a1234567mdy 发表于 2011-12-23 03:07

Worm:Win32/Morto.A

<a href="http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Worm%3AWin32%2FMorto.A" target="_blank">http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry.aspx?Name=Worm%3AWin32%2FMorto.A</a><br>
<div class="wrapLongText" id="contentTitle" style="overflow: hidden; width: 910px;"><span id="ctl00_ctl00_pageContent_contentTop_ctl00_contenttop_contentTitleText">Worm:Win32/Morto.A</span>
<a id="ctl00_ctl00_pageContent_contentTop_ctl00_contenttop_hlNaming" title="Learn more about how the MMPC names malware" href="../../Shared/Help.aspx#malware_naming" target="_self">(?)</a> </div><br>
<div class="contentText" style="width: 910px;"><b>Encyclopedia
entry</b><br>Updated: Sep 01, 2011 <span>&nbsp;|&nbsp; </span>Published: Aug 28, 2011
<br><br><b>Aliases</b><br>
<ul class="notranslate" style="padding: 0px; margin: 0px; list-style-type: none;"><li><span id="ctl00_ctl00_pageContent_contentTop_ctl00_contenttop_repAliases_ctl01_lblAlias">Trojan
horse Generic24.OJQ </span>(<span id="ctl00_ctl00_pageContent_contentTop_ctl00_contenttop_repAliases_ctl01_lblVendor">AVG</span>)

</li><li><span id="ctl00_ctl00_pageContent_contentTop_ctl00_contenttop_repAliases_ctl03_lblAlias">Trojan.DownLoader4.48720</span>
(<span id="ctl00_ctl00_pageContent_contentTop_ctl00_contenttop_repAliases_ctl03_lblVendor">Dr.Web</span>)

</li><li><span id="ctl00_ctl00_pageContent_contentTop_ctl00_contenttop_repAliases_ctl05_lblAlias">Win-Trojan/Helpagent.7184</span>
(<span id="ctl00_ctl00_pageContent_contentTop_ctl00_contenttop_repAliases_ctl05_lblVendor">AhnLab</span>)

</li><li><span id="ctl00_ctl00_pageContent_contentTop_ctl00_contenttop_repAliases_ctl07_lblAlias">Troj/Agent-TEE</span>
(<span id="ctl00_ctl00_pageContent_contentTop_ctl00_contenttop_repAliases_ctl07_lblVendor">Sophos</span>)

</li><li><span id="ctl00_ctl00_pageContent_contentTop_ctl00_contenttop_repAliases_ctl09_lblAlias">Backdoor:Win32/Morto.A</span>
(<span id="ctl00_ctl00_pageContent_contentTop_ctl00_contenttop_repAliases_ctl09_lblVendor">Microsoft</span>)
</li></ul><br><b>Alert Level</b> <a id="ctl00_ctl00_pageContent_contentTop_ctl00_contenttop_hlAlertLevel" title="Learn more about the MMPC Alert Levels" href="../../Shared/Help.aspx#alert_level" target="_self">(?)</a><br>Severe
<br><br><b><span class="notranslate">Antimalware</span> protection
details</b><br><span class="notranslate">Microsoft</span> recommends that you
download the <a id="ctl00_ctl00_pageContent_contentTop_ctl00_contenttop_latestDef" href="../../Definitions/ADL.aspx">latest definitions</a> to get protected.
<div class="leftmarg">
<table>
<tbody>
<tr>
<td>Detection last updated: <br>Definition: 1.111.1134.0<br>Released: Aug 31,
2011 </td>
<td style="width: 50px;"><br></td>
<td>Detection initially created: <br>Definition: 1.111.868.0<br>Released: Aug
27, 2011 </td></tr></tbody></table></div></div>
<div><br>


On this page
<div class="sectionpadding"><a href="#summary_link" target="_blank">Summary</a><span class="separatorbar">|</span><a href="#symptoms_link" target="_blank">Symptoms</a><span class="separatorbar">|</span><a href="#techdetails_link" target="_blank">Technical
Information</a><span class="separatorbar">|</span><a href="#prevention_link" target="_blank">Prevention</a><span class="separatorbar">|</span><a href="#recovery_link" target="_blank">Recovery</a><br></div><br></div>
<div class="wrapLongText" id="EntryContentDetails">

<br><a name="summary_link">&nbsp;</a>
Summary
<div class="detailSectionPadding contentText">
<div align="left"><span class="notranslate"><em>Worm:Win32/Morto.A</em> </span>is a worm
that allows unauthorized access to an affected computer. It spreads by trying to
compromise administrator passwords for <span class="notranslate">Remote
Desktop</span> connections on a network.</div>
<div align="left">
<div align="left">
Additional information for Enterprise
users
<p>In the wild, we have observed this
threat infecting computers by targeting accounts that have 'weak' passwords.</p>
<p>To help prevent infection, and
consequent re-infection, we recommend making sure that your organization uses <a href="http://www.microsoft.com/en-au/security/online-privacy/passwords-create.aspx" target="_blank">strong
passwords</a> for system and user accounts, and verifying that you do not use
passwords like those being used by the malware in order to spread.
