[<prev] [next>] [day] [month] [year] [list]
Message-ID: <9E97F0997FB84D42B221B9FB203EFA270DC973@dc1ms2.msad.brookshires.net>
From: toddtowles at brookshires.com (Todd Towles)
Subject: Microsoft Update Loader msrtwd.exe
So rename it to a txt file. Just let everyone know. Or zip it maybe.
-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com] On Behalf Of S.A. Birl
Sent: Thursday, September 02, 2004 9:17 AM
To: full-disclosure@...ts.netsys.com
Subject: Re: [Full-Disclosure] Microsoft Update Loader msrtwd.exe
(Un)Fortunately, I am not allowed to distribue the exe.
Does anyone know how it infects?
On Sep 1, Harlan Carvey (nospam-keydet89@...oo.com.ns) typed:
FD: Where in the Registry did you find it? Which key(s)?
FD: What about this makes you think it's a Trojan? Did
FD: you run fport/openports and find it listening on a
FD: port? Where does the Registry entry point to within
FD: the file system? Since the file is an .exe file, did
FD: you check it for version information?
FD:
FD: Since filenames are the easiest thing about a file to
FD: change, is there any information other than simply the
FD: name that you can provide?
There were about 6 Registry enties in the HKLM section. I dont have the
compromised machine, so I cannot tell you the exact locations.
We ran TCPview on the compromised machine and watched it connect to an
IRC server.
On Sep 1, Todd Towles (nospam-toddtowles@...okshires.com.ns) typed:
FD: I see one other post about it here..
FD:
FD: http://www.dslreports.com/forum/remark,10987569~mode=flat
FD:
FD: Sounds like malware to me. Did you send copies to any AV compines?
That URL is the same one I came across yesterday via Google.
A copy of it has been sent to Symantec.
On Sep 1, Joe Stewart <nospam-jstewart@...hq.com.ns> typed:
FD: We saw an Rbot variant spreading on August 23 with the same exe
FD: name. I've also seen other Rbot variants using a similar registry
FD: key name. Kaspersky does a pretty good job of spotting unknown
Rbot
FD: variants with a generic signature "Backdoor.Rbot.gen".
FD:
FD: -Joe
http://virusscan.jotti.dhs.org/ lists msrtwd.exe as backdoor.sdbot.gen
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html
Powered by blists - more mailing lists