[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <41C299D5.5040905@elforsoft.com>
From: raoul at elforsoft.com (Raoul Nakhmanson-Kulish)
Subject: KIT.GED
Hello, all!
On one of our IIS servers (W2K fully patched, IIS Lockdown tool is
installed) I have found in WWW root directory a file named KIT.GED and
having size 834552 bytes.
This is a RAR-packed self-executable containing these files:
01.03.2004 18:16 10240 caclsENG.exe
18.01.2004 19:33 53760 carun.dll
24.06.2004 00:58 8609 carun.ocx
19.02.2004 01:15 498 change.txt
24.06.2004 00:59 11780 chkdrv.vxd
24.06.2004 01:06 24646 install.cmd
01.03.2004 16:33 356 logoff.txt
01.03.2004 16:32 1234 logon.txt
16.03.2004 02:34 5119 settimedate.exe
23.06.2004 23:02 800256 tskman.exe
Seems that this is a backdoor kit. Fortunately, it wasn't installed on
this webserver and on any server in our network
But how can somebody put this file in WWW root? What should we do to
prevent it for future?
Of course, I'll send this file or any listed above if required.
--
Best regards,
Raoul Nakhmanson-Kulish
Elfor Soft Ltd.,
ERP Department
http://www.elforsoft.ru/
Powered by blists - more mailing lists