Short Name |
WORM:EMAIL:SOBIG-DL-REQUEST |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
WORM |
Keywords |
Sobig worm |
Release Date |
2003/07/23 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects outbound communication by the W32.Sobig.E worm, a three-stage proxy server Trojan. A host infected with the first stage can download subsequent stages of the worm. After initial infection, the 1st stage Trojan removes its registry entries, copies itself to the system folder, edits the registry to run the Trojan at startup, and contacts a hidden server at UDP/8998 to obtain the URL for the 2nd stage Trojan site. After download, the 2nd stage Trojan sends user data to the worm author and downloads the 3rd stage Trojan (a Wingate proxy server) from a URL listed in the 2nd stage .ini file. User data can include usernames and passwords for financial Web accounts (obtained using a keystroke logger) and Web browser cookies.
Once infected by it, the worm W32.Sobig.E allows for the leak of infomation and execution of arbitrary code.