Where is Waledac?

2009-06-01

Scott Wu

Microsoft, USA

Terry Zink

Microsoft, USA

Scott Molenkamp

Microsoft, USA
Editor: Helen Martin

Abstract

Win32/Waledac is a trojan that is used to send spam. It also has the ability to download and execute arbitrary files, harvest email addresses from the local machine, perform denial of service attacks, proxy network traffic and sniff passwords. Scott Wu, Terry Zink and Scott Molenkamp take a detailed look at the spambot.


Table of contents

Win32/Waledac [1] is a trojan that is used to send spam. It also has the ability to download and execute arbitrary files, harvest email addresses from the local machine, perform denial of service attacks, proxy network traffic and sniff passwords.

Waledac first drew significant attention in December 2008 via a Christmas-themed postcard lure. In the six months since, many users have been the recipient of various other eye-catching lures sent by Waledac. From the perennial holiday-themed lures to the more recent ‘Reuters Terror Attack’ or ‘SMS Spy’ themes, downloading a variant of Waledac is only a single, socially engineered step away.

When it was unleashed in December, Win32/Waledac was by no means an under-developed piece of malware. The authors had been testing and developing the capabilities for at least a year prior to its release. The earliest known binary we were able to find in the wild was from 25 December 2007. The developmental progression of Win32/Waledac can be traced by its internal version numbers. In this case, the version was ‘0’.

A major point in development came with the release of version 15 in the last week of November 2008. This was the first version to support ‘labels’. The label would essentially provide a mechanism to identify and segment drones and the tasks designated to them. The labels appear to be used as affiliate identifiers.

Whilst the major distribution vector for Waledac appears to be through the use of spam campaigns and web hosting on compromised machines, the trojan may also be installed via a custom downloader. These custom downloaders are easily recognized as members of the Waledac family because they employ the same downloading technique as the main component. The technique is to decode an encrypted binary appended to a legitimate JPG. The encryption and the marker separating the JPG from the encrypted data are the same for the downloader and the main component.

We observed that the filename of the JPG retrieved was equivalent to the label contained within the binary itself. Some of the labels observed in samples in the wild have the appearance of a ‘handle’. For example:

  • alekseyb

  • birdie2

  • dekadent

  • dmitriy777

  • ftpfire

  • gorini4

  • lynx

  • mirabella_exp

  • mirabella_site

  • prado

  • semgold

  • shmel

  • twist

  • ub

  • zlv

  • 59xx39

Searching on the Internet for these labels produces some circumstantial evidence to support this theory. In some cases, where the number of results yielded is low, there is a bias towards Russian-hosted websites.

The authors of Waledac appear to have established a relationship of some description with other malware authors. The most notable demonstration of this is by a variant of Win32/Conficker [2]. This particular variant was able to download an encrypted copy of Waledac. The Conficker binary used a private key to decrypt the file from the host ‘goodnewsdigital.com’.

This suggests a level of co-operation, as the Waledac authors would be required to encrypt a binary to an affiliate’s specifications. An alternative scenario is that affiliates have the privilege to ‘publish’ binaries to the distributed hosting network. Therefore, any additional cryptographic transformations could be performed independently.

In addition to Conficker, trojan downloaders such as Win32/Bredolab [3] have also been observed to retrieve Waledac binaries hosted at ‘goodnewsdigital.com’. The label of the Waledac variant downloaded by Conficker was ‘twist’. The label of the binary downloaded by Bredolab was ‘dmitriy777’.

Waledac has the ability to update itself by downloading and executing a newer version from the Internet. This downloading capability is also leveraged to install other malware such as Win32/Rugzip, though perhaps the most interesting piece of malware downloaded recently is Win32/FakeSpypro [4]. The fact that Waledac has installed rogue security applications demonstrates that there is money to be made from affected users.

Win32/FakeSpypro – the fact that Win32/Waledac has installed rogue security applications demonstrates that there is money to be made from affected users.

Figure 1. Win32/FakeSpypro – the fact that Win32/Waledac has installed rogue security applications demonstrates that there is money to be made from affected users.

The telemetry

Now let’s take a look at the MSRT (Malicious Software Removal Tool) [5] telemetry from April, the month in which Waledac was added to the MSRT. Waledac was the twenty-fourth-most prevalent family during this month. More than 24,000 distinct machines were reported with a Waledac infection worldwide. Waledac is deployed mostly on Windows XP (see ).Figure 2 Note this is not normalized. As of today, the MSRT installation base on Vista is about 37% the size of that on Windows XP.

Waledac infection breakdown by OS.

Figure 2. Waledac infection breakdown by OS.

If we take another step to normalize the infection rate by OS, factoring in the MSRT install base, Figure 3 shows that Windows XP has the largest number of computers cleaned per thousand MSRT executions (CCM). Here, CCM is a metric for infection rate based on the MSRT data widely used in the Microsoft Security Intelligence Report [6].