<strong>Changing your password will significantly decrease your chance of
re-infection.</strong></p>
<p>To thwart this and similar threats, it
helps to adhere to best password practices, defined and enforced by appropriate
policies. Good polices include, but are not limited to:</p>
<ul><li>Ensuring there are rules around password complexity, so that passwords meet
basic strong password requirements, such as minimum length (long passwords are
usually stronger than short ones)
</li><li>Ensuring passwords are not used for extended periods of time; consider
setting an expiry every 30 to 90 days. You might also consider enforcing
password history, so that users can not re-use the same password within a
pre-defined time frame
</li><li>Ensuring passwords contain a combination of:
<ul><li>Uppercase letters
</li><li>Lowercase letters
</li><li>Numerals, and
</li><li>Symbols </li></ul></li></ul>
<p>For general information about password
best practices, please see the following articles:</p>
<ul><li><span class="notranslate"><a href="http://technet.microsoft.com/en-us/library/cc784090%28WS.10%29.aspx" target="_blank">http://technet.microsoft.com/en-us/library/cc784090(WS.10).aspx</a>
</span>
</li><li><span class="notranslate"><a href="http://technet.microsoft.com/en-us/library/cc756109%28WS.10%29.aspx" target="_blank">http://technet.microsoft.com/en-us/library/cc756109(WS.10).aspx</a>
</span></li></ul>
<p>To help prevent re-infection after
cleaning, you may also want to consider changing the password for every account
on the network, for every user in your environment.</p></div></div></div>
<div class="contentText pagetaglink"><br><a href="#top" target="_blank">Top</a></div>

<br><a name="symptoms_link">&nbsp;</a>
Symptoms
<div class="detailSectionPadding contentText">
<div>
System changes
<p>The following system changes may
indicate the presence of this malware:</p>
<ul><li>The presence of the following files:<br><br><span class="notranslate"><em>%Windows%\clb.dll</em></span><br><span class="notranslate"><em>%Windows%\clb.dll.bak</em></span><br><span class="notranslate"><em>%windows%\temp\ntshrui.dll</em></span><br><span class="notranslate"><em>&lt;system
folder&gt;\sens32.dll</em></span><br><em><span class="notranslate">c:\windows\offline web pages\cache.txt</span><br></em>
</li><li>The presence of the following registry modifications:<br><br>
<p>In subkey: <span class="notranslate"><em>HKLM\SYSTEM\Wpa</em></span><br>Sets value: <span class="notranslate"><em>it</em></span><br>Sets value: <span class="notranslate"><em>id</em></span><br>Sets value: <span class="notranslate"><em>sn</em></span><br>Sets value:<em><span class="notranslate"> ie</span></em><br>Sets value: <span class="notranslate"><em>md</em></span><br>Sets value: <span class="notranslate"><em>sr</em></span></p>
<p>In subkey: <span class="notranslate"><em>HKLM\SYSTEM\CurrentControlSet\Control\Windows</em></span><br>Sets
value: "<span class="notranslate"><em>NoPopUpsOnBoot</em></span>"<br>With data: "<span class="notranslate"><em>1</em></span>"</p>
<p>In subkey: <span class="notranslate"><em>HKLM\SYSTEM\CurrentControlSet\Services\6to4\Parameters</em></span><br>Sets
value: "<span class="notranslate"><em>ServiceDll</em></span>"<br>With data: "%<em><span class="notranslate">windir%\temp\ntshrui.dll</span></em>"</p>
<p>In subkey: <span class="notranslate"><em>HKLM\SYSTEM\CurrentControlSet\Services\6to4</em></span><br>Sets
value: "<span class="notranslate"><em>Description</em></span>"<br>With data: "<span class="notranslate"><em>0</em></span>"</p>
<p>In subkey: <em><span class="notranslate">HKLM\SYSTEM\CurrentControlSet\Services\Sens</span></em><br>Sets
value: "<span class="notranslate"><em>DependOnService</em></span>"<br>With data: "<span class="notranslate"><em>0</em></span>"</p>
<p>In subkey: <em><span class="notranslate">HKLM\SYSTEM\CurrentControlSet\Services\Sens\Parameters</span></em><br>Sets
value: "<span class="notranslate"><em>ServiceDll</em></span>"<br>With data: "&lt;<span class="notranslate"><em>system
folder&gt;\sens32.dll</em></span>"</p></li></ul></div></div>
<div class="contentText pagetaglink"><br><a href="#top" target="_blank">Top</a></div>

