W95.Hybris.gen

Discovered on: September 25, 2000 

W95.Hybris is a worm that spreads by email as an attachment to outgoing email messages. 

The email message or subject may include, but is not limited to:


hahaha@sexyfun.net
Snow White and the Seven dwarves


The attachment may have one of several different names, including, but not limited to:

anpo porn(.scr
atchim.exe
branca de neve.scr
dunga.scr
dwarf4you.exe
enano porno.exe
joke.exe
midgets.scr
sexy virgin.scr


Also Known As: W32.Hybris.gen, W32.Hybris.22528.dr, W32/Hybris.gen@M, I-Worm.Hybris 

Category: Worm 

Virus Definitions: September 25, 2000 

Threat Assessment: 

   
Wild: High  
Damage: Low  
Distribution: High  
 

Wild: 

Number of infections: 50 - 999 
Number of sites: More than 10 
Geographical distribution: Medium 
Threat containment: Moderate 
Removal: Moderate 
Distribution: 

Name of attachment: Random with EXE or SCR file name extension 

Technical description: 

When the worm attachment is executed, the Wsock32.dll file is modified or replaced. Once the 
worm has infected wsock32.dll, it has the abilty to monitor the Internet connection as well 
as incoming and outgoing email traffic. The worm then scans for email addresses. When an 
email address is detected whether on an Internet site or in email being sent or received, 
the worm waits for a period of time and then sends an infected message to the detected 
address.

The worm attempts to connect to the alt.comp.virus newsgroup. If it connects successfully, 
then the worm uploads its own plug-ins to this newsgroup in an encrypted form. It goes thru 
the subject header of the messages, and tries to match a specific format. The subject header 
will also specify the version number of the attached plug-in if the plug-ins are present. If 
newer versions of the plug-ins are found, the worm downloads them and updates its behavior. 

One of the plug-ins for W95.Hybris.gen generates a spiral image. Upon execution, the plug-in 
initially loads OpenGL libraries which are used to draw a large black and white spiral image. 
It also registers itself as a service; this prevents it from being displayed in the Close 
Programs dialog box. 

This worm also has a plug-in that infects executable programs. The DOS EXE infection is fairly 
simple dropping technique. The virus code is appended to the end of the file with a small 
16-bit dropper routine. This routine creates a temporary file with an .exe extension in the 
TEMP folder and executes it. It then deletes the temporary executable. In this way, 
Wsock32.dll is infected with the actual worm body. The PE executables have a much more 
complicated file infection process. PE files become infected only if they have a long 
enough code section. The virus infection plug-in packs the original code area and overwrites
it if it will fit in the same place. This complicated antiheuristic infection technique is
difficult but possible to repair.

If Wsock32.dll is being used by the system, the worm cannot modify it. In this situation, 
the worm will add a registry entry to one of the following subkeys:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce

It always alternates between these two keys as the worm spreads from one computer to another.
The worm hooks onto the following exports of Wsock32.dll:

send()
recv()
connect()

Whenever you send email, the worm sends a second message to the same person, attaching 
copy of itself using a randomly generated file name.


    Source: geocities.com/timessquare/alley/2794

               ( geocities.com/timessquare/alley)                   ( geocities.com/timessquare)