lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <401708E5.14782.8E74C3CC@localhost>
From: nick at virus-l.demon.co.uk (Nick FitzGerald)
Subject: Mydoom

"Ferris, Robin" <R.Ferris@...ier.ac.uk> wrote:

> Does any one know what the size of the attachment is when is comes in as a
> zip file?

Yes and no.

Or, more helpfully, it is not a fixed size.

The size of the .ZIP depends on the length of the randomly selected 
filename that the sending instance of Mydoom chooses for the copy 
inside the .ZIP.  That filename is included twice in the .ZIP -- once 
in the header at the beginning of the stream of packed data for the 
file and once in the "central directory" at the end of the .ZIP.

...

BTW, if anyone is filtering on file size, you will almost certainly 
miss some copies of this (and other malware too).  I don't get large 
enough volumes of these things in my personal Email to do a suitable 
analysis, but I've seen stats from places like MessageLabs (perhaps 
Alex is reading and can post something on this??) showing interesting 
file size distributions for various of these monolithic replicators; 
passage through the Email system is not necessarily kind (aka "bit 
perfect") to them.

Now add the cases where the new self-mailer gets infected with a 
parasitic PE infector that expands an existing PE section, or adds one 
to the file.  This is then seen by a not yet updated scanner that 
happily disinfects the self-mailer of the  parasitic virus, but not 
knowing the new self-mailer leaves it to continue on its travels.  (Why 
any system admin would be so brain-dead as to _want_ to allow any kind 
of attachment known to have come from a "probably infected" machine 
in/out of their network is entirely beyond reason anyway...)  As many 
parasitic viruses cannot be "perfectly" removed (in the sense that the 
infected host cannot be rendered back into a bit-perfect replica of its 
pre-infection self) and disinfected files can even be left a different 
size from their original state, the copy of the self-mailer that 
spreads after such an encounter with an imperfect disinfector will be a 
physically different file, so simple hash-like detection and file size 
detection will fail for some samples.

By way of example, in the approx 40 Mydoom samples I have received as 
the result of its natural replication and spread in the last 12 hours 
or so, all but one decode to the commonly cited 22,528 byte file size.  
The odd one out has, for some unknown (but vaguely imaginable) reason 
"picked up" two extra bytes -- a pair of 0xFF characters added to the 
end of the file.  Because of the way Mydoom spreads, such non-fatal 
modifications to its .EXE file will be reproduced in future copies of 
the virus should this modified sample successfully replicate on some 
other potential victim machine.


-- 
Nick FitzGerald
Computer Virus Consulting Ltd.
Ph/FAX: +64 3 3529854


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