[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <b7bc1b1f04121800203290e886@mail.gmail.com>
From: uberguidoz at gmail.com (GuidoZ)
Subject: KIT.GED
Hello Raoul!
It might of been due to something ELSE running on your server. What
other services/ports are open? (SSH, Telnet, SMTP, VNC, etc) It's
possible another protocol or service was exploited, allowing access.
(Then might of just upped the kit for later retrieval from a malware
infection or something.)
Leaving it up there, then monitoring the traffic to it could prove to
be useful. I'd also highly advise looking through log files and the
event viewer for anything out of the ordinary, or related whatsoever.
Judging from the files contained in the kit, it looks like they were
preparing to cover their tracks if necessary.
If you'd like to send a copy of it my way, I'd be happy to peek at it
and see if anything else becomes obvious. You may send it to my virus
catch all - guidoz _AT guidoz _DOT_ com (Make the subject meaningful,
like "Rootkit from FD as requested" or something. Otherwise I'll skip
right over it thinking it's spam.) Will email you directly with any
results.
--
Peace. ~G
On Fri, 17 Dec 2004 11:33:25 +0300, Raoul Nakhmanson-Kulish
<raoul@...orsoft.com> wrote:
> Hello, all!
>
> On one of our IIS servers (W2K fully patched, IIS Lockdown tool is
> installed) I have found in WWW root directory a file named KIT.GED and
> having size 834552 bytes.
>
> This is a RAR-packed self-executable containing these files:
>
> 01.03.2004 18:16 10240 caclsENG.exe
> 18.01.2004 19:33 53760 carun.dll
> 24.06.2004 00:58 8609 carun.ocx
> 19.02.2004 01:15 498 change.txt
> 24.06.2004 00:59 11780 chkdrv.vxd
> 24.06.2004 01:06 24646 install.cmd
> 01.03.2004 16:33 356 logoff.txt
> 01.03.2004 16:32 1234 logon.txt
> 16.03.2004 02:34 5119 settimedate.exe
> 23.06.2004 23:02 800256 tskman.exe
>
> Seems that this is a backdoor kit. Fortunately, it wasn't installed on
> this webserver and on any server in our network
>
> But how can somebody put this file in WWW root? What should we do to
> prevent it for future?
>
> Of course, I'll send this file or any listed above if required.
>
> --
> Best regards,
> Raoul Nakhmanson-Kulish
> Elfor Soft Ltd.,
> ERP Department
> http://www.elforsoft.ru/
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
>
Powered by blists - more mailing lists