287.0
Latest detected by definition: 1.131.1058.0 and higher
First detected on: Oct 07, 2008
This entry was first published on: Jan 29, 2008
This entry was updated on: Apr 17, 2011

This threat is also detected as:
No known aliases