W32/Frethem Malicious CodeRelease Date: July 17, 2002
- Systems running Microsoft Windows
The CERT/CC has received a number of reports of malicious code known as W32/Frethem. It affects systems running Microsoft Windows with unpatched versions of Internet Explorer and mail clients that use IE's HTML rendering engine (including Outlook and Outlook Express). Patched systems (or systems that do not use IE's HTML rendering engine for mail) may also be affected if a user manually executes the malicious code. A number of variants of this code have been identified.
I. DescriptionW32/Frethem is a malicious Windows program with an internal SMTP mail delivery agent. W32/Frethem arrives as an email message containing three MIME parts (multipart/alternative; boundary=L1db82sd319dm2ns0f4383dhG) with the subject "Re: Your password!" The body of the message is contained in the first MIME part and includes a specially crafted IFRAME tag that will cause the malicious attachment to be executed when this part is rendered in a vulnerable mail user agent (as described below). The body also contains the following text:
You can access
DO NOT SAVE
password to disk
use your mind
The next two MIME parts are the attachments, decrypt-password.exe and password.txt. In samples received by the
CERT/CC, the password.txt file contains
the text "Your password is W8dqwq8q918213", but it does not contain any
executable code. The malicious code is contained in the decrypt-password.exe file. We have
received variants of decrypt-password.exe with the following MD5
In the variants we have received, decrypt-password.exe appears as an attachment flagged as a MIME content type audio/x-midi, which allows W32/Frethem to exploit the vulnerability described in VU#980499 and run automatically if the message is viewed on a vulnerable system. Even if the system has been patched for this vulnerability, a user can still trigger infection by opening the attachment directly.
When decrypt-password.exe is run, it creates the IEXPLORE_MUTEX_AABBCCDDEEFF mutex to ensure that only one copy will run at a time. It also gathers the current user's default SMTP server, email address, and display name from the registry keys located at
- HKCU\Software\Microsoft\Internet Account Manager\Accounts\00000001
W32/Frethem attempts to install itself locally so it will run again whenever Windows restarts. In some variants, it does this by placing a copy of itself in the Start Menu\Programs\Startup folder as setup.exe. A more recent variant accomplishes this by copying itself to %WinDir%/taskbar.exe and adding a registry key named 'Task Bar' to
As with other malicious code having mass-mailing capabilities, W32/Frethem may cause denial-of-service conditions in networks where either (a) multiple systems are infected, or (b) large volumes of infected mail are received.
Update Internet Explorer
Users are encouraged to install the patches detailed in MS01-020. (Note: MS01-020 has been superseded by MS02-023, so users should consider installing the appropriate patches from MS02-023 if possible) Microsoft has published additional recommendations for protecting against W32/Frethem at
Run and maintain an anti-virus product
It is important for users to update their anti-virus software. Most anti-virus software vendors have released updated information, tools, or virus databases to help detect and recover from W32/Frethem. A list of vendor-specific anti-virus information can be found in Appendix A.
Many anti-virus packages support automatic updates of virus definitions. We recommend using these automatic updates when available.
Exercise caution when opening attachments
Exercise caution when receiving email with attachments. Users should be suspicious of unexpected attachments, regardless of their origin. In general, users should also always scan files received through email with an anti-virus product.
The following section of the "Home Network Security" document provides advice on handling email attachments securely:
Filter the email or use a firewall
Appendix A. - Vendor Information
Aladdin Knowledge Systems
Central Command, Inc.
Command Software Systems
Norman Data Defense Systems
You may wish to visit the CERT/CC's Computer Virus Resources Page located at:
Author(s): Kevin Houle and Allen D. Householder
Copyright 2002 Carnegie Mellon University.