'Here You Have' Email
We are aware of the "Here you have" malware that is spreading via email. As we find out more, we'll update this diary.
Update: 2010-09-09 21:28 UTC (JAC) There are several good writeups on the behavior of this malware see some of the references below. The spam contains a link to a document, the link looks like it is to a PDF, but is, in fact, to a .SCR file and served from a different domain from what the link appears to point to. The original file seems to have been removed, so further infections from the initial variant should not occur, but new variants may well follow. The .SCR when executed downloads a number of additional tools, one of which appears to attempt to check in with a potential controller. The name associated the controller has been sink-holed. The malware attempts to deactivate most anti-virus packages and uses the infected user's Outlook to send out its spam.
References:
http://www.virustotal.com/file-scan/report.html?id=fedb7b404754cf85737fb7e50f33324b84eb4c0b98024c7d3302039a901b04b7-1284058335#
http://www.threatexpert.com/report.aspx?md5=2bde56d8fb2df4438192fb46cd0cc9c9
http://www.threatexpert.com/report.aspx?md5=bd9208edf44d0ee32b974a2d9da7bc61
http://www.avertlabs.com/research/blog/index.php/2010/09/09/widespread-reporting-of-here-you-have-virus/
---------------
Marcus H. Sachs
Director, SANS Internet Storm Center
Jim Clausing
FOR408 coming to central OH in Sept, see http://www.sans.org/mentor/details.php?nid=22353
Comments
The audit firm use McAfee and McAfee added detection as of today. The audit firm said it disabled McAfee. McAfee's writeup for this non-PDF infection is at http://home.mcafee.com/VirusInfo/VirusProfile.aspx?key=275352#none
It appears to require local administrator rights to do its thing since it installs into %WINDIR%. "Least privilege" stops another one even if the AV vendors can't.
FWIW, we tested it against the six anti-malware systems we use. Bitdefender and Kaspersky on the proxy server both stopped the download if the link was clicked.
Every engine we have enabled on Forefront for Exchange let the email go right through because it was just a link. The Sophos email gateway did the same because it was just a link. These systems update every hour.
The two engines on the proxy server marked it as:
Bitdefender: Gen:Trojan.Heur.rm0@fnBStPoi
Kaspersky: Suspicious:HEUR:Trojan.Win32.Generic
The actual link in the email is below. It says it's a PDF link but it's a .SCR link.
http: // members . multimania . co . uk / yahoophoto / PDF_Document21_025542010_pdf . scr
The text was:
--------------------------------------------------------------------------
Subject: Here you have
Hello:
This is The Document I told you about,you can find it Here. http://www . sharedocuments.com/ library/ PDF_Document21.025542010.pdf
Please check it and reply as soon as possible.
JJ
Sep 9th 2010
1 decade ago
***************************************************
McAfee Labs has released a signed Extra-DAT that extends McAfee’s existing detection by adding “repairing of files” damaged by the W32/VBMania@MM worm.
Additionally, Beta DATs are currently being built to include Repair for W32/VBMania@MM (ETA 3:30 PM, US/PDT) (next Beta release). A stand-alone removal and repair tool, Stinger, will be made available to the public at approximately the same time.
For more information on this threat, go to the Virus Information Library at http://vil.nai.com/vil/content/v_275435.htm.
====================================================
ORIGINAL EMAIL (Thursday, September 09, 2010 3:33:20 PM)
McAfee has received confirmation that some customers have received large volumes of spam containing a link to malware, a mass-mailing worm identified as VBMania. The symptom reported thus far is that the spam volume is overwhelming the email infrastructure.
Static URLs in the email link to a .SCR file. McAfee recommends that customers filter for the URL on gateway and email servers, and block the creation of .SCR files on endpoint systems.
McAfee Trusted Source is actively protecting against this threat. Customers with McAfee Trusted Source Email Reputation will have the emails blocked. Customers with McAfee Trusted Source Web Reputation will have the URL blocked from click-through. McAfee Artemis provides protection as well.
For further information, go to mysupport.mcafee.com and search for KB article KB69857. McAfee also will provide further information as gathered.
________________________________________
AI
Sep 9th 2010
1 decade ago
also other vendor products like 'Websense' have this site on their Malicious Sites list.
thanks for the headsup.
spanionlust
Sep 9th 2010
1 decade ago
I just found that this hit the news. Some big names including NASA and Homeland Security appear to have been hit.
http://www.foxnews.com/scitech/2010/09/09/beware-link-e-mail-virus-plays-havoc-internet/
SpamKiller2010
Sep 10th 2010
1 decade ago
Symantec released some updated defs this afternoon (09/09/2010 Pacific). The FTP site above lists "symrapidreleasedefsi32.exe" among others.
symrapidreleasedefsi32.exe is ~90MB but it did catch the 284k PDF dot scr file mentioned above.
tm
Sep 10th 2010
1 decade ago
Symantec released some updated defs this afternoon (09/09/2010 Pacific). The FTP site above lists "symrapidreleasedefsi32.exe" among others.
symrapidreleasedefsi32.exe is ~90MB but it did catch the 284k PDF dot scr file mentioned above.
tm
Sep 10th 2010
1 decade ago
sb
Sep 10th 2010
1 decade ago