[An analysis of JB's
Anti-GRC worm]
last updated: 10.Sept.2001
Obscure [ obscure@eyeonsecurity.org ]
EyeonSecurity
https://www.eyeonsecurity.org/
Copyright
� 2001,2002 EyeonSecurity,
Redistribution of this document is
permitted as long as the contents
are not changed and this
copyright notice is included.
Lost
are the days where the simple rule "DON'T ACCEPT FILES FROM IRC" kept
all IRC worms away from your pc. It seems that now script kiddies are reading
BugTraq, checking SecurityFocus.com and the rest of the security sites. Finally
we have silent delivery of a worm, without any user interaction, other then
simply following a link to a malicious HTML page.
This
particular worm, other than simply infecting the victims, will also attack the
(in)famous "Security" website of Steve Gibson, GRC.COM by launching
several DDOS attacks also described in this paper. My personal opinion is that
this could be an attempt by the worm creator to get some publicity.
Getting
infected is simple:
A user on IRC messages you and tells you to follow a link. By simply double clicking on the URL in mIRC, Internet Explorer will come up, download the page and execute the script.
This
particular worm will display the following messages to try get you infected:
As
you can see, some of the messages look like someone is trying to help you out.
Others are simply porn or Warez adverts, which seem to work very well on the
IRC community. One can imagine the astonishment of finding a 14 year old girl
advertising child porn �
So
how does one get infected if he does not even run an executable file? The
person who created this particular worm, seems aware of the vulnerabilities
associated with Internet Explorer and ActiveX. When a victim who follows the
URL from IRC accesses the page with an un-patched Internet Explorer, the
browser immediately runs a VB (visual basic) script, which does a couple of
things described later on, to the victim computer.
The
vulnerability exploited here was first described by Guninsky[1]
and made available through script kiddie tools.
Microsoft
issued a patch, which fixes the problem, so that this worm would not execute
automatically.[2]
However
many users do not patch their browsers, and this vulnerability will probably
effect a good number of users, making this worm very effective until the sites
hosting the malicious html pages are shut down. Even then, people who are
infected will still have the worm active, taking down the web sites will only
stop further spreading.
This
worm seems to originate from KarmaHotel IRC worm, which also makes use of the
same vulnerability described before. While the infection procedure is almost
exactly the same, the resulting payload code is totally new. There are also
suspicions that this particular worm originated from DALnet rather than
undernet because of the website names and the long nickname
"gribblegrobble". This is also similar to KarmaHotel, which also
started on DALnet.
The
worm is initially installed by an html document. What this html page does is
simply exploit the vulnerability found by Georgi Guninski to create a file
called JB.VBS on the C:\ and execute it. From here on, things start happening
:)
C:\JB.VBS
:
Script.ini
:
This
file is found in the mIRC folder.
upon
joining :
1.
checks if the user is on #nohack or #virus free. If that is the case it leaves
the channel.
Simply
a procedure to try keep victims from removing the worm.
2.
randomly sends a message to advertise the infective html page.
This
is the way the worm propagates
upon
connecting to server:
1.
sends gribblegrobble a message "GRC loves me man"
Just
informs this user, probably the creator of the worm, that another victim has
joined his army.
upon
starting:
1.
updates C:\lipreffs.vbs and adds new entry to ping flood grc.com
2.
adds entry to start lipreffs.vbs upon startup.
3.
Randomly connencts to grc.com website and does an HTTP request to certain pages.
4.
Sends UDP packets to grc.com from source port 53 to destination port 80 with
offensive data :)
As
you can see, this worm's payload is to attack GRC.com mainly using PING.exe
available with all Microsoft Windows boxes, to flood the host. Apart from that,
it also uses 2 other techniques, basically:
a.
Generating multiple HTTP requests.
b.
Sending UDP packets. This is a very similar attack to the ICMP flood.
To
launch these two types of attacks, the worm creator makes use of Socket support
in mIRC.
Ok
this is the important part for those infected. Please note that i cannot be
held responsible in the case that anything wrong happens with your computer. I
do not claim that this is the correct way to clean the worm.It is advised that
only advanced users follow this procedure.
To
remove the worm :
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jb and delete the key.
This
particular worm is built on a previously also relatively successful older worm.
This means that the worm creator does not have to worry on how to make the
users run the file. However it still inherits the same problems to spread,
which basically is the need to use hardcoded links. Of course the infectious
pages can be put down, stopping further spreading of the worm, making it a very
short term problem.
Apart
from this, the idea to attack GRC.com is a bit similar to the previous CODE-RED
worm payload. However we see that the person creating this particular worm went
further to make use of different types of connections to attack different
resources and services. Considering the possibility of further infection and
spreading of this worm, this could easily create an effective automated DDoS
attack on the target server.
So
the lesson of the day is: never have an unpatched Internet Explorer .. it could
ruin your day.
Maybe
we could add that following links from strangers can be harmful nowadays.
Anyways, you can check out the source of the worm your self by clicking on
download below. All files are renamed to txt or ini to prevent any possible
infection.
I
acknowledge `eZ of #nohack / undernet for giving me information on KarmaHotel
and his useful comments on this article.
Security
issues :
http://www.guninski.com/javaea.html
http://www.securityfocus.com/bid/1754
Microsoft
Patch
http://www.microsoft.com/technet/support/kb.asp?ID=275609
Microsoft
FAQ
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/bulletin/fq00-075.asp
htmlpage.txt
contains the actual HTML source of the pages created by the worm maker.
jb.txt
contains the source of jb.vbs created by by html page.
script.ini
is the mIRC script created by jb.vbs.
Download
Files: https://www.eyeonsecurity.org/download/anti-grc.zip