The TDSS loader was named Net-Worm.Win32.Rorpian and has two methods of propagation:
When propagating via removable media, the worm creates the files setup.lnk, myporno.avi.lnk, pornmovs.lnk and autorun.inf. These files contain a link to the file rundll32.exe whose parameters reference the worm’s DLL. This is a standard technique used in many malicious programs.
The worm uses the following methodology when working with a LAN. To infect a computer, the worm checks if a DHSP server is used in the network. If the victim computer is located on a network using the DHCP protocol, the worm starts scanning the network to see if there are any available IP addresses. After that, the worm launches its own DHCP server and starts listening to the network. When a DHCP request from a computer in the local network arrives, the worm attempts to respond to it before the “official” DHCP server does, and species the following:
Fragment of Net-Worm.Win32.Rorpian code that works with the DHCP protocol
The user will only be able to visit sites after agreeing to install an “update”. If the user agrees, they unwittingly download a variant of Net-Worm.Win32.Rorpian. After infecting the user’s computer, it changes the DNS settings into a Google server address and lets the user browse.
Screenshot of the malicious site from which the worm propagates
Thus the Net-Worm.Win32.Rorpian worm acts as a loader for TDSS, one of the most advanced and sophisticated malicious programs around. The worm leverages the users’ indiscretion – the most dangerous vulnerability of them all.
PS Acknowledgements go to Evgeny Aseev for his help in preparing this article.
2011 Jun 30, 15:43
"plain .lnk" one)