lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: dbounds at intrusense.com (Darren Bounds)
Subject: Re: [0day] Heads up: Possible lsass worm in the wild

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I believe that's actually a new AGOBOT variant. As far as I know it 
actually exploits the MS PCT vulnerability. It also modifies the HOSTS 
file to redirect AV vendor addresses to localhost.

Thanks,

Darren Bounds, CISSP

443D 628D 0AC7 CACF 6085
C0E0 B2FC 534B 3D9E 69AF

- --
Intrusense - Securing Business As Usual



On Apr 29, 2004, at 8:31 AM, morning_wood wrote:

> -= 0day - Freedom of Voice - Freedom of Choice =-
>
> dropped file: %SYSTEM%/msiwin84.exe
> remote process established to: lsass.exe
> remote ip:4.x.x.x
>
> note: file msiwin84.was not running
>
>
> this appears to be a "blaster" type of worm working on the first and / 
> or
> second subset of the infected host to begin scanning for more hosts.
> I have not completly unpacked the binary but here is some strings.
>
> ------------------ snip --------------
> DnsFlushResolve
> {ache.dapi.dllVQUIT RIVMSG %s : screw you KGGo home  cCmd.Net, +MODEW 
> ]m715
> 522947
> 6660M USERHOST/@ JOINFL :YnASSo DCC \ND " o:.bmp"Jd Error: fix>ipS 
> enc<5n  clos
> *+h2(P/ t,O cu.g ACHO=Ds NEU(fkbit/s)  tal!x f@..._  IP addrvs3
>
> ------------------ snip ---------------
>
> based on the above, the worm / viri tries to connect to a IRC server.
>
> anyone else experiencing this?
>
>
> morning_wood
> http://exploitlabs.com
>
>
>
>
>
>
>
>
>
>
> _______________________________________________
> 0day mailing list
> 0day@...hackers.org
> http://nothackers.org/mailman/listinfo/0day
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (Darwin)

iD8DBQFAkQUWsvxTSz2eaa8RAiM4AKC9WqFOz2fryj6x0rtr+xXfm1QSCwCfcN/R
hyHgPFkDfqvUw/F8eNr3TC0=
=5NIA
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