Beselo is a MMS and Bluetooth worm family that operates on Symbian S60 Second Edition devices.
The Beselo family is very similar to the Commwarrior family but contains enough differences in the code base and behavior that it is counted as separate family.
beselo has 5 variants :
1. beselo.a
2. beselo.b
3. beselo.c
4. beselo.d
5. beselo.e
Variants Beselo.C, Beselo.D and Beselo.E are closely related to Beselo.B
Beselo.a details
Name : Worm:SymbOS/Beselo.A
Category : Malware
Type : Bluetooth-Worm
Platform : SymbOS
Origin : Asia
Date of Discovery: December 21, 2007
Infection
The worm's SIS installation package contains .exe, .ini, and .dat files named using a random format that has seven letters followed by the extension. For example, qsnpwsg.exe,qsnpwsg.ini, and qsnpwsg.dat.
When Beselo.A is run the installer will copy the worm's main executable to C:\system\data and execute. After execution the worm will copy its executable file to C:\system\apps with the same name as worm's main executable. Additionally, the worm creates a new unique SIS installation package to C:\systems\apps and recognizer to C:\system\recogs with the name that has the same first four letters as worm's executable. If the phone has a memory card the worm will also copy itself there. To summarize, here is a list of all files created in one installation using example filenames.
Files created on the phone:
• C:\system\data\qsnpwsg.exe
• C:\system\apps\qsnpwsg.exe
• C:\system\apps\qsnpwsg.sis
• C:\system\recogs\gsnp.mdl
The following file does not have a variable name:
• C:\system\data\SIMLanguage.dat
Files created on the memory card:
• E:\system\apps\qsnpwsg.exe
• E:\system\recogs\gsnp.mdl
Hiding and Protecting the Process from the User
Beselo.A attempts to hide its process from the user by running as executable, so that it is not visible in the standard application list. The process is visible in third party tools that show system processes. It is named with same random name as the worm's main executable.
The worm protects its process from being killed by setting the process type to "system". It is not possible to kill a system process.
Replication via MMS Messages
Beselo.A replicates using MMS with SIS files that have the text "Photo" as message body and a SIS file attachment named beauty.jpg, sex.mp3, or love.rm.
The MMS messages are sent to numbers found in the device phone book.
Replication via Bluetooth
Beselo.A replicates using Bluetooth in SIS files using the same name as the MMS messages. Bluetooth messages are attempt in one minute intervals to one phone number at a time.
The extension used in the worm installation file causes the message to be shown with an icon that indicates a broken media file.
Replication to an MMC Card
Beselo.A listens for any MMC cards inserted to the infected phone, and copies itself to inserted card. The infected card contains both the worm executable and the bootstrap component, so that if infected card is inserted into another phone it will also be infected.
Beselo.b details
Name : Worm:SymbOS/Beselo.B
Category : Malware
Type : Bluetooth-Worm
Platform : SymbOS
Origin : Asia
Date of Discovery: December 21, 2007
Beselo.B is an MMS and Bluetooth worm that operates on Symbian S60 Second Edition devices.
Beselo.B spreads via MMS messages and Bluetooth using the filenames beauty.jpg, sex.mp3, or love.rm
Infection
The worm's SIS installation package contains .exe, .ini, and .dat files named using a random format that has seven letters followed by the extension. For example, qsnpwsg.exe,qsnpwsg.ini, and qsnpwsg.dat.
When Beselo.B is run the installer will copy the worm's main executable to C:\system\data and execute. After execution the worm will copy its executable file to C:\system\apps with the same name as worm's main executable. Additionally, the worm creates a new unique SIS installation package to C:\systems\apps and recognizer to C:\system\recogs with the name that has the same first four letters as worm's executable. If the phone has a memory card the worm will also copy itself there. To summarize, here is a list of all files created in one installation using example filenames.
Files created on the phone:
• c:\system\data\qsnpwsg.exe
• c:\system\data\qsnpwsg.dat
• c:\system\data\qsnpwsg.ini
• c:\system\apps\qsnpwsg.exe
• c:\system\apps\qsnpwsg.sis
• c:\system\recogs\gsnp.mdl
Files created on the memory card:
• e:\system\apps\qsnpwsg.exe
• e:\system\recogs\gsnp.mdl
Hiding and Protecting the Process from the User
Beselo.B attempts to hide its process from the user by running as executable, so that it is not visible in the standard application list. The process is visible in third party tools that show system processes. It is named with same random name as the worm's main executable.
The worm protects its process from being killed by setting the process type to "system". It is not possible to kill a system process.
Replication via MMS Messages
Beselo.B replicates using MMS with SIS files that have the text "Photo" as message body and a SIS file attachment named beauty.jpg, sex.mp3, or love.rm.
The MMS messages are sent in 1 minute interval to either numbers found in the device phone book or else to internally generated numbers.
Beselo.B also listens for incoming SMS messages and responds to any message with an infected MMS message.
Replication via Bluetooth
Beselo.B replicates using Bluetooth in SIS files using the same name as the MMS messages. Bluetooth messages are attempt in one minute intervals to one phone number at a time.
The extension used in the worm installation file causes the message to be shown with an icon that indicates a broken media file.
