W95.Hybris.gen
Discovered on: September 25, 2000
W95.Hybris is a worm that spreads by email as an attachment to outgoing email messages.
The email message or subject may include, but is not limited to:
hahaha@sexyfun.net
Snow White and the Seven dwarves
The attachment may have one of several different names, including, but not limited to:
anpo porn(.scr
atchim.exe
branca de neve.scr
dunga.scr
dwarf4you.exe
enano porno.exe
joke.exe
midgets.scr
sexy virgin.scr
Also Known As: W32.Hybris.gen, W32.Hybris.22528.dr, W32/Hybris.gen@M, I-Worm.Hybris
Category: Worm
Virus Definitions: September 25, 2000
Threat Assessment:
Wild: High
Damage: Low
Distribution: High
Wild:
Number of infections: 50 - 999
Number of sites: More than 10
Geographical distribution: Medium
Threat containment: Moderate
Removal: Moderate
Distribution:
Name of attachment: Random with EXE or SCR file name extension
Technical description:
When the worm attachment is executed, the Wsock32.dll file is modified or replaced. Once the
worm has infected wsock32.dll, it has the abilty to monitor the Internet connection as well
as incoming and outgoing email traffic. The worm then scans for email addresses. When an
email address is detected whether on an Internet site or in email being sent or received,
the worm waits for a period of time and then sends an infected message to the detected
address.
The worm attempts to connect to the alt.comp.virus newsgroup. If it connects successfully,
then the worm uploads its own plug-ins to this newsgroup in an encrypted form. It goes thru
the subject header of the messages, and tries to match a specific format. The subject header
will also specify the version number of the attached plug-in if the plug-ins are present. If
newer versions of the plug-ins are found, the worm downloads them and updates its behavior.
One of the plug-ins for W95.Hybris.gen generates a spiral image. Upon execution, the plug-in
initially loads OpenGL libraries which are used to draw a large black and white spiral image.
It also registers itself as a service; this prevents it from being displayed in the Close
Programs dialog box.
This worm also has a plug-in that infects executable programs. The DOS EXE infection is fairly
simple dropping technique. The virus code is appended to the end of the file with a small
16-bit dropper routine. This routine creates a temporary file with an .exe extension in the
TEMP folder and executes it. It then deletes the temporary executable. In this way,
Wsock32.dll is infected with the actual worm body. The PE executables have a much more
complicated file infection process. PE files become infected only if they have a long
enough code section. The virus infection plug-in packs the original code area and overwrites
it if it will fit in the same place. This complicated antiheuristic infection technique is
difficult but possible to repair.
If Wsock32.dll is being used by the system, the worm cannot modify it. In this situation,
the worm will add a registry entry to one of the following subkeys:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
It always alternates between these two keys as the worm spreads from one computer to another.
The worm hooks onto the following exports of Wsock32.dll:
send()
recv()
connect()
Whenever you send email, the worm sends a second message to the same person, attaching
copy of itself using a randomly generated file name.
               (
geocities.com/timessquare/alley)                   (
geocities.com/timessquare)