<br><a name="techdetails_link">&nbsp;</a>
Technical Information (Analysis)
<div class="detailSectionPadding contentText">
<div>
<p><span class="notranslate"><em>Worm:Win32/Morto.A</em> </span>is a worm that allows unauthorized
access to an affected computer. It spreads by trying to compromise administrator
passwords for<span class="notranslate"> Remote Desktop</span> connections on a
network.</p>
InstallationThe malware consists
of several components, including an executable dropper component (the
installer), and a <span class="notranslate">DLL</span> component which performs
the payload. <br><br>When the dropper is executed, the <span class="notranslate">DLL</span> component is installed to the <span class="notranslate">Windows</span> directory as <span class="notranslate"><em>clb.dll</em></span><em>, </em>as well as<em></em><span class="notranslate"><em>c:\windows\offline web pages\cache.txt</em></span>. If updated by
the malware, backups are created as <span class="notranslate"><em>clb.dll.bak</em></span>.The executable component also writes
encrypted code to the registry key <span class="notranslate"><em>HKLM\SYSTEM\WPA\md</em></span> and exits.<br><br>The name <span class="notranslate"><em>clb.dll</em></span> is chosen because this
is the name of a real <span class="notranslate">DLL</span> (located in the <span class="notranslate">System</span> directory), which is used by <span class="notranslate">regedit</span>. To load this malware <span class="notranslate">DLL</span>, a regedit process is spawned by the malware. Once
regedit is executed, it loads the malicious <span class="notranslate"><em>clb.dll</em></span> preferentially over the real <span class="notranslate"><em>clb.dll</em></span> due to the way in which
<span class="notranslate">Windows</span> searches for files (i.e. the <span class="notranslate">Windows</span> directory is searched before the <span class="notranslate">System</span> directory). This <span class="notranslate">DLL
</span>has encrypted configuration information appended to it in order to
download and execute new components.
<p>The following files are also created by
the malware:</p>
<ul><li><span class="notranslate"><em>%windows%\temp\ntshrui.dll</em></span>
</li><li><span class="notranslate"><em>&lt;system
folder&gt;\sens32.dll</em></span>
</li><li><span class="notranslate"><em>c:\windows\offline web
pages\cache.txt</em> - detected as <span class="notranslate"><em>Worm:Win32/Morto.A</em></span></span></li></ul>
<p>The following registry modifications are
made to load the <span class="notranslate">DLLs</span> as services upon system
boot:</p>
<p>In subkey: <span class="notranslate"><em>HKLM\SYSTEM\CurrentControlSet\Services\6to4\Parameters</em></span><br>Sets
value: "<span class="notranslate"><em>ServiceDll</em></span>"<br>With data: <em><span class="notranslate">"%windir%\temp\ntshrui.dll</span></em>"</p>
<p>In subkey: <span class="notranslate"><em>HKLM\SYSTEM\CurrentControlSet\Services\6to4</em></span><br>Sets
value: "<span class="notranslate"><em>Description</em></span>"<br>With data: "<span class="notranslate"><em>0</em></span>"</p>
<p>In subkey: <em><span class="notranslate">HKLM\SYSTEM\CurrentControlSet\Services\Sens</span></em><br>Sets
value: "<span class="notranslate"><em>DependOnService</em></span>"<br>With data: "<em><span class="notranslate">0</span></em>"</p>
<p>In subkey: <span class="notranslate"><em>HKLM\SYSTEM\CurrentControlSet\Services\Sens\Parameters</em></span><br>Sets
value: "<span class="notranslate"><em>ServiceDll</em></span>"<br>With data: "&lt;<em><span class="notranslate">system
folder&gt;\sens32.dll</span></em>"</p>
<p>Initially, these files are clean and
benign <span class="notranslate">DLLs</span>. They are used to load <span class="notranslate"><em>clb.dll</em></span> in the same way as
<span class="notranslate">regedit</span>. They may be replaced later on with
malicious components which are downloaded to:</p>
<ul><li><span class="notranslate"><em>c:\windows\offline web
pages\cache.txt</em></span></li></ul>
<p>and replace <em><span class="notranslate">sens32.dll</span></em> via a value in the following registry