Replication to an MMC Card
Beselo.B listens for any MMC cards inserted to the infected phone, and copies itself to inserted card. The infected card contains both the worm executable and the bootstrap component, so that if infected card is inserted into another phone it will also be infected.
free download beselo:
beselo.a.sis
beselo.a.exe
beselo.b.sis
beselo.b.exe
The Beselo family is very similar to the Commwarrior family but contains enough differences in the code base and behavior that it is counted as separate family.
beselo has 5 variants :
1. beselo.a
2. beselo.b
3. beselo.c
4. beselo.d
5. beselo.e
Variants Beselo.C, Beselo.D and Beselo.E are closely related to Beselo.B
Beselo.a details
Name : Worm:SymbOS/Beselo.A
Category : Malware
Type : Bluetooth-Worm
Platform : SymbOS
Origin : Asia
Date of Discovery: December 21, 2007
Infection
The worm's SIS installation package contains .exe, .ini, and .dat files named using a random format that has seven letters followed by the extension. For example, qsnpwsg.exe,qsnpwsg.ini, and qsnpwsg.dat.
When Beselo.A is run the installer will copy the worm's main executable to C:\system\data and execute. After execution the worm will copy its executable file to C:\system\apps with the same name as worm's main executable. Additionally, the worm creates a new unique SIS installation package to C:\systems\apps and recognizer to C:\system\recogs with the name that has the same first four letters as worm's executable. If the phone has a memory card the worm will also copy itself there. To summarize, here is a list of all files created in one installation using example filenames.
Files created on the phone:
• C:\system\data\qsnpwsg.exe
• C:\system\apps\qsnpwsg.exe
• C:\system\apps\qsnpwsg.sis
• C:\system\recogs\gsnp.mdl
The following file does not have a variable name:
• C:\system\data\SIMLanguage.dat
Files created on the memory card:
• E:\system\apps\qsnpwsg.exe
• E:\system\recogs\gsnp.mdl
Hiding and Protecting the Process from the User
Beselo.A attempts to hide its process from the user by running as executable, so that it is not visible in the standard application list. The process is visible in third party tools that show system processes. It is named with same random name as the worm's main executable.
The worm protects its process from being killed by setting the process type to "system". It is not possible to kill a system process.
Replication via MMS Messages
Beselo.A replicates using MMS with SIS files that have the text "Photo" as message body and a SIS file attachment named beauty.jpg, sex.mp3, or love.rm.
The MMS messages are sent to numbers found in the device phone book.
Replication via Bluetooth
Beselo.A replicates using Bluetooth in SIS files using the same name as the MMS messages. Bluetooth messages are attempt in one minute intervals to one phone number at a time.
The extension used in the worm installation file causes the message to be shown with an icon that indicates a broken media file.
Replication to an MMC Card
Beselo.A listens for any MMC cards inserted to the infected phone, and copies itself to inserted card. The infected card contains both the worm executable and the bootstrap component, so that if infected card is inserted into another phone it will also be infected.
Beselo.b details
Name : Worm:SymbOS/Beselo.B
Category : Malware
Type : Bluetooth-Worm
Platform : SymbOS
Origin : Asia
Date of Discovery: December 21, 2007
Beselo.B is an MMS and Bluetooth worm that operates on Symbian S60 Second Edition devices.
Beselo.B spreads via MMS messages and Bluetooth using the filenames beauty.jpg, sex.mp3, or love.rm
Infection
The worm's SIS installation package contains .exe, .ini, and .dat files named using a random format that has seven letters followed by the extension. For example, qsnpwsg.exe,qsnpwsg.ini, and qsnpwsg.dat.
When Beselo.B is run the installer will copy the worm's main executable to C:\system\data and execute. After execution the worm will copy its executable file to C:\system\apps with the same name as worm's main executable. Additionally, the worm creates a new unique SIS installation package to C:\systems\apps and recognizer to C:\system\recogs with the name that has the same first four letters as worm's executable. If the phone has a memory card the worm will also copy itself there. To summarize, here is a list of all files created in one installation using example filenames.
Files created on the phone:
• c:\system\data\qsnpwsg.exe
• c:\system\data\qsnpwsg.dat
• c:\system\data\qsnpwsg.ini
• c:\system\apps\qsnpwsg.exe
• c:\system\apps\qsnpwsg.sis
• c:\system\recogs\gsnp.mdl
Files created on the memory card:
• e:\system\apps\qsnpwsg.exe
• e:\system\recogs\gsnp.mdl
Hiding and Protecting the Process from the User
Beselo.B attempts to hide its process from the user by running as executable, so that it is not visible in the standard application list. The process is visible in third party tools that show system processes. It is named with same random name as the worm's main executable.
The worm protects its process from being killed by setting the process type to "system". It is not possible to kill a system process.
Replication via MMS Messages
Beselo.B replicates using MMS with SIS files that have the text "Photo" as message body and a SIS file attachment named beauty.jpg, sex.mp3, or love.rm.
The MMS messages are sent in 1 minute interval to either numbers found in the device phone book or else to internally generated numbers.
Beselo.B also listens for incoming SMS messages and responds to any message with an infected MMS message.
Replication via Bluetooth
Beselo.B replicates using Bluetooth in SIS files using the same name as the MMS messages. Bluetooth messages are attempt in one minute intervals to one phone number at a time.
The extension used in the worm installation file causes the message to be shown with an icon that indicates a broken media file.
Replication to an MMC Card
Beselo.B listens for any MMC cards inserted to the infected phone, and copies itself to inserted card. The infected card contains both the worm executable and the bootstrap component, so that if infected card is inserted into another phone it will also be infected.
free download beselo:
beselo.a.sis
beselo.a.exe
beselo.b.sis
beselo.b.exe
Anda baru saja membaca artikel yang berkategori old site /
virus inform.
dengan judul beselo.variant. Anda bisa bookmark halaman ini dengan URL https://virgo-spot.blogspot.com/2010/07/beselovariant.html. Terima kasih!
Ditulis oleh:
~VIRGO~ - Tuesday, July 20, 2010
Belum ada komentar untuk "beselo.variant"
Post a Comment