Waledac computers cleaned per thousand (CCM) by platform.

Figure 3. Waledac computers cleaned per thousand (CCM) by platform.

Breaking down the reports by country and performing the same normalization with the MSRT install base, we derive the following table for infection rate. The table presents the top 25 most ‘infected’ countries, ranked by CCM. Turkey has the highest infection rate, followed by Hungary, Russia and the United States:

Country/RegionInfected machinesMSRT executionsCCM
Turkey9315,903,3200.158
Hungary2331,895,0200.123
Russia6155,554,6000.111
United States13,739124,595,7200.110
Poland4536,390,1000.071
Norway1982,810,4800.070
Greece1271,808,8400.070
The Netherlands4958,443,5200.059
Sweden2694,626,0800.058
Czech Republic1582,893,5200.055
Finland1262,382,4000.053
Portugal1482,918,8800.051
France96320,042,0000.048
Spain49811,281,8000.044
Australia3347,612,8600.044
Denmark1363,362,9600.040
United Kingdom86323,238,4800.037
Belgium1183,618,3200.033
Brazil39913,736,7000.029
Canada39914,682,6400.027
Mexico1767,065,5200.025
Korea35314,182,7000.025
Italy28813,001,0400.022
Japan70734,302,5200.021
Germany38426,684,4000.014

Waledac is highly polymorphic. From over 24,000 infected machines there were 2,452 unique Waledac binaries. The following table shows the top 10 reported Waledac hashes. The top six files reported are internal version 34, which was the most recent at the time of the April MSRT release.

MD5Infected machinesInternal file versionBinary label
02782ddfbd851ce17c68dce078dde1902,45434dmitriy777
82008273fc6eff975e0cf3bfc0e2396f2,34434mirabella
fdd5c061cda0e205e00a849a8e8e6f7a1,69334dmitriy777
10868273a15688d11ccb5846535428331,13234birdie2
223111097b81773822a45b73bac1370a85834ub
55cd9f80b39b1b566d9bbde5815c096978834dmitriy777
cdee7ff3d373ec38f8b67accdfc1ffe45402259xx39
dd3de6413bfe3e442d85fdef82297c8449731mirabella
b7db1a54faa4d7b9800393407c0f4dfe45033dmitriy777
4ada90839a8ac31d4f828e9229dfa24f44034ub

The spam data

Over the period 16–21 April 2009, Forefront Online Security for Exchange (FOSE) tracked data on Waledac-related spam. In the study, the following domains were tracked:

  • bestgoodnews.com

  • breakinggoodnews.com

  • bchinamobilesms.com

  • bsmspianeta.com

  • bfreeservesms.com

  • bmiosmsclub.com

  • bsmsclubnet.com

By observing FOSE customers’ incoming mail containing these links, it was possible to capture all of the IPs that sent this mail. These IPs were analysed and the sum total of all mail sent from these IPs was calculated (not just the mail containing the Waledac spam links). Next, a geographical distribution was sketched showing the allocation of the IPs according to their sending source.

One of the characteristics of the Waledac botnet is that it sends a high proportion of mail with an empty MAIL FROM < > field. Empty senders are not included in either the total spam count or the total mail count, but they are included in the average number of mails sent per IP. Empty sender mail could be spam (such as that occurring in Waledac spam) or it could be backscatter mail. This distinction is not made in the statistics below.

RegionTotal spamTotal mailEmpty sender mailDistinct IPsAvg. mail/IP
North America25,786,95872,756,2484,220,6171,80142,741
Europe3,976,9659,491,1664,013,4001,5618,651
Asia838,9691,661,1671,417,8243,0791,000
Oceania58,338329,307104,024477908
South America88,794267,93660,1871562,103
Central America3,22613,2922,03525613
Africa9,55410,32389742,805
Total30,762,80484,529,4399,818,9847,10313,283

As a proportion of total overall mail, showing the percentages:

RegionTotal spamTotal mailEmpty sender mailDistinct IPs
North America83.83%86.07%42.98%25.36%
Europe12.93%11.23%40.87%21.98%
Asia2.73%1.97%14.44%43.35%
Oceania0.19%0.39%1.06%6.72%
South America0.29%0.32%0.61%2.20%
Central America0.01%0.02%0.02%0.35%
Africa0.03%0.01%0.01%0.06%

From the above tables, observe that total spam is only a small proportion of the total mail. Slightly more than a third of North America’s mail is marked as spam, and the numbers are not dissimilar for the other regions. This implies that the Waledac botnet is spread very widely on machines that do not typically send high volumes of spam. In other words, the sending machines are compromised, but the amount of mail sent per bot is sufficiently small so as to hide it within a larger, overall good mail stream.

