wipe-deletion-erasure-purge


Email-Worm.Win32.Zafi.d

Email-Worm.Win32.Zafi.d

CyberScrub AntiVirus
Research Bank

The worm spreads via the Internet as an attachment to infected messages, and also via file-sharing networks.

It sends itself to email addresses harvested from the infected computer.

The worm itself is a Windows PE EXE file, approximately 12KB in size, packed using FSG. The unpacked file is approximately 37KB in size.

The worm contains a backdoor.

Installation

Once launched, the worm displays the following dialogue box:

CRC: 04F7Bh, Error in packed file!

When installing, the worm copies itself to the Windows system directory as 'NortonUpdate.exe' and registers this file in the system registry:

[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]
"Wxp4" = C:\WINDOWS\SYSTEM32\Norton Update.exe 

This ensures a copy of the worm will be launched each time the infected machine is rebooted.

The worm also creates files in the Windows system directory which have random names, and a .dll extension.

For example:

%System%\csnhzdsb.dll
%System%\gzapvzry.dll
%System%\hrdkwxwu.dll
%System%\icvwceot.dll

Email addresses harvested from the victim machine are saved to these files.

Zafi.d also creates the following entry in the system registry:

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Wxp4]
Wxp4 is the worm's identifier, which flags its presence in the system.
Propagation via email

The worm harvests email addresses from the MS Windows address book, and also from files with the following extensions:

adb 
asp 
dbx 
eml 
fpt 
htm 
inb 
mbx 
php 
pmr 
sht 
tbb 
txt 
wab

All harvested addresses will be saved in the .dll files which the worm has created in the Windows system directory.

The worm does not send messages to addresses which contain the following text strings:

admi 
cafee 
google 
help 
hotm 
info 
kasper 
micro 
msn 
panda 
secur 
sopho 
suppor 
syman 
trend 
use 
viru 
webm 
win 
yaho

Zafi.d establishes a direct connection to the recipient's SMTP server in order to send messages.

Infected messages

Infected messages are sent in a variety of languages. The language of the infected messages is determined by the recipient's domain name.

Message subject (chosen from the list below):
Merry Christmas! 
boldog karacsony... 
Feliz Navidad! 
ecard.ru 
Christmas Kort! 
Christmas Vykort! 
Christmas Postkort! 
Christmas postikorti! 
Christmas - Kartki! 
Weihnachten card. 
Prettige Kerstdagen! 
Christmas pohlednice 
Joyeux Noel! 
Buon Natale!
Message body (chosen from the list below):

  • Happy HollyDays! :) [Sender]
  • Kellemes Unnepeket! :) [Sender]
  • Feliz Navidad! :) [Sender]
  • Glaedelig Jul! :) [Sender]
  • God Jul! :) [Sender]
  • Iloista Joulua! :) [Sender]
  • Naulieji Metai! :) [Sender]
  • Wesolych Swiat! :) [Sender]
  • Fröhliche Weihnachten! :) [Sender]
  • Prettige Kerstdagen! :) [Sender]
  • Veselé Vánoce! :) [Sender]
  • Joyeux Noel! :) [Sender]
  • Buon Natale! :) [Sender]
Attachment name

The attachment name is randomly generated. It contains the word 'postcard' in a language which corresponds to the recipient's domain name and a long string of random characters. The attachment name will have one of the following extensions:

.bat 
.cmd 
.com 
.pif 
.zip
Propagation via local and file-sharing networks:

Zafi.d copies itself to all files where the file name contains one of the following text strings:

music
share 
upload

The worm copies itself to these folders under a name chosen from the list below:

winamp 5.7 new!.exe 
ICQ 2005a new!.exe

For example:

c:\Program Files\Common Files\Microsoft Shared\ ICQ 2005a new!.exe
Remote administration

The worm opens TCP port 8181 on the victim machine in order to receive commands. The backdoor offers a malicious remote attacker full access to the infected computer. In addition to this, files can be downloaded from the Internet and launched on the victim machine.

Payload

Zafi.d attempts to detect and terminate firewall and antivirus applications on infected machines, by overwriting the application files with a copy of itself.

Check out if we have free removal tool for this virus


CyberScrub AntiVirus provides state of the art security protection for five years- at one low price. Our award winning technology ensures protection against viruses, worms and trojans backed by top customer support and value.

 
Five Year Cost Comparison
Product Initial Cost Yearly Subscription X Four Years Total
Norton 2004 AntiVirus $49.95* $29.95 $119.80 $169.75
McAfee VirusScan $49.95* $19.95 $79.80 $129.75
CyberScrub AntiVirus $49.95 Included No Additional Cost $49.95
*All prices MSRP as published on respective sites.




It is only a matter of time before a virus, worm or Trojan horse wrecks havoc on your important data. Important files, records, family pictures- all at risk. Some dangerous programs can even ruin your hard drive beyond repair.

CyberScrub AntiVirus offers the most effective protection from all known and unknown viruses.

CyberScrub AntiVirus is powered by a unique integrated technology for virus detection, based on principles of multi-generation heuristic analysis. This allows the program to protect you from suspect “viral behavior”. This highly effective methodology repelled all attacks of each “I LOVEYOU’ viral variation without any additional antivirus database updates. No other technology, including Norton, Trend, or McAfee was able to accomplish this.

CyberScrub AntiVirus is powerful, yet its exceptional ease of use and installation make it acceptable for beginner to pro



CyberScrub Antivirus constantly scans your hard drive and files to identify, clean and destroy infected objects. With updates available every three hours, 24 hours a day, 365 days a year, you can count on CyberScrub to protect your valued data.

CyberScrub AntiVirus
Lifetime Edition

"For the Life of Your Computer"

Save $10 Now!
Limited Time

 


Email-Worm.Win32.Zafi.d


Symantec Warns Of Flaw In Antivirus Program. More>>

CNN Legend Lynne Russell reports on CyberScrub AntiVirus for Tech Headline News.


















 
 

delete,deletion, file deletion, Internet clean up,privacy, HIPAA, Internet privacy, cookies, erase, erasure, shredder, wipe, overwrite, purge, deletion, security, file wipe, data destruction