Re: Trojan? DDOS Bot?

From: Christopher Cramer (chris.cramerat_private)
Date: Tue Aug 27 2002 - 11:24:15 PDT

  • Next message: Bryan D. Payne: "Re: Anyone seen this?"

    welcome to the wonderful world of XDCC-type bots, see
    http://staff.washington.edu/dittrich/misc/ddos/unisog-xdcc.txt
    
    essentially, you were likely compromised by some other mechanism - we
    see weak passwords on administrator accounts and MS SQL issues quite
    often.  Once you were compromised, they installed an IRC bot which
    "shares" files using DCC.  Some variants of the bot take other commands
    or can pass arbitrary commands to the host computer.  We've seen several
    of these involved in DDoS attacks.
    
    Tools to help connect ports w/ processes are fport and vision both by
    FoundStone, and both available for download, I believe.  You *may* be
    able to clean up the machine using these, all though my strong
    recommendation would be an OS re-install.
    
    I hope this helps.
    
    -Chris
    
    Christopher E. Cramer, Ph.D.
    University Information Technology Security Officer
    Duke University,  Office of Information Technology
    253A North Building, Box 90132, Durham, NC  27708-0291
    PH: 919-660-7003  FAX: 919-660-7076  CELL: 919-210-0528
    PGP Public Key: http://www.duke.edu/~cramer/cramer.pgp
    
    
    On Tue, 2002-08-27 at 04:22, Janusat_private wrote:
    > 
    > 
    > I recogniced some weird connections from my box (w98)
    > to other computers. As soon as i connect to the
    > internet a connection from local port 1026 to port 6667
    > on 65.185.135.125 was established. I connected to that
    > server and it is an irc server (MusIRC Internet Relay
    > Chat Network). I found a bot using my adress with a
    > random name made up of letters. The server
    > administrator told me that he has recognized these bots
    > coming from many different hosts for quite ome time
    > now. They all try to join a channel named #nutz on that
    > server. He has seen people giving commands to those
    > bots so he closed down the channel. They give a msg
    > after kicked "Fuck you <name of the person that has
    > kicked them>. To version request they reply with
    > something like that too. I checked for open ports on my
    > box and found 113 open. A few days ago i deleted a
    > net-devil v.1.4 from my system. Not sure if that has
    > anything to do with that. After installing a freeware
    > firewall to see what it will do if i blocked its
    > outgoing port and deleting it afterwards it just
    > changed the outgoing port. As i am typing this a
    > netstat -an reveals
    > 
    > TCP    0.0.0.0:1301           0.0.0.0:0             
    > LISTENING
    >   TCP    0.0.0.0:1705           0.0.0.0:0             
    > LISTENING
    >   TCP    127.0.0.1:1027         0.0.0.0:0             
    > LISTENING
    >   TCP    127.0.0.1:1704         0.0.0.0:0             
    > LISTENING
    >   TCP    127.0.0.1:1704         127.0.0.1:1705        
    > ESTABLISHED
    >   TCP    127.0.0.1:1705         127.0.0.1:1704        
    > ESTABLISHED
    >   TCP    217.84.185.171:1301    65.185.135.125:6667   
    > ESTABLISHED
    >   UDP    127.0.0.1:1027         *:*                    
    > 
    > 
    > I couldnt find a freeware tool to find out which
    > process is using this specific irc connection, nor did
    > a scan with f-prot or housecall or panda reveal any
    > viral or trojan activity.
    > 
    > Any help or info would be really appreciated. Thanks in
    > advance
    > 
    > ----------------------------------------------------------------------------
    > This list is provided by the SecurityFocus ARIS analyzer service.
    > For more information on this free incident handling, management 
    > and tracking system please see: http://aris.securityfocus.com
    
    
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Tue Aug 27 2002 - 13:16:02 PDT