Home / malwarePDF  

Worm:iPhoneOS/Ikee.C


First posted on 03 December 2009.
Source: SecurityHome

Aliases :

There are no other names known for Worm:iPhoneOS/Ikee.C.

Explanation :

Worm:iPhoneOS/Ikee.C is a worm that uses the default root password in SSH in order to spread among jail-broken iPhones. The worm also changes the affected machine's background image.
Top

Worm:iPhoneOS/Ikee.C is a worm that uses the default root password in SSH in order to spread among jail-broken iPhones. The worm also changes the affected machine's background image.

Installation
When run on an iPhone, this worm takes the following actions:

  • Attempts to set a file lock at /var/lock/bbot.lock in order to verify that only one copy of the worm runs at a time.
  • Attempts to copy the file /var/log/youcanbeclosertogod.jpg to /var/mobile/Library/LockBackground.jpg
  • Removes the /usr/sbin/sshd directory and stops the SSH daemon.
  • Attempts to spread using several hard-coded IP ranges.
  • When the worm infects a remote host, it does so by copying /bin/poc-bbot, /bin/sshpass and /var/log/youcanbeclosertogod.jpg from the local system to the remote system. It also copies /var/log/youcanbeclosertogod.jpg to /var/mobil/Library/LockBackground.jpg on the remote system. The file /System/Library/LaunchDaemons/com.ikey.bbot.plist is also copied to the remote system and the following command is run: "launchctl load /System/Library/LaunchDaemons/com.ikey.bbot.plist" This command is used to load the worm remotely, and to add it to startup on reboot on the remote machine. The worm then remotely stops the SSH daemon and deletes the automatic start on reboot option for the SSH service.

    Analysis by Dan Kurc

    Last update 03 December 2009

     

    TOP