Bondat worm repeat offender, 360 safe brain accurate spike

Apr 3, 2019kate
Learn more about 360 Total Security

360 Safe brain recently detected a highly confusing Bondad worm that has been spread using USB devices since September 2018. After infecting the user’s machine, it will open a hidden mine with the default browser each time it is turned on. The script’s website page uses the user’s machine for mining. The infection curve of the virus is shown in the following figure:

The infection curve of the virus

Technical Analysis

Code obfuscation

The Bondad worm that was intercepted this time was written in JavaScript, and the same code obfuscation technique was used to evade anti-virus software. The related obfuscated code is shown below:

The related obfuscated code

The code after the confusion is very readable, and the virus first tries to end the process of the following antivirus software:

the virus first tries to end the process of the antivirus software

Infection

The Bondat worm will query the USB device connected to the current computer through the WMI interface, copy the virus js script to the USBDevice\\Files\\{Random num}\\ directory, and generate Files.bat in the root directory of the U disk. The batch script Will run the js script, then back up all the files in the root directory of the U disk to the Files directory, and generate the shortcut of the original directory name + “.lnk” in the root directory, the shortcut points to the Files.bat batch script, due to The generated shortcut icon is tempting, and it is easy to trick users into clicking to achieve virus self-starting. Related virus code, as shown below:Related virus code

The infected U disk device, as shown below:The infected U disk device

When the user clicks on the above icon, the virus code will be activated again, infect the new machine connected to the USB device, copy the js virus code to the directory consisting of %AppData%\\Roaming\\{random name}, and at %StartUp The %. directory generates a shortcut start.lnk to enable the js script to start self-starting, generate a user.lnk shortcut, and open the website embedded with the mining script when booting. The code logic is as follows:

The code logic

The startup directory after being infected, as shown below:The startup directory after being infected

When the computer is started, user.lnk will open the Trojan website that carries the mining script using the default browser:user.lnk opens the Trojan website

Until press time, on virustotal.com, only four anti-virus software engines, including 360, can identify the mining script:

 four anti-virus software engines, including 360, can identify the mining script

Security Advice

The Bondat worm will spread through the USB flash drive. 360 Total Security‘s “U disk security protection” function can detect and process various worms immediately after the USB disk is inserted into the machine, and help repair the folders hidden by the virus. Users are advised to go to http://www.360totalsecurity.com/ to download and use.

360 Total Security‘s "U disk security protection" function can detect and process various worms immediately

Learn more about 360 Total Security