Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

WORM:EMAIL:SOBIG-DL-REQUEST

Severity

High

Recommended

No

Recommended Action

Drop

Category

WORM

Keywords

Sobig worm

Release Date

2003/07/23

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

WORM: W32.Sobig.E Worm External Communication


This signature detects outbound communication by the W32.Sobig.E worm, a three-stage proxy server Trojan. A host infected with the first stage can download subsequent stages of the worm. After initial infection, the 1st stage Trojan removes its registry entries, copies itself to the system folder, edits the registry to run the Trojan at startup, and contacts a hidden server at UDP/8998 to obtain the URL for the 2nd stage Trojan site. After download, the 2nd stage Trojan sends user data to the worm author and downloads the 3rd stage Trojan (a Wingate proxy server) from a URL listed in the 2nd stage .ini file. User data can include usernames and passwords for financial Web accounts (obtained using a keystroke logger) and Web browser cookies.

Extended Description

Once infected by it, the worm W32.Sobig.E allows for the leak of infomation and execution of arbitrary code.

References

  • URL: http://www.lurhq.com/sobig-e.html
  • URL: http://vil.nai.com/vil/content/v_100429.htm
  • URL: http://securityresponse.symantec.com/avcenter/venc/data/w32.sobig.e@mm.html

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out