subkey:</p>
<ul><li><span class="notranslate"><em>HKLM\SYSTEM\CurrentControlSet\Control\Session
Manager\PendingFileRenameOperations</em></span></li></ul>
<p>Once loaded as a service inside <span class="notranslate">svchost.exe</span>, the encrypted code housed in <em><span class="notranslate">HKLM\SYSTEM\WPA</span></em> is then read
by <em><span class="notranslate">clb.dll</span></em>, loaded and
executed. This contains the worm functionality (see below for additional
detail).</p>
Spreads via…
<p><strong>Compromising <span class="notranslate">Remote Desktop</span> connections on a network: Port 3389
(<span class="notranslate">RDP</span>)</strong></p>
<p><span class="notranslate">Worm:Win32/Morto.gen!A</span> cycles through <span class="notranslate">IP</span> addresses on the affected computer's subnet and
attempts to connect to located systems using the following user names:</p>
<p><span class="notranslate"><em>1<br>actuser</em></span><br><span class="notranslate"><em>adm</em></span><br><span class="notranslate"><em>admin</em></span><br><span class="notranslate"><em>admin2</em></span><br><span class="notranslate"><em>administrator</em></span><br><span class="notranslate"><em>aspnet</em></span><br><span class="notranslate"><em>backup</em></span><br><span class="notranslate"><em>computer</em></span><br><span class="notranslate"><em>console</em></span><br><span class="notranslate"><em>david</em></span><br><span class="notranslate"><em>guest</em></span><br><span class="notranslate"><em>john</em></span><br><span class="notranslate"><em>owner</em></span><br><span class="notranslate"><em>root</em></span><br><span class="notranslate"><em>server</em></span><br><span class="notranslate"><em>sql</em></span><br><span class="notranslate"><em>support</em></span><br><span class="notranslate"><em>support_388945a0</em></span><br><span class="notranslate"><em>sys</em></span><br><span class="notranslate"><em>test2</em></span><br><span class="notranslate"><em>test3</em></span><br><span class="notranslate"><em>user</em></span><br><span class="notranslate"><em>user1</em></span><br><span class="notranslate"><em>user5</em></span></p>
<p>with the following
passwords:<br><br><span class="notranslate"><em>*1234</em></span><br><span class="notranslate"><em>0</em></span><br><span class="notranslate"><em>111</em></span><br><span class="notranslate"><em>123</em></span><br><span class="notranslate"><em>369</em></span><br><span class="notranslate"><em>1111</em></span><br><span class="notranslate"><em>12345</em></span><br><span class="notranslate"><em>111111</em></span><br><span class="notranslate"><em>123123</em></span><br><span class="notranslate"><em>123321</em></span><br><span class="notranslate"><em>123456</em></span><br><span class="notranslate"><em>168168</em></span><br><span class="notranslate"><em>520520</em></span><br><span class="notranslate"><em>654321</em></span><br><span class="notranslate"><em>666666</em></span><br><span class="notranslate"><em>888888</em></span><br><span class="notranslate"><em>1234567</em></span><br><span class="notranslate"><em>12345678</em></span><br><span class="notranslate"><em>123456789</em></span><br><span class="notranslate"><em>1234567890</em></span><br><span class="notranslate"><em>!@#$%^</em></span><br><span class="notranslate"><em>%u%</em></span><br><span class="notranslate"><em>%u%12</em></span><br><span class="notranslate"><em>1234qwer</em></span><br><span class="notranslate"><em>1q2w3e</em></span><br><span class="notranslate"><em>1qaz2wsx</em></span><br><span class="notranslate"><em>aaa</em></span><br><span class="notranslate"><em>abc123</em></span><br><span class="notranslate"><em>abcd1234</em></span><br><span class="notranslate"><em>admin</em></span><br><span class="notranslate"><em>admin123</em></span><br><span class="notranslate"><em>letmein</em></span><br><span class="notranslate"><em>pass</em></span><br><span class="notranslate"><em>password</em></span><br><span class="notranslate"><em>server</em></span><br><span class="notranslate"><em>test</em></span><br><span class="notranslate"><em>user</em></span></p>
