JS_FBOOK.VTG

 Analysis by: Cris Nowell Pantanilla

 ALIASES:

Net-Worm.JS.Koobface.f [Kaspersky] JS/Redirector [McAffee]

 PLATFORM:

Windows 2000, Windows XP, Windows Server 2003

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted: No

  • In the wild: Yes

  OVERVIEW

This JavaScript sends URLs to online contacts via chat or post on friend's walls once a user's account is compromised.

The user is then redirected to certain malicious URLs.

The user is also forced to answer the survey to watch the fake video. However, the survey is really an advertisement.

  TECHNICAL DETAILS

File Size:

11,124 bytes

File Type:

JS

Initial Samples Received Date:

04 May 2011

Payload:

Connects to URLs/IPs

Arrival Details

This Trojan may be downloaded from the following remote site(s):

  • http://208.110.85.172/bl.js

Other Details

This Trojan does the following:

  • It is capable of following in the affected user's Facebook account:
  • Post links to friends walls
  • Send url to online friends via Chat
  • Subscribe as a Fan for MW Gift and MW Giveaway

NOTES:

Once the user's account is compromised, the following links are sent to online contacts via chat or post on friend's walls:

  • http://{BLOCKED}w.ly/4LNpd
  • http://{BLOCKED}ly.ws/zyaeom
  • http://{BLOCKED}ly.ws/e4lqeg
  • http://{BLOCKED}ly.ws/y2ls36

The user is then redirected to any of the following sites:

  • http://{BLOCKED}.{BLOCKED}.167.195/end.php
  • http://{BLOCKED}.{BLOCKED}.246.232/end.php
  • http://{BLOCKED}.{BLOCKED}.165.27/end.php
  • http://{BLOCKED}.{BLOCKED}.214.230/end.php

The following page is displayed on the said site:

The user is then forced to answer the survey to watch the fake video. However, the survey is really an advertisement such as following:

  SOLUTION

Minimum Scan Engine:

8.900

VSAPI OPR PATTERN File:

8.137.00

VSAPI OPR PATTERN Date:

04 May 2011

Scan your computer with your Trend Micro product to delete files detected as JS_FBOOK.VTG. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.


Did this description help? Tell us how we did.