|
The CERT/CC has received a number of reports of malicious code known as W32/Frethem. It affects systems running Microsoft Windows with unpatched versions of Internet Explorer and mail clients that use IE's HTML rendering engine (including Outlook and Outlook Express). Patched systems (or systems that do not use IE's HTML rendering engine for mail) may also be affected if a user manually executes the malicious code. A number of variants of this code have been identified.
The next two MIME parts are the attachments, decrypt-password.exe and password.txt. In samples received by the
CERT/CC, the password.txt file contains
the text "Your password is W8dqwq8q918213", but it does not contain any
executable code. The malicious code is contained in the decrypt-password.exe file. We have
received variants of decrypt-password.exe with the following MD5
checksums:
In the variants we have received, decrypt-password.exe appears as an attachment flagged as a MIME content type audio/x-midi, which allows W32/Frethem to exploit the vulnerability described in VU#980499 and run automatically if the message is viewed on a vulnerable system. Even if the system has been patched for this vulnerability, a user can still trigger infection by opening the attachment directly.
When decrypt-password.exe is run, it creates the IEXPLORE_MUTEX_AABBCCDDEEFF mutex to ensure that only one copy will run at a time. It also gathers the current user's default SMTP server, email address, and display name from the registry keys located at
W32/Frethem attempts to install itself locally so it will run again whenever Windows restarts. In some variants, it does this by placing a copy of itself in the Start Menu\Programs\Startup folder as setup.exe. A more recent variant accomplishes this by copying itself to %WinDir%/taskbar.exe and adding a registry key named 'Task Bar' to
As with other malicious code having mass-mailing capabilities, W32/Frethem may cause denial-of-service conditions in networks where either (a) multiple systems are infected, or (b) large volumes of infected mail are received.
Users are encouraged to install the patches detailed in MS01-020. (Note: MS01-020 has been superseded by MS02-023, so users should consider installing the appropriate patches from MS02-023 if possible) Microsoft has published additional recommendations for protecting against W32/Frethem at
It is important for users to update their anti-virus software. Most anti-virus software vendors have released updated information, tools, or virus databases to help detect and recover from W32/Frethem. A list of vendor-specific anti-virus information can be found in Appendix A.
Many anti-virus packages support automatic updates of virus definitions. We recommend using these automatic updates when available.
Exercise caution when receiving email with attachments. Users should be suspicious of unexpected attachments, regardless of their origin. In general, users should also always scan files received through email with an anti-virus product.
The following section of the "Home Network Security" document provides advice on handling email attachments securely:
http://www.cert.org/tech_tips/home_networks.html#IV-A-4
Sites can use email filtering techniques to delete messages
containing subject lines known to contain the malicious code, or they
can filter all attachments.
You may wish to visit the CERT/CC's Computer Virus Resources Page located at:
http://www.cert.org/other_sources/viruses.html