WORM: W32.Sobig.E Worm External Communication

This signature detects outbound communication by the W32.Sobig.E worm, a three-stage proxy server Trojan. A host infected with the first stage can download subsequent stages of the worm. After initial infection, the 1st stage Trojan removes its registry entries, copies itself to the system folder, edits the registry to run the Trojan at startup, and contacts a hidden server at UDP/8998 to obtain the URL for the 2nd stage Trojan site. After download, the 2nd stage Trojan sends user data to the worm author and downloads the 3rd stage Trojan (a Wingate proxy server) from a URL listed in the 2nd stage .ini file. User data can include usernames and passwords for financial Web accounts (obtained using a keystroke logger) and Web browser cookies.

Extended Description

Once infected by it, the worm W32.Sobig.E allows for the leak of infomation and execution of arbitrary code.

Short Name
WORM:EMAIL:SOBIG-DL-REQUEST
Severity
Major
Recommended
False
Recommended Action
Drop
Category
WORM
Keywords
Communication External W32.Sobig.E Worm
Release Date
07/23/2003
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3324
Port
UDP/8898
False Positive
Unknown

Found a potential security threat?