Hex dump of Gibe-F worm.

Hostile Data — The Stration.JH Worm

The header as received

Read the Received lines the correct order, from bottom to top.

  1. IP address 192.168.2.72, calling itself lqy, sent it to 192.168.2.20.
    That is part of a private IP address block, so it started behind an address-translating firewall. This could be:
    • Someone at home with a LinkSys or D-Link router or similar.
    • Someone sending spam from work.
    • Someone abusing the wireless router at a coffee shop, hotel, or similar.
    • Someone abusing the wireless router at a company, parked out in their parking lot or on the street.
  2. IP address 217.227.224.130, calling itself DAVOR2 although that IP address resolves to pd9e3d082.dip.t-dialin.net, sent it to my ISP.
    That IP address is assigned to Deutsche Telekom.
  3. A couple of hops within my ISP.
From sec@fcradio.net Sat Oct 21 12:27:45 2006
Return-path: <sec@fcradio.net>
Received: from mta0.manage.insightcom.com ([172.31.249.150])
   by msb1.manage.insightcom.com
   (Sun Java System Messaging Server 6.2-6.01 (built Apr  3 2006))
   with ESMTP id <0J7I00MYQSZU8TD0@msb1.manage.insightcom.com> for
   bob.cromwe11@insightbb.com; Sun, 22 Oct 2006 00:40:42 -0400 (EDT)
Received: from asav05.insightbb.com ([172.31.249.123])
   by mta0.manage.insightcom.com
   (Sun Java System Messaging Server 6.2-6.01 (built Apr  3 2006))
   with ESMTP id <0J7I00MALSZTUP81@mta0.manage.insightcom.com> for
   bob.cromwe11@insightbb.com (ORCPT bob.cromwe11@insightbb.com); Sun,
   22 Oct 2006 00:40:42 -0400 (EDT)
Received: from pd9e3e082.dip.t-dialin.net (HELO DAVOR2) ([217.227.224.130])
   by asav05.insightbb.com with SMTP; Sat, 21 Oct 2006 12:38:38 -0400
Received: (qmail 2638 invoked by uid 0); Sat, 21 Oct 2006 18:37:45 -0000)
Received: from unknown (HELO lqy) (192.168.2.72) by 192.168.2.20 with SMTP;
   Sat, 21 Oct 2006 18:37:45 +0000
Date: Sat, 21 Oct 2006 18:27:45 +0200
From: sec@fcradio.net
Subject: Mail server report.
To: bob.cromwe11@insightbb.com
Message-id: <5aoen5$blo75n@asav05.manage.insightbb.com>
MIME-version: 1.0
Content-type: multipart/mixed;
  boundary=-----------C1A6D3F3CBA6C1D4
Original-recipient: rfc822;bob.cromwe11@insightbb.com

The clumsy message content

I have a ham radio license and am interested in radio in general, and so I am on a number of radio-related mailing lists. One of them is a weekly report of geomagnetic activity from the US NOAA Space Environment Center. So, the forged sender address sec@fcradio.net caught my eye. Was this worm sent to the addresses on an illicitly obtained copy of this mailing list? Maybe...

The message text was not written by anyone native-fluent in English. Among other things, see the botched use of the definite article "the", which is missing in some places it appears but extraneously appears in inappropriate places.

Mail server report.

Our firewall determined the e-mails containing worm copies are being sent from your computer.

Nowadays it happens from many computers, because this is a new virus type (Network Worms).

Using the new bug in the Windows, these viruses infect the computer unnoticeably. After the penetrating into the computer the virus harvests all the e-mail addresses and sends the copies of itself to these e-mail addresses

Please install updates for worm elimination and your computer restoring.

Best regards,
Customers support service .

The attachment

This was followed by an attached zip file named Update-KB9453-x86.zip, which contained a file named Update-KB9453-x86.exe.

The executable contents

GNU utilities such as file, strings, and hexdump are useful for getting some limited idea about what this malicious code might do. The file utility reports that this executable is:
MS-DOS executable (EXE), OS/2 or Windows
The following is partial output for running
  hexdump -C Update-KB9453-x86.exe
under Linux or BSD. The interesting stuff appears, among many other places:

This appears to be precisely what it warns about — a worm that sends itself (plus, probably, loads of spam) on to addresses harvested from the target host. I don't see the usual calls to modify the target system's registry, so this worm might disappear at a reboot.