<p>If the worm is successful at logging
into a system, it then copies <span class="notranslate"><em>clb.dll</em></span> to <span class="notranslate"><em>a.dll</em></span> on the computer and creates a file <span class="notranslate"><em>.reg</em></span> in a directory which is
temporarily mapped to <span class="notranslate">A:</span> (both of which are
remotely executed on the remote system by way of the <em><span class="notranslate">\\tsclient\a</span></em> share).<br><br>The file r.reg,
contains the following:</p>
<p><span class="notranslate"><em></em></span><br><span class="notranslate"><em>"ConsentPromptBehaviorAdmin"=dword:0</em></span><br><span class="notranslate"><em>"EnableLUA"=dword:0</em></span><br><br><span class="notranslate"><em>[HKEY_CURRENT_USER\Software\Microsoft\Windows
NT\CurrentVersion\AppCompatFlags\Layers]</em></span><br><span class="notranslate"><em>"c:\\windows\\system32\\rundll32.exe"="RUNASADMIN"</em></span><br><span class="notranslate"><em>"d:\\windows\\system32\\rundll32.exe"="RUNASADMIN"</em></span><br><span class="notranslate"><em>"e:\\windows\\system32\\rundll32.exe"="RUNASADMIN"</em></span><br><span class="notranslate"><em>"f:\\windows\\system32\\rundll32.exe"="RUNASADMIN"</em></span><br><span class="notranslate"><em>"g:\\windows\\system32\\rundll32.exe"="RUNASADMIN"</em></span><br><span class="notranslate"><em>"h:\\windows\\system32\\rundll32.exe"="RUNASADMIN"</em></span><br><span class="notranslate"><em>"i:\\windows\\system32\\rundll32.exe"="RUNASADMIN"</em></span><br><br><span class="notranslate"><em>"c:\\windows\\SysWOW64\\rundll32.exe"="RUNASADMIN"</em></span><br><span class="notranslate"><em>"d:\\windows\\SysWOW64\\rundll32.exe"="RUNASADMIN"</em></span><br><span class="notranslate"><em>"e:\\windows\\SysWOW64\\rundll32.exe"="RUNASADMIN"</em></span><br><span class="notranslate"><em>"f:\\windows\\SysWOW64\\rundll32.exe"="RUNASADMIN"</em></span><br><span class="notranslate"><em>"g:\\windows\\SysWOW64\\rundll32.exe"="RUNASADMIN"</em></span><br><span class="notranslate"><em>"h:\\windows\\SysWOW64\\rundll32.exe"="RUNASADMIN"</em></span><br><span class="notranslate"><em>"i:\\windows\\SysWOW64\\rundll32.exe"="RUNASADMIN"</em></span><br><br><span class="notranslate"><em>"c:\\winnt\\system32\\rundll32.exe"="RUNASADMIN"</em></span><br><span class="notranslate"><em>"c:\\win2008\\system32\\rundll32.exe"="RUNASADMIN"</em></span><br><span class="notranslate"><em>"c:\\win2k8\\system32\\rundll32.exe"="RUNASADMIN"</em></span><br><span class="notranslate"><em>"c:\\win7\\system32\\rundll32.exe"="RUNASADMIN"</em></span><br><span class="notranslate"><em>"c:\\windows7\\system32\\rundll32.exe"="RUNASADMIN"</em></span><br><br>The
intention of importing this reg file appears to be to modify the registry to
ensure that <span class="notranslate">rundll32.exe</span> runs with <span class="notranslate">Administrator</span> privileges, and thus that the malware's
<span class="notranslate">DLL</span>, <em><span class="notranslate">clb.dll</span></em> does too.</p>
Payload
<p><strong>Contacts remote
host</strong></p>
<p><span class="notranslate"><em>Worm:Win32/Morto.A</em></span> connects to the following hosts in
order to download additional information and update its components:</p>
<p><span class="notranslate"><em>210.3.38.82</em></span><br><span class="notranslate"><em>jifr.info</em></span><br><span class="notranslate"><em>jifr.co.cc</em></span><br><span class="notranslate"><em>jifr.co.be<br>jifr.net</em></span><br><span class="notranslate"><em>qfsl.net</em></span><br><span class="notranslate"><em>qfsl.co.cc</em></span><br><span class="notranslate"><em>qfsl.co.be</em></span><br><br>Newly downloaded components are
downloaded to a filename that uses the following format:</p>
<p><span class="notranslate"><em>~MTMP&lt;4 digits 0-f&gt;.exe</em></span><br><br><strong>Performs
Denial of Service attacks</strong></p>
<p><span class="notranslate">Morto</span> may
be ordered to perform <a href="http://www.microsoft.com/security/portal/Threat/Encyclopedia/Glossary.aspx#dos" target="_blank">Denial
of Service </a>attacks against attacker-specified targets.
