| ||||||||||||||||
Worm.Tamiami v1.3
by DiA
See also the project folder ____________________________________________________________________________________________ \\ // // \\ \\ Tamiami Worm // // Version 1.3 \\ \\ coded by // // DiA \\ \\ Ready Rangers Liberation Front // // DiA_hates_machine@gmx.de - http://www.vx-dia.de.vu/ \\ \\ // //________________________________________________________________________________________\\ // Disclaimer I am not responsible for anything that you do with this source. So take care when you want to test this or parts of this code. If you don't know how to handle malware, please close this for your and others pleasure. // Intro Welcome to my best and biggest creation. It spreads via several ways, wich i describe here. Also it has some nice features, and still more to come. When you look at the source code, you will see that some functions are not used. Thats because i decided that simpler is better for this worm. As example the autostart function, in the first version of Tamiami it was able to infect an autostart application. But now it has a tool included that make termination of the worm harder, but read later about it. I am sure I will make some more versions of the worm, because I have still much ideas. // HTTP Server The worm has it's own HTTP server, that can provide a website at the infected computer. The HTTP server is used for mail spreading via a spoofed link, and spreading via IRC and mIRC. Read on for that. // Website creator Yes, thats right, the worm creates a website on an infected computer. For that it get's three pictures from user's "My Pictures" folder. It then creates HTML code that contain the pictures, sublinks to enlarge it, and a link to the worm binary, tarned as an selfextracting archive, containing more pictures. // Mail spreading via spoofed link The worm has now only mail spreading via simple MAPI (SMTP version in progress). The worm send's a mail with the spoofed link to an infecting computer (where the website is) to all mail addresses that can be found in the inbox of Outlook. // Spoofed link Tamiami send's only spoofed links (Mail, IRC, mIRC). The IP of the infected machine is spoofed by the http://user:pass@IP(in %hex) formation. // Mail spreading via attachment If mail spreading via spoofed link failed (eg can't run HTTP server), the worm send's mails to all addresses in inbox of Outlook with a binary of the worm attached. // Disabling MAPI warning For sending mail's without a warning by Outlook the worm disables it via an entry in the registry. // Extract mail addresses The worm read's mail addresses from the Outlook inbox and store the addresses as files in a folder. Why that? If you do it via files, you have no victim address twice, and invalid file names mean invalid mail addresses. // Two languages The worm is able to spread via two languages, german if system is a german one, otherwise english. Spreads via two languages in mail spreading, zip & rar spreading, also it creates website and spoofed links in two languages. // Autostart As I sayed in the intro, the worm has a simple autostart, via a entry in the registry. Other functions for autostart can be found in the documentation. // Creating a mutex To not run twice the worm creates a mutex. Before it do it's action it checks if the mutex already exist, if so the worm terminate it's process, because it already run. // Update Tamiami The worm is able to update itself, if a newer version come to system, and an older already exist, the worm update itself on it. // Disabling XP firewall The firewall that comes with XP SP2 will be disabled by the worm, via an entry in the registry. // Drive spreading The worm checks every drive from B:\ to Z:\ if it's a remote drive (fixed share). If so it copy's the worm binary with a random name. // RAR & ZIP worm Tamiami search on all fixed drives (remote or local) for all ZIP and RAR archives. If it found one, the worm add's itself with an random name to the archive. // IRC spreading Tamiami connects to 6 of the biggest IRC server and join channels with much people inside and idle there. It recocnize when a user join a channel, and then it send's a private message with a spoofed link to the infected PC and it's website. If worm get's kicked or banned it joins a new channel and spreads there. // mIRC spreading When mIRC is running the worm loads a script dynamicly into mIRC. The script spread the worm binary via DCC when someone join a channel. // IRC backdoor Inside the worm there is also an IRC backdoor, not for criminal intend, but maybe to clean infected machines if this worm is outbreak. The bot only have raw, quit, version and download and execute commands. // DOC infection The worm drop's a .vbs file that insert code in Word's Normal.dot template, that code infects every opened .doc file with a small dropper code and the worm binary. // Take car for me To avoid termination, the worm drop's my tool "TakeCareOnMe" to disk, and execute it with the worm path as parameter. That way, it restart's Tamiami when it got's terminated. // Payload The payload activte on September 17 every year. Then it prints random text with random color and random position to the screen. The loop is infinite, so very annoying. And if worm is terminated, it get restarted by TakeCareOnMe. // Outro Hope that "read me" covers all features of the worm, to get an closer look you can look at the big documentation "_Ver_Inc_Docu.h". I am sure in near or far future you will see a newer version of this worm. So long, have fun with this code. DiA/RRLF - 16.06.2006 |