Virus Profile: W32/

Threat Search
Virus Profile information details
Risk Assessment: Home Low | Corporate Low
Date Discovered: 12/10/2004
Date Added: 12/10/2004
Origin: Unknown
Length: Varies
Type: Virus
Subtype: E-mail worm
DAT Required: 4414
Removal Instructions


This is a virus detection. Viruses are programs that self-replicate recursively, meaning that infected systems spread the virus to other systems, which then propagate the virus further. While many viruses contain a destructive payload, it's quite common for viruses to do nothing more than spread from one system to another.

Indication of Infection

  • Port 2745 (TCP) open on the victim machine
  • Outgoing messages matching the described characteristics
  • Files/Registry keys as described
  • Methods of Infection

    Mail Propagation

    This virus constructs messages using its own SMTP engine. Target email addresses are harvested from files with the following extensions on the victim machine:

    • .adb
    • .asp
    • .cfg
    • .dbx
    • .eml
    • .htm
    • .mdx
    • .mmf
    • .nch
    • .ods
    • .php
    • .pl
    • .sht
    • .tbb
    • .txt
    • .wab
    • .xml

    The virus spoofs the sender address by using a harvested address in the From: field.

    The virus avoids sending itself to addresses containing the following:

    • @avp.
    • @microsoft
    • local
    • noreply
    • postmaster@
    • root@

    Remote Access Component

    The virus listens on TCP port 2745 for remote connections. It attempts to notify the author that the infected system is ready to accept commands, by contacting various websites, calling a PHP script on the remote sites. At the time of this writing this script is inaccessible. The websites are contacted every 27.8 hours.

    The format of the HTTP packets sent to the above websites is :-

    GET /scr.php?p=2745 HTTP/1.1

    Peer To Peer Propagation

    Files are created in folders that contain the phrase shar :

    • ACDSee 9.exe
    • Adobe Photoshop 9 full.exe
    • Ahead Nero 7.exe
    • Matrix 3 Revolution English Subtitles.exe
    • Microsoft Office 2003 Crack, Working!.exe
    • Microsoft Office XP working Crack, Keygen.exe
    • Microsoft Windows XP, WinXP Crack, working Keygen.exe
    • Opera 8 New!.exe
    • Porno pics arhive, xxx.exe
    • Porno Screensaver.scr
    • Porno, sex, oral, anal cool, awesome!!.exe
    • Serials.txt.exe
    • WinAmp 5 Pro Keygen Crack Update.exe
    • WinAmp 6 New!.exe
    • Windown Longhorn Beta Leak.exe
    • Windows Sourcecode update.doc.exe
    • XXX hardcore images.exe


    I-Worm.Bagle.g (KAV), W32.Beagle.H@mm (Symantec), Win32/Bagle.H.Worm (CA)

    Virus Characteristics

    This new variant is W32/Bagle.h@MM repackaged using PEX. The virus arrives by email in a password protected zip file.

    Proactive detection:

    This new variant is proactively detected as W32/Bagle.h.dam using DATs 4331 or greater with 4.3.20 engine (or higher) once extracted from within the password protected ZIP files. Additionally, McAfee email scanning products such as WebShield and GroupShield, as well as the email-scanner plugin within the desktop product will detect the password-protected files generated by this virus as W32/Bagle.gen!pwdzip from the 4345 DATs or greater.

    Upon execution the virus copies itself into the Windows System directory as I11R54N4.EXE.

    For example:

    C:\WINNT\SYSTEM32\i11r54n4.exe (21,318;bytes)

    • The following Registry key is added to hook system startup:

      • HKEY_CURRENT_USER\Software\Microsoft\Windows\
        "rate.exe" = C:\WINNT\SYSTEM32\i11r54n4.exe
    • The following Registry key is also added:

      • HKEY_CURRENT_USER\Software\Winexe "open"

    • It also creates other files in the Windows Systemdirectory to perform its functions:

      • go154o.exe (19,968 bytes) - DLL to perform mailing
      • i1i5n1j4.exe (1,536 bytes) - DLL loader
      • i11r54n4.exeopen (20,774 bytes) -ZIP file, that is sent via email
    • Like its predecessors, this worm checks the system date. If it is the 25th March 2005 or later, the worm simply exits and does not propagate.
    • The worm uses the following icon, to make it appear that the file is a folder:
    • The worm opens port 2745 (TCP) on the victim machine
    • It copies itself to folders that have the phrase shar in the name (such as common peer-to-peer applications; KaZaa, Bearshare, Limewire, etc). It does not spread by mapped drives.

    Mail Propagation

    Messages are constructed as follows:

    From : (address is spoofed)
    Subject :

  • ^_^ meay-meay!
  • ^_^ mew-mew (-:
  • Weah, hello! :-)
  • Weeeeee! ;)))
  • Hi! :-)
  • ello! =))
  • Hey, ya! =))

    Body Text:

  • Hey, dude, it's me ^_^ :P
  • Argh, i don't like the plaintext :)
  • You have won!!!
  • The access is open !!!

    Attachment: password-protected ZIP archive. File within ZIP has random name. The password is included in the message body:

  • archive password: %password%
  • password: %password%
  • pass: %password%
  • password - - %password %
  • %password % - - archive password
  • ... btw, %password% is a password for archive
  • password for archive %password%

    All Users :
    Use specified
    engine and DAT files for detection and removal.

    Modifications made to the system Registry and/or INI files for the purposes of hooking system startup will be successfully removed if cleaning with the recommended engine and DAT combination (or higher).

    Additional Windows ME/XP removal considerations

    Manual Removal Instructions
    To remove this virus "by hand", follow these steps:

    1. Reboot the system into Safe Mode (hit the F8 key as soon as the Starting Windows text is displayed, choose Safe Mode.
    2. Delete the files following from your WINDOWS System directory (typically C:\Windows\System or C:\Winnt\System32)
    3. Edit the registry
      • Delete the "rate.exe" value from
        • HKEY_CURRENT_USER\Software\Microsoft\
      • Delete the following key for W32/Bagle.h@MM:
        • HKEY_CURRENT_USER\Software\Winexe
    4. Reboot the system into Default Mode

    McAfee Desktop Firewall
    To prevent possible remote access McAfee Desktop Firewall users can block incoming TCP port 2745.


    PC Infected? Get Expert Help

    Virus Removal Service

    Connect to one of our Security Experts by phone. Have your PC fixed remotely - while you watch!