<br><br><strong>Terminates processes</strong></p>
<p><span class="notranslate">Morto.A</span>
terminates processes that contain the following strings. The selected strings
indicate that the worm is attempting to stop processes related to popular
security-related applications.<br><br><span class="notranslate"><em>ACAAS</em></span><br><span class="notranslate"><em>360rp</em></span><br><span class="notranslate"><em>a2service</em></span><br><span class="notranslate"><em>ArcaConfSV</em></span><br><span class="notranslate"><em>AvastSvc</em></span><br><span class="notranslate"><em>avguard</em></span><br><span class="notranslate"><em>avgwdsvc</em></span><br><span class="notranslate"><em>avp</em></span><br><span class="notranslate"><em>avpmapp</em></span><br><span class="notranslate"><em>ccSvcHst</em></span><br><span class="notranslate"><em>cmdagent</em></span><br><span class="notranslate"><em>coreServiceShell</em></span><br><span class="notranslate"><em>ekrn</em></span><br><span class="notranslate"><em>FortiScand</em></span><br><span class="notranslate"><em>FPAVServer</em></span><br><span class="notranslate"><em>freshclam</em></span><br><span class="notranslate"><em>fsdfwd</em></span><br><span class="notranslate"><em>GDFwSvc</em></span><br><span class="notranslate"><em>K7RTScan</em></span><br><span class="notranslate"><em>knsdave</em></span><br><span class="notranslate"><em>KVSrvXP</em></span><br><span class="notranslate"><em>kxescore</em></span><br><span class="notranslate"><em>mcshield</em></span><br><span class="notranslate"><em>MPSvc</em></span><br><span class="notranslate"><em>MsMpEng</em></span><br><span class="notranslate"><em>NSESVC.EXE</em></span><br><span class="notranslate"><em>PavFnSvr</em></span><br><span class="notranslate"><em>RavMonD</em></span><br><span class="notranslate"><em>SavService</em></span><br><span class="notranslate"><em>scanwscs</em></span><br><span class="notranslate"><em>SpySweeper</em></span><br><span class="notranslate"><em>Vba32Ldr</em></span><br><span class="notranslate"><em>vsserv</em></span><br><span class="notranslate"><em>zhudongfangyu</em></span></p>
<p><strong>Clears system event
log</strong></p>
<p>Worm:Win32/Morto deletes system event
logs categorized in the following:</p>
<ul><li><em><span class="notranslate">Application</span></em>
</li><li><em></em><em><span class="notranslate">Security</span></em>
</li><li><em></em><em><span class="notranslate">System</span></em></li></ul>
Additional information
<p><span class="notranslate">Morto</span>
stores configuration data in the subkey <em><span class="notranslate">HKLM\SYSTEM\Wpa</span></em> using the following registry
values:</p>
<p><span class="notranslate"><em>HKLM\SYSTEM\Wpa\it</em></span><br><span class="notranslate"><em>HKLM\SYSTEM\Wpa\id</em></span><br><span class="notranslate"><em>HKLM\SYSTEM\Wpa\sn</em></span><br><span class="notranslate"><em>HKLM\SYSTEM\Wpa\ie</em></span><br><span class="notranslate"><em>HKLM\SYSTEM\Wpa\md</em></span><br><span class="notranslate"><em>HKLM\SYSTEM\Wpa\sr</em></span></p>
<p>It also makes the following registry
modification:</p>
<p>In subkey: <span class="notranslate"><em>HKLM\SYSTEM\CurrentControlSet\Control\Windows</em></span><br>Sets
value: "<span class="notranslate"><em>NoPopUpsOnBoot</em></span>"<br>With data: "<span class="notranslate"><em>1</em></span>"</p>
<p><br><em>Analysis by <span class="notranslate">Matt McCormack</span></em></p></div></div>
<div class="contentText pagetaglink"><br><a href="#top" target="_blank">Top</a></div>

<br><a name="prevention_link">&nbsp;</a>
Prevention
<div class="detailSectionPadding contentText">
<div>
Follow these general security tips to
better protect your system:
<ul style="margin-top: 0px; margin-bottom: 0px;" type="disc"><li>Enable a firewall on your computer.
</li><li>Get the latest computer updates.
</li><li>Limit user privileges on the computer.
</li><li>Run an up-to-date scanning and removal tool.
</li><li>Use caution with attachments and file transfers.
</li><li>Use caution when clicking on links to webpages.
</li><li>Avoid downloading pirated software.
</li><li>Protect yourself against social engineering attacks.
