VIRUS ALERT
June 8, 2004
HIGHPanda Virus Alert - Korgo Variants
Korgo Worms: Is this a Dangerous Experiment?
Worms creator seems to be carrying out experments with new variants aimed
at catching users off guard while aiming to cause a serious epidemic
GLENDALE, CA – JUNE 09, 2004 - When the Korgo.A worm appeared it was
thought to be just another replica of the infamous Sasser. However, given
that 12 variants have appeared in quick succession would seem to point to
more threatening motives that could represent a serious concern to the
integrity of IT systems.
The Korgo worms, just like Sasser, exploit the LSASS vulnerability to
spread rapidly across the Internet. But unlike Sasser, these worms try to
lay low when they infect computers and therefore users won’t see tell-tale
signs such as continuous restarts in infected computers. They can also,
depending on the variant, delete certain files, open communication ports
and try to connect to various IRC servers.
Another important characteristic is that some of the Korgo worms use mutex
(mutual exclusion objects). These objects can control access to system
resources and prevent more than one process from using the same resource at
the same time. One of the mutex created by these malicious codes is called
“utermXX” (XX is a number -apparently sequential). So while Korgo.C uses
the mutex “utwrm7”, Korgo.J uses “uterm12”. This would imply that there are
at least 12 versions of the worm (in this case, a version is a virus that
has substantially different characteristics to its predecessors). In
addition, there are other lesser variants, differing only fractionally from
the original version. This is the case for example with Korgo.K and
Korgo.L, created by introducing minor modifications to the original code
These malicious codes also alter the Windows Registry, with each new
variant removing the changes made by its predecessors and making new
changes. This means that the order in which they have been created can be
traced by the changes that they make. For example, Korgo.D deletes the
entries created by Korgo.F, implying that Korgo.D is actually a more recent
creation.
“We have not been able to determine to goal of this worms creator,” said
Luis Corrons, head of PandaLabs. “The amount of work being put into the
development of the Korgo variants would suggest that this is more than just
someone having a bit of fun. This is also far form the the typical virus
strategy of simply getting as many variants in circulation as quickly as
possible to infect as many computers as possible, as they have taken the
trouble to make their creations delete their own predecessors.”
It appears that the creators are trying to fine tune the malicious code in
order to create a highly damaging example that will take users by surprise.
It would, nevertheless, be a ‘silent’ epidemic, as one of the main features
of the Korgo worms is that their actions can go unnoticed by users.
One seemingly contradictory detail is that despite such technical
ingenuity, Korgo uses the LSASS vulnerability to propagate and will
therefore cease to spread as users install the patch to fix this flaw in
Windows. This may not be a problem for its creators because, as Corrons
explains: “The creator of the worm could exploit other vulnerabilities as
they are discovered. This is why it is advisable to keep an eye on the new
variants which will no doubt appear. The sooner the creator is caught the
better.”
To prevent incidents involving the Korgo worms, Panda Software advises
users to take precautions and update their antivirus software. The company
has already made the updates to its products available to users to ensure
their solutions can detect and eliminate these malicious code. To keep
Korgo and its variants at bay, it is essential to apply the patch released
by Microsoft to fix the LSASS vulnerability which can be downloaded at:
http://ww.microsoft.com/technet/security/bulletin/MS04-011.mspx
More information on this worm and others is available in Panda Software’s
Virus and Intrusions Encyclopedia
Users can also detect and disinfect this and other malicious code using the
free, online antivirus, Panda ActiveScan, which is also available on the
company’s website at: http://www.pandasoftware.com./
About PandaLabs
On receiving a possibly infected file, Panda Software's technical staff
gets right to work. The file is analyzed and depending on the type, the
action taken may include: disassembly, macro scanning, code analysis etc.
If the file does in fact contain a new virus, the disinfection and
detection routines are prepared and quickly distributed to users.
For more infomation:
Alan Wallace
[email protected]
Original source: panda-us-virusalert-2004-06-09-korgovariants.doc

