top of page

⚡ ALLAPLE Win32 Worm ⚡: Turning a victim into an Accomplice of a crime 😈

☠☠ Allaple.A ☠☠

Allaple worm family has been discovered in late 2006. The Allaple worm is a polymorphic malware designed to spread over Local Area Network and Internet.

After the worm's file is run it goes through the polymorphic decryptor and then proceeds to the static part of the code that allocates a memory buffer and extracts the main worm's code into it. Then the control is passed directly to the extracted worm's code.

After getting control, the worm creates a few threads. One thread scans for vulnerable computers (on TCP ports 139 and 445) and sends exploits there in order to infect them.

The other thread scans for .HTM and .HTML files on all local hard disks and infects them by prepending a reference to worm's CLSID there.

 

👉 Infection:

The worm copies itself multiple times to a hard drive and also affects HTML files.

The worm's file is polymorphically encrypted, which means every copy of the worm is different. The only constant aspect of the worm's code is the size of its executable file - 57856 bytes.

The worm creates a different CLSID for every copy of itself that it creates on the hard drive. The number of these copies can be quite large. The names of the worm's files are random. For example:

bzehxvnz.exe 
hwexrtne.exe 
jbnshhqj.exe 
jjlenkbt.exe 
tsbjbtvn.exe 


👉 TYPE:

        Net-Worm:W32/Allaple.A 
 

👉 Modus Operandi:

After getting control, the worm creates a few threads. One thread scans for vulnerable computers (on TCP ports 139 and 445) and sends exploits there in order to infect them. The other thread scans for .HTM and .HTML files on all local hard disks and infects them by prepending a reference to worm's CLSID there. One of the remaining threads performs a DoS attack on three websites located in Estonia. The worm also tries to brute-force network share passwords by performing a dictionary attack on them. The following TCP ports used during the DoS attack:

22, 
80, 
97, 
443 

The following is the dictionary used to bruteforce networks:

00 
000 
0000 
00000 
000000 
0000000 
00000000 
1 
12 
123 
1234 
12345 
123456 
1234567 
12345678 
123456789 
abc123 access adm Admin alpha anon anonymous asdfgh backdoor backup beta bin coffee computer crew database debug default demo go guest hello install internet login mail manager money monitor network new newpass nick nobody nopass oracle pass passwd password poiuytre private public qwerty random real remote root ruler secret secure security server setup shadow shit sql super sys system telnet temp test test1 test2 visitor windows www X


👉 PLATFORM:

        WIN32 

👉 Key Points and Mitigation:.

â˜ŁïžAliz worm is relatively easy to disinfect.â˜Łïž

💉Based on the settings of your AV (tested against windows defender), it will either move the file to the quarantine where it cannot spread or cause harm, or remove it.đŸ©ș 💊Companies can take steps to prevent infection, with software and AV updates being most important.

 

Conclusion

Subscribe to receive notifications of similar posts 😋 where we will be reverse engineering malware and the technical aspect of vulnerabilities as well as how an attacker may use this vulnerability as an attack vector and other Infosec stuff...😋Thank you for your time, Like and leave a comment/review and as always, stay awesome! 😋👊 đŸ’Ș


12 views0 comments

Recent Posts

See All
Post: Blog2_Post
bottom of page