The next table shows the IP distribution per country, sorted by the total amount of empty sender mail. Manual inspection of a number of Waledac-related spam messages confirmed that much of the spam was sent with empty MAIL FROMs. The average mail/IP includes the empty sender count.

CountryTotal spamTotal mailEmpty sender mailDistinct IPsAvg. mail/IP
United States25,365,15071,436,4634,051,3571,70444,300
Great Britain1,011,8022,675,0041,348,01619520,631
France1,468,1652,853,4181,222,2727455,077
Japan616,4981,128,727754,9192298,226
Austria10,306102,285411,9463415,124
Sweden265,132831,033353,5512059,229
Germany517,0551,234,721281,83310814,042
Canada329,4301,188,341164,6318116,703
Australia55,625320,178102,9281373,088
Italy78,813167,93995,7681371,925
China16,27247,37081,3951,30699
Switzerland48,59494,72472,574237,274
Singapore44,113166,31568,674376,351
United Arab Emirates35,473186,41147,6221416,717
The Netherlands52,613347,00047,094775,118
Spain114,743134,22932,9411031,623
Argentina35,94263,44528,202132694
Czech Republic6,481137,18327,111742,220
Brazil23,694161,89324,380231806
Norway10,577286,02924,3631520,693
Ireland5,40337,72216,643242,265
Mexico92,378131,4444,629168,505
Chile28,17937,434966231,670
Belarus8,93036,362380136,742
Slovakia301,530354,5813541035,494
All others579,784889,650154,4121,358769

As a proportion of relative totals:

CountryTotal spamTotal mailEmpty sender mailDistinct IPs
United States82.45%84.51%41.26%23.98%
Great Britain3.29%3.16%13.73%2.74%
France4.77%3.38%12.45%1.04%
Japan2.00%1.34%7.69%3.22%
Austria0.03%0.12%4.20%0.48%
Sweden0.86%0.98%3.60%0.28%
Germany1.68%1.46%2.87%1.52%
Canada1.07%1.41%1.68%1.14%
Australia0.18%0.38%1.05%1.93%
Italy0.26%0.20%0.98%1.93%
China0.05%0.06%0.83%18.38%
Switzerland0.16%0.11%0.74%0.32%
Singapore0.14%0.20%0.70%0.52%
United Arab Emirates0.12%0.22%0.48%0.20%
The Netherlands0.17%0.41%0.48%1.08%
Spain0.37%0.16%0.34%1.45%
Argentina0.12%0.08%0.29%1.86%
Czech Republic0.02%0.16%0.28%1.04%
Brazil0.08%0.19%0.25%3.25%
Norway0.03%0.34%0.25%0.21%
Ireland0.02%0.04%0.17%0.34%
Mexico0.30%0.16%0.05%0.23%
Chile0.09%0.04%0.01%0.32%
Belarus0.03%0.04%0.00%0.01%
Slovakia0.98%0.42%0.00%0.14%
All 85 others0.71%0.44%5.65%32.37%

The United States is first in this list and it appears to send a disproportionate amount of spam compared to the number of distinct IPs associated with it, but if we compare it to the others like France, Sweden and Belarus, it is not the worst offender. One surprise finding in this list is China, which ranks eleventh in the list. Even though it accounts for nearly one fifth of all the IPs found in the botnet, it accounts for less than 1% of the spam sent. In fact, looking at both sets of data, by continent and by country, Waledac is more likely to be found in the western hemisphere than in the eastern hemisphere.

If we compare North America to Europe, we see that substantially more mail comes from North America than from Europe if we exclude empty sender mail. Yet, if we isolate only that particular type of mail, then the two regions are very similar to each other.

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest articles:

Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

Aditya Sood & Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited to compromise the C&C panel in order to gather threat intelligence, and present a model of mobile AppInjects.

Cryptojacking on the fly: TeamTNT using NVIDIA drivers to mine cryptocurrency

TeamTNT is known for attacking insecure and vulnerable Kubernetes deployments in order to infiltrate organizations’ dedicated environments and transform them into attack launchpads. In this article Aditya Sood presents a new module introduced by…

Collector-stealer: a Russian origin credential and information extractor

Collector-stealer, a piece of malware of Russian origin, is heavily used on the Internet to exfiltrate sensitive data from end-user systems and store it in its C&C panels. In this article, researchers Aditya K Sood and Rohit Chaturvedi present a 360…

Fighting Fire with Fire

In 1989, Joe Wells encountered his first virus: Jerusalem. He disassembled the virus, and from that moment onward, was intrigued by the properties of these small pieces of self-replicating code. Joe Wells was an expert on computer viruses, was partly…

Run your malicious VBA macros anywhere!

Kurt Natvig wanted to understand whether it’s possible to recompile VBA macros to another language, which could then easily be ‘run’ on any gateway, thus revealing a sample’s true nature in a safe manner. In this article he explains how he recompiled…


Bulletin Archive

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.