</li><li>Use strong passwords. </li></ul>
Enable a firewall on your computer
<p>Use a third-party firewall product or
turn on the <span class="notranslate">Microsoft Windows Internet Connection
Firewall</span>.</p>
<ul style="margin-top: 0px; margin-bottom: 0px;" type="disc"><li><span class="notranslate"><a href="http://windows.microsoft.com/en-US/windows7/Turn-Windows-Firewall-on-or-off" target="_blank">How
to turn on the Windows Firewall in Windows 7</a> </span>
</li><li><span class="notranslate"><a href="http://windows.microsoft.com/en-US/windows-vista/Turn-Windows-Firewall-on-or-off" target="_blank">How
to turn on the Windows Firewall in Windows Vista</a> </span>
</li><li><span class="notranslate"><a href="http://support.microsoft.com/kb/283673" target="_blank">How
to turn on the Windows firewall in Windows XP</a> </span></li></ul>
Get the latest computer updates
<p>Updates help protect your computer from
viruses, worms, and other threats as they are discovered. It is important to
install updates for all the software that is installed in your computer. These
are usually available from vendor websites.Instructions on how to download the
latest versions of some common software is available from the following:</p>
<ul><li><span class="notranslate"><a href="http://www.microsoft.com/security/portal/Shared/SWUpdates.aspx" target="_blank">Microsoft
Malware Protection Center - Updating Software</a> </span></li></ul>
<p>You can use the Automatic Updates
feature in <span class="notranslate">Windows</span> to automatically download
future <span class="notranslate">Microsoft</span> security updates while your
computer is on and connected to the Internet.</p>
<ul style="margin-top: 0px; margin-bottom: 0px;" type="disc"><li><span class="notranslate"><a href="http://windows.microsoft.com/en-us/windows7/Turn-automatic-updating-on-or-off" target="_blank">How
to turn on Automatic Updates in Windows 7</a> </span>
</li><li><span class="notranslate"><a href="http://windows.microsoft.com/en-us/windows-vista/Turn-automatic-updating-on-or-off" target="_blank">How
to turn on Automatic Updates in Windows Vista</a> </span>
</li><li><span class="notranslate"><a href="http://www.microsoft.com/windows/downloads/windowsupdate/learn/windowsxp.mspx" target="_blank">How
to turn on Automatic Updates in Windows XP</a> </span></li></ul>
Limit user privileges on the
computer
<p>Starting with <span class="notranslate">Windows Vista</span> and <span class="notranslate">Windows
7</span>, <span class="notranslate">Microsoft</span> introduced <span class="notranslate">User Account Control (UAC)</span>, which, when enabled,
allowed users to run with least user privileges. This scenario limits the
possibility of attacks by malware and other threats that require administrative
privileges to run.</p>
<p>You can configure <span class="notranslate">UAC</span> in your computer to meet your preferences:</p>
<ul style="margin-top: 0px; margin-bottom: 0px;" type="disc"><li><span class="notranslate"><a href="http://www.microsoft.com/windows/windows-7/features/user-account-control.aspx" target="_blank">User
Account Control in Windows 7</a> </span>
</li><li><span class="notranslate"><a href="http://www.microsoft.com/windows/windows-vista/features/user-account-control.aspx" target="_blank">User
Account Control in Windows Vista</a> </span>
</li><li><span class="notranslate"><a href="http://technet.microsoft.com/en-us/library/bb456992.aspx" target="_blank">Applying the
Principle of Least Privilege in Windows XP</a> </span>
</li><li><span class="notranslate"><a href="http://msdn.microsoft.com/en-us/library/aa511445.aspx" target="_blank">More on User
Account Control</a> </span></li></ul>
Run an up-to-date scanning and removal
tool
<p>Most scanning and removal software can
detect and prevent the installation of known malicious software and potentially
unwanted software such as adware or spyware. You should frequently run a
scanning and removal tool that is updated with the latest signature files. For
more information, see <span class="notranslate"><a href="http://www.microsoft.com/protect/computer/viruses/vista.mspx" target="_blank">http://www.microsoft.com/protect/computer/viruses/vista.mspx</a></span>.</p>
Use caution with attachments and file
transfers
<p>Exercise caution with e-mail and
attachments received from unknown sources, or received unexpectedly from known
sources. Use extreme caution when accepting file transfers from known or unknown
sources.</p>
Use caution when clicking on links to
webpages
<p>Exercise caution with links to webpages
that you receive from unknown sources, especially if the links are to a webpage
that you are not familiar with or are suspicious of. Malicious software may be
installed in your system simply by visiting a webpage with harmful content.</p>
Avoid downloading pirated software
<p>Threats may also be bundled with
software and files that are available for download on various torrent sites.
