[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <41B1FD84D49E05448A4233378E6BF47501F4A769@entmsgnt03.fm.frd.fmlh.edu>
From: jheidtke at fmlh.edu (Jerry Heidtke)
Subject: [UPDATE] ping floods
It may be a new worm/virus. See the symptoms below.
Jerry
http://vil.nai.com/vil/content/v_100559.htm
Virus Characteristics:
This detection is for another virus that exploits the the MS03-026
vulnerability.
It is not related to the W32/Lovsan.worm.d variant described here.
The virus is detected by the current Daily DATs as Exploit-DcomRpc virus
(with scanning of compressed files enabled).
Preliminary Analysis
Initial analysis shows the virus to install within a WINS directory
which is created in the Windows System directory:
C:\WINNT\SYSTEM32\WINS\DLLHOST.EXE (10,240 bytes)
Strings within the virus suggest it copies the TCP/IP trivial file
transfer daemon (TFTPD.EXE) binary from the dllcache on the victim
machine to this directory also, renaming it:
C:\WINNT\SYSTEM32\WINS\SVCHOST.EXE
The following services are installed:
RpcPatch Set to run the installed copy of the worm (DLLHOST.EXE)
Display name: "WINS Client"
RpcTftpd Set to run the copy of the TFTPD application (SVCHOST.EXE)
Display name: Network Connections Sharing
Analysis is currently ongoing - description will be updated once
complete.
Top of Page
Symptoms
large volumes of ICMP traffic in network
existence of the files and Windows services detailed above
Jerry
-----Original Message-----
From: Abraham, Antony (Cognizant) [mailto:Antony@....cognizant.com]
Sent: Monday, August 18, 2003 9:18 AM
To: B3r3n@...osnet.com; full-disclosure@...ts.netsys.com
Cc: Frank.Ederveen@...on-europe.com
Subject: RE: [Full-Disclosure] [UPDATE] ping floods
Hi,
We do have the same problem. Incidents.org has recorded the same
(http://isc.incidents.org/) but not much detail available.
Thanks,
Antony Abraham
-----Original Message-----
From: B3r3n@...osnet.com [mailto:B3r3n@...osnet.com]
Sent: Monday, August 18, 2003 6:59 PM
To: full-disclosure@...ts.netsys.com
Cc: Frank.Ederveen@...on-europe.com
Subject: [Full-Disclosure] [UPDATE] ping floods
Frank,
Yes, exactly, our ICMP requests are also detected as Cyber kit 2.2
Seems we share the same problem.
Some others too?
Brgrds
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Confidentiality Notice: This e-mail message, including any attachments,
is for the sole use of the intended recipient(s) and may contain
confidential and privileged information. Any unauthorized review, use,
disclosure or distribution is prohibited. If you are not the intended
recipient, please contact the sender by reply e-mail and destroy all
copies of the original message.
Powered by blists - more mailing lists