Virus Encyclopedia
Welcome to the Virus Encyclopedia of Panda Security.
Gaobot.CJQ | |
Threat Level Damage Distribution |
At a glance
|
Common name: | Gaobot.CJQ |
Technical name: | W32/Gaobot.CJQ.worm |
Threat level: | Low |
Type: | Worm |
Effects: | It uses the LSASS, RPC DCOM and WebDAV vulnerabilities in order to spread to as many computers as possible. It connects to an IRC server and waits for control commands. It allows to obtain information on the affected computer, run files, etc. |
Affected platforms:
|
Windows 2003/XP/2000/NT |
First detected on: | Jan. 7, 2005 |
Detection updated on: | Jan. 7, 2005 |
Statistics | No |
Brief Description | |
Gaobot.CJQ is a worm with backdoor characteristics that belongs to the Gaobot worm family. This family has the following common characteristics: - It affects Windows 2003/XP/2000/NT computers only, as it attempts to exploit the LSASS, RPC DCOM and WebDAV vulnerabilities to spread to as many computers as possible. These vulnerabilities only affect the operating systems mentioned above.
- It spreads by attempting to copy itself to network shared resources it accesses.
- Once it is run, it connects to a specified IRC server and waits for control commands. As a backdoor, it allows to obtain information on the affected computer, run and download files, launch distributed denial of service (DDoS) attacks, upload files by FTP, etc.
In addition, certain variants of Gaobot: - Take advantage of the backdoors opened by the worms Bagle.A and Mydoom.A, in order to spread to those computers affected by these worms.
- End processes belonging to antivirus programs, firewalls and system monitoring tools, among others. This leaves the affected computer vulnerable to the attack of other viruses or worms.
- End the processes belonging to Nachi.A, Autorooter.A, Sobig.F and several variants of Blaster.
If you have a Windows 2003/XP/2000/NT computer, it is highly recommendable to download the security patches for the LSASS, RPC DCOM and WebDAV vulnerabilities from the Microsoft website. |
Visible Symptoms | |
Gaobot.CJQ is difficult to recognize, as it does not display any messages or warnings that indicate it has reached the computer. |
Tech details
Effects |
Worms belonging to the Gaobot family have the following general effects: They configure themselves: check their status, update themselves, uninstall themselves, etc. They obtain information on the affected computer: CPU, RAM, disk space, operating system, etc. They behave as sniffers, and spy on the network traffic. They launch DDoS (distributed denial of service) attacks. They send the worm to other IRC users. They increase the network traffic on the ports 135 and 445
Additionally, some variants also carry out the following actions: They search for specific text strings associated to several antivirus programs, firewalls, and system monitoring tools, in active processes. If any match is found, the process is ended, thus leaving the affected computer vulnerable to the attack of other viruses and worms. They end the following processes if they are active: dllhost.exe msblast.exe mspatch.exe penis32.exe tftpd.exe winhlpp32.exe winppr32.exe These processes belong to Nachi.A, Autorooter.A, Sobig.F and several variants of Blaster. It prevents the user from visiting certain web sites, which mainly belong to several antivirus programs vendors.
|
Means of transmission
Worms belonging to the Gaobot family spread across the Internet and networks.
1.- Transmission across the Internet.
It spreads by attacking IP addresses, in which it tries to exploit the LSASS, RPC DCOM and WebDAV vulnerabilities. However, although it contains code to exploit the vulnerability, it does not work properly.
2.- Transmission across networks.
It follows the routine below:
- If the affected computer belongs to a network, it attempts to access the network shared resources C$, D$, E$, ADMIN$ and IPC$.
- In order to do so, it uses passwords that are typical or easy to guess.
- If successful, it makes copies of itself to the shared resources.
In addition, some Gaobot variants can take advantage of the ports opened in computers affected by the worms Bagle.A and Mydoom.A, in order to spread to these computers.
Further Details
Gaobot.CJQ is written in the programming language Visual C++ v6.0.
>
>