New Trojan comes calling through Skype
Websence has alerted about a new set of the Warezov/Stration malicious code. This new code is currently spreading through the ubiquitous Skype network. Although the code itself is not self-propagating, when it runs, a URL is sent to all users within the user’s Contacts List.
Users of the most famous free VoIP proggy Skype receive a message that says “Check up this,” with a URL containing a hyperlink. When users click on the link, they are redirected to a site that is hosting a file named file_01.exe. Users are prompted to run the file (note: there is no vulnerability within Skype). If the user runs the file, several other files are downloaded and run.
The files listed below are loaded from different domains. These domains were up and running at the time of this alert.
1e61617b7498c5cad41c4d26b8e4ca8c file_01.exe
7c2b181ab4fbe858e22bbbdc725e4f53 gdi32.exe
7306bed6c39560ed78fe67cfc5e643c8 ndis.exe
5262a217d2ca7f28be6fc398d8f8aee3 sk.exe
The user’s contacts also receive the URL within Skype. Once the Trojan is installed in a system, it tries to connect to a Yahoo mail server to send an SMTP message. However, that server does not seem to be operative and the communication fails. This inoperability is probably an attempt to notify the attacker that a certain machine has been infected.
The downloaded files are other versions of the Warezov/Stration malicious code. This code opens backdoors to the users systems and also downloads new code.
So, users beware!
- Indian Holocaust
- Bureaucratic nitpicking