Downloading "<span class="notranslate">cracked</span>" or "<span class="notranslate">pirated</span>" software from these sites carries not only the
risk of being infected with malware, but is also illegal. For more information,
please see our article <span class="notranslate">'<a href="http://www.microsoft.com/protect/promotions/us/wga_idc_us.mspx" target="_blank">The risks
of obtaining and using pirated software</a>'</span>.</p>
Protect yourself from <span class="notranslate">social engineering</span> attacks
<p>While attackers may attempt to exploit
vulnerabilities in hardware or software in order to compromise a system, they
also attempt to exploit vulnerabilities in human behavior in order to do the
same. When an attacker attempts to take advantage of human behavior in order to
persuade the affected user to perform an action of the attacker's choice, it is
known as '<span class="notranslate">social engineering</span>'. Essentially,
social engineering is an attack against the human interface of the targeted
system. For more information, please see our article '<span class="notranslate"><a href="http://www.microsoft.com/protect/yourself/phishing/engineering.mspx" target="_blank">What
is social engineering?</a></span>'.</p>
Use strong passwords
<p>Attackers may try to gain access to your
<span class="notranslate">Windows</span> account by guessing your password. It is
therefore important that you use a strong password – one that cannot be easily
guessed by an attacker. A strong password is one that has at least eight
characters, and combines letters, numbers, and symbols. For more information,
see <span class="notranslate"><a href="http://www.microsoft.com/protect/yourself/password/create.mspx" target="_blank">http://www.microsoft.com/protect/yourself/password/create.mspx</a></span>.</p></div></div>
<div class="contentText pagetaglink"><br><a href="#top" target="_blank">Top</a></div>

<br><a name="recovery_link">&nbsp;</a>
Recovery
<div class="detailSectionPadding contentText">
<div>
<p align="left">To detect and remove this
threat and other malicious software that may be installed on your computer, run
a full-system scan with an appropriate, up-to-date, security solution. The
following <span class="notranslate">Microsoft</span> products detect and remove
this threat:</p>
<ul style="margin-top: 0px; margin-bottom: 0px;"><li><span class="notranslate"><a href="http://www.microsoft.com/security_essentials/" target="_blank">Microsoft Security
Essentials</a> </span>
</li><li><span class="notranslate"><a href="http://www.microsoft.com/security/scanner/" target="_blank">Microsoft Safety Scanner</a>
</span></li></ul>
<p><strong>Note:</strong> Users affected by
this worm may be prompted to reboot their computers as part of the cleaning
process, and then prompted to run a full scan after rebooting.</p>
<p>For more information on antivirus
software, see <span class="notranslate"><a href="http://www.microsoft.com/windows/antivirus-partners/" target="_blank">http://www.microsoft.com/windows/antivirus-partners/</a></span>.</p>
<div align="left">
Additional information for Enterprise
users
<p>In the wild, we have observed this
threat infecting computers by targeting accounts that have 'weak' passwords.</p>
<p>To help prevent infection, and
consequent re-infection, we recommend making sure that your organization uses <a href="http://www.microsoft.com/en-au/security/online-privacy/passwords-create.aspx" target="_blank">strong
passwords</a> for system and user accounts, and verifying that you do not use
passwords like those being used by the malware in order to spread.
<strong>Changing your password will significantly decrease your chance of
re-infection.</strong></p>
<p>To thwart this and similar threats, it
helps to adhere to best password practices, defined and enforced by appropriate
policies. Good polices include, but are not limited to:</p>
<ul><li>Ensuring there are rules around password complexity, so that passwords meet
basic strong password requirements, such as minimum length (long passwords are
usually stronger than short ones)
</li><li>Ensuring passwords are not used for extended periods of time; consider
setting an expiry every 30 to 90 days. You might also consider enforcing
password history, so that users can not re-use the same password within a
pre-defined time frame
</li><li>Ensuring passwords contain a combination of:
<ul><li>Uppercase letters
</li><li>Lowercase letters
</li><li>Numerals, and
</li><li>Symbols </li></ul></li></ul>
<p>For general information about password
best practices, please see the following articles:</p>
<ul><li><span class="notranslate"><a href="http://technet.microsoft.com/en-us/library/cc784090%28WS.10%29.aspx" target="_blank">http://technet.microsoft.com/en-us/library/cc784090(WS.10).aspx</a>
</span>
</li><li><span class="notranslate"><a href="http://technet.microsoft.com/en-us/library/cc756109%28WS.10%29.aspx" target="_blank">http://technet.microsoft.com/en-us/library/cc756109(WS.10).aspx</a>
</span></li></ul>
<p>To help prevent re-infection after
cleaning, you may also want to consider changing the password for every account
on the network, for every user in your environment.</p></div></div></div>
<div class="contentText pagetaglink"><br><a href="#top" target="_blank">Top</a></div></div><br>
页: [1]
查看完整版本: Worm:Win32/Morto.A