RE: CodeBlue finally hitting, or what?

From: Becky Pinkard (Becky.Pinkardat_private)
Date: Tue Sep 18 2001 - 15:29:22 PDT

  • Next message: Bernie Cosell: "Re: New "concept" virus/worm?"

    Got this from NTBugTraq, if it will help you:
    
    -------- Original Message --------
    From: Russ <Russ.Cooperat_private>
    Subject: Updated mitigators and cleansing of Nimda
    To: NTBUGTRAQat_private
    
    -----BEGIN PGP SIGNED MESSAGE-----
    
    Infection vectors;
    - -----------------
    a) Email as an attachment of MIME audio/x-wav type.
    b) By browsing an infected webserver with Javascript execution
    enabled and using a version of IE vulnerable to the exploits
    discussed in MS01-020 (e.g. IE 5.0 or IE 5.01 without SP2).
    c) Machine to machine in the form of IIS attacks (primarily
    attempting to exploit vulnerabilities created by the effects of Code
    Red II, but also vulnerabilities previously patched by MS00-078)
    d) Highlighting either a .eml or .nws in Explorer with Active Desktop
    enabled (W2K/ME/W98 by default) then the THUMBVW.DLL will execute the
    file and attempt to download the README.EXE referenced in it
    (depending on your IE version and zone settings).
    e) Mapped drives. Any infected machine which has mapped network
    drives will likely infect all of the files on the mapped drive and
    its subdirectories
    
    To prevent yourself from being infected;
    
    a) Ensure all IE versions have applied MS01-027 (or are IE 5.01SP2 or
    above)
    
    b) Disable Active Scripting in IE
    
    c) Ensure all IIS installations have applied MS01-044 (or at the very
    least MS01-033)
    
    d) Use the CALCS program to modify the permissions on TFTP.EXE to
    remove all use;
    
    CALCS %systemroot%/system32/tftp.exe /D Everyone
    CALCS %systemroot%/system32/tftp.exe /D System
    
    Do the same for CMD.EXE
    (note, this could be tried with THUMBVM.DLL as well, haven't tried
    this myself yet)
    
    e) Ensure that TFTP is not permitted out through your network gateway
    (note that newly infected machines may try and TFTP *internally* from
    some other infected machine you have on your network)
    
    f) Modify or remove;
    
    HKEY_CLASSES_ROOT\.eml
    HKEY_CLASSES_ROOT\.nws
    
    Cleansing information;
    - ---------------------
    
    Nimda is viral, so while you can remove various files that it drops
    it probably will not be cleaned completely by manual means. This
    means you will have to use your AntiVirus vendor's product to
    completely cleans.
    
    a) Load.exe dropped as hidden/system file (probably in %systemroot%)
    b) Riched20.dll dropped with today's date as hidden/system file.
    c) Readme.exe dropped in every directory
    d) Admin.dll dropped in /scripts and/or root directories (not the
    _vti_bin directories of FrontPage)
    e) .eml and .nws files dropped in every directory
    f) Possibly modified your default home page in web dirs.
    g) Infected numerous files (if not all files) with the 56kb
    executable.
    h) Reports of people having files lumped together into .eml files
    
    Check with your AV Vendor regularly for updates to the cleansing
    programs. I would appreciate any reports from AV Vendors as to how
    complete they feel their cleaners currently are. I will do an update
    later tonight based on responses.
    
    Cheers,
    Russ - Surgeon General of TruSecure Corporation/NTBugtraq Editor
    
    
    -----BEGIN PGP SIGNATURE-----
    Version: PGP Personal Privacy 6.5.2
    
    iQCVAwUBO6fIYRBh2Kw/l7p5AQE/ugQAx8+paBZ9jdt5ikstAU9QNHRYfhdDzQ55
    1n03W3lH9vEgl2uFZ1NooASAAC1zsO/yeKJcftvjHWosBdXVNNYV3RcRgZ63hvdY
    7DlgfuYpBXOPQHCBuQuh0yPOBUbtMJjnEX+d/8opifv18VPbCEWUg8NV5OiFIlEi
    6NOlaobfFR4=
    =U1y0
    -----END PGP SIGNATURE-----
    
    
    
    -----Original Message-----
    From: Nicholas Janzen [mailto:nj@third-net.com]
    Sent: Tuesday, September 18, 2001 5:29 PM
    To: Tracey Losco
    Cc: Portnoy, Gary; incidentsat_private;
    'intrusionsat_private'; securityat_private
    Subject: Re: CodeBlue finally hitting, or what?
    
    
    I have gotten very simular things, they haven't hit any of the patched
    systems (patched with Q295534i)
    
    But i am currently trying to remove the virus. If anyone knows how to
    remove this virus, i would appreciate it if you would send info on how to
    remove it.
    <snip>
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Tue Sep 18 2001 - 16:34:46 PDT