File infectors aren't as common as other types of malicious programs, so Win32.Sector, which is being used by attackers to create an extensive botnet, is attracting particular interest among security researchers. Doctor Web's analysts have examined this malicious program and were able to assess the scale of the infection.
Known to analysts since 2008, Win32.Sector is a complex polymorphic malicious program that can spread on its own (without user intervention) and infect files.
Its main function is to download various executables via P2P networks and run them on infected machines. This malicious program can inject its code into running processes, terminate certain anti-viruses and block access to the sites of their respective developers.
Win32.Sector can infect files on local and removable disks (in the latter case, it can create the file autorun.inf on removable media) as well as in shared network folders. At present, there are several Win32.Sector modifications, each with a different P2P network communication protocol and different structural features.
By design, Win32.Sector has no control servers; instead it connects with other bots running on infected machines. It determines whether the computer has an external IP address or connects to a network that uses NAT. When launched on an infected computer, Win32.Sector uses an initial list of IP addresses to connect to other bots. If successful, the file infector executes the following commands:
- Use a download link to request a configuration file via UDP.
- Request plugins (via TCP).
- Check for NAT; if unavailable, the bot receives a unique identification number ID (via UDP).
- Obtain the IP address of another infected machine to establish a connection (via UDP).
The third command makes the program operate as a router to which other bots (those operating in networks that use NAT and, therefore, have no external IP addresses of their own) connect. The fourth directive enables the file infector to acquire lists of IP addresses from other bots. Doctor Web's security researchers used these two commands to determine the number of infected hosts connected to the botnet and to assess the scale of the infection.
As of May 20, 2014, the Win32.Sector botnet was comprised of 1,197,739 unique bots, 109,783 of which had external IP addresses and could operate routers for other infected hosts. The growth of the botnet can be traced in the graph below:
On average, about 60,000 infected computers interacted over the botnet on a daily basis. A Win32.Sector botnet activity graph is presented below:
From a geographical standpoint, the largest number of hosts infected with Win32.Sector are found in —212,401. ranked second (108,770), and ranked third (106,249). In , 15,600 infected computers were identified. Win32.Sector’sgeographical spread by country is shown in the illustration below:
Currently several malicious programs are being spread via the Win32.Sector botnet:
- Trojan.PWS.Stealer.1630which steals passwords and other confidential information;
- Trojan.Mssmsgs.4048 — a spam plugin;
- Trojan.DownLoader8.17844 which operates as an http and socks5 proxy;
- Trojan.DownLoader10.49375 which operates as an http and socks5 proxy;
- Trojan.Siggen6.11882 which establishes DNS tunnels (53 udp port) and TCP tunnels (port 80);
- Trojan.Rbrute which gains access to Wi-Fi routers;
- Trojan.Proxy.26841 which establishes a tunnel to transmit http traffic to specified nodes.
All of these threats, including Win32.Sector, are successfully detected and removed by the Dr.Web antivirus, so they pose no threat to computers protected by Doctor Web's software. The company's security researchers will continue to monitor further developments.
Doctor Web is the Russian developer of Dr.Web anti-virus software. We have been developing our products since 1992. The company is a key player on the Russian market for software that meets the fundamental need of any business — information security. Doctor Web is one of the few anti-virus vendors in the world to have its own technologies to detect and cure malware. Our anti-virus protection system allows the information systems of our customers to be protected from any threats, even those still unknown. Doctor Web was the first company to offer an anti-virus as a service and, to this day, is still the undisputed Russian market leader in Internet security services for service providers. Doctor Web has received state certificates and awards; our satisfied customers spanning the globe are clear evidence of the high quality of the products created by our talented Russian programmers.
Follow us on Facebook and Twitter.
Doctor Web is the Russian developer of Dr.Web anti-virus software. We have been developing our products since 1992. The company is a key player on the Russian market for software that meets the fundamental need of any business — information security. Doctor Web is one of the few anti-virus vendors in the world to have its own technologies to detect and cure malware. Our anti-virus protection system allows the information systems of our customers to be protected from any threats, even those still unknown. Doctor Web was the first company to offer an anti-virus as a service and, to this day, is still the undisputed Russian market leader in Internet security services for service providers. Doctor Web has received state certificates and awards; our satisfied customers spanning the globe are clear evidence of the high quality of the products created by our talented Russian programmers.
Follow us on Facebook and Twitter.