00000000  4d 5a 90 00 03 00 00 00  04 00 00 00 ff ff 00 00  |MZ..............|
00000010  b8 00 00 00 00 00 00 00  40 00 00 00 00 00 00 00  |........@.......|
00000020  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00000030  00 00 00 00 00 00 00 00  00 00 00 00 c8 00 00 00  |................|
00000040  0e 1f ba 0e 00 b4 09 cd  21 b8 01 4c cd 21 54 68  |........!..L.!Th|
00000050  69 73 20 70 72 6f 67 72  61 6d 20 63 61 6e 6e 6f  |is program canno|
00000060  74 20 62 65 20 72 75 6e  20 69 6e 20 44 4f 53 20  |t be run in DOS |
00000070  6d 6f 64 65 2e 0d 0d 0a  24 00 00 00 00 00 00 00  |mode....$.......|
00000080  07 69 c2 dc 43 08 ac 8f  43 08 ac 8f 43 08 ac 8f  |.i..C...C...C...|
00000090  c0 00 f1 8f 40 08 ac 8f  43 08 ad 8f 41 08 ac 8f  |....@...C...A...|
000000a0  46 04 cc 8f 40 08 ac 8f  af 03 f2 8f 42 08 ac 8f  |F...@.......B...|
000000b0  46 04 f6 8f 42 08 ac 8f  52 69 63 68 43 08 ac 8f  |F...B...RichC...|
000000c0  00 00 00 00 00 00 00 00  50 45 00 00 4c 01 03 00  |........PE..L...|
000000d0  45 dd 38 45 00 00 00 00  00 00 00 00 e0 00 0f 01  |E.8E............|
000000e0  0b 01 07 0a 00 20 00 00  00 10 00 00 00 50 00 00  |..... .......P..|
[....]
00001540  34 5a 02 22 58 65 2f b2  d0 ae 59 66 3d 03 4c 18  |4Z."Xe/...Yf=.L.|
00001550  14 5c ca 46 51 01 0d 04  48 a8 08 ff 83 1c 04 3c  |.\.FQ...H......<|
00001560  01 4c 6f 61 64 4c 69 62  72 cf fe ff f2 61 72 79  |.LoadLibr....ary|
00001570  41 47 65 74 50 72 6f 63  41 64 64 72 65 73 73 22  |AGetProcAddress"|
00001580  50 45 0f f2 6f 01 0e 01  03 00 45 dd 38 45 e0 00  |PE..o.....E.8E..|
00001590  0f f7 ec 0b f8 01 0b 01  07 0a 3b 0e 13 40 1a 04  |..........;..@..|
000015a0  b6 9c c5 5e 10 08 0d 0b  02 04 33 6c 49 37 0b 07  |...^......3lI7..|
000015b0  0c 60 1e 96 2c d9 ec 10  2b 07 06 03 84 9a 6f 39  |.`..,...+.....o9|
000015c0  8c 30 28 3a 50 09 44 03  59 17 08 64 0c 1e 2e d8  |.0(:P.D.Y..d....|
000015d0  17 6c f3 74 65 78 74 f0  20 90 eb 04 23 c1 36 bf  |.l.text. ...#.6.|
000015e0  5b 1a 60 2e 64 61 74 61  c8 02 fb f7 bb 85 7d 07  |[.`.data......}.|
000015f0  26 27 16 c0 2e 72 73 72  63 fe a6 a4 e9 be c3 50  |&'...rsrc......P|
00001600  27 0a 28 40 00 00 f7 fd  1b c0 30 0d 2b 09 02 00  |'.(@......0.+...|
[....]
00002160  00 00 01 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00002170  a0 89 00 00 8c 89 00 00  00 00 00 00 00 00 00 00  |................|
00002180  00 00 00 00 00 00 00 00  00 00 00 00 ac 89 00 00  |................|
00002190  ba 89 00 00 ca 89 00 00  da 89 00 00 00 00 00 00  |................|
000021a0  4b 45 52 4e 45 4c 33 32  2e 44 4c 4c 00 00 4c 6f  |KERNEL32.DLL..Lo|
000021b0  61 64 4c 69 62 72 61 72  79 41 00 00 47 65 74 50  |adLibraryA..GetP|
000021c0  72 6f 63 41 64 64 72 65  73 73 00 00 56 69 72 74  |rocAddress..Virt|
000021d0  75 61 6c 50 72 6f 74 65  63 74 00 00 45 78 69 74  |ualProtect..Exit|
000021e0  50 72 6f 63 65 73 73 00  00 00 00 00 00 00 00 00  |Process.........|
000021f0  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
00002200  ee ff ee ff                                       |....|
00002204