Re: IIS and leech

From: atrinsig (atrinsigat_private)
Date: Sat Nov 09 2002 - 04:26:22 PST

  • Next message: Nick FitzGerald: "Re: 030.com"

    Hi Randall. Check out this post 30/1/02. Sounds like
    you may have just found your Huckelberry! Same port -
    and service name - different prognosis however.
    
    Danny P
    e-Secure-it.co.nz
    
    Subject: DDoS to microsoft sites
    
    Follow Up Flag: Follow up
    Flag Status: Flagged
    
    We've observed two disparate clients apparently rooted
    (both are Win2K I
    believe), being used to packet flood a variety of
    Microsoft sites (msn.com,
    hotmail.com and microsoft.com itself).
    
    Just a few seconds of IP accounting showed:
    
    Destination              Packets               Bytes
     64.4.32.251                  14201           
    20940508
     207.68.171.254               11862           
    17764328
     64.4.32.1                    12142           
    18184104
     207.46.197.102               59698           
    89401960
    
    These clients are on very different CIDR blocks (from
    the first octet). We
    don't have any further information at this time, other
    than one client
    saturated their T1 and the other saturated a 10Mb/s
    connection.
    
    I haven't observed any noticeable impacts to the
    microsoft sites being
    attacked. We have been able to track back the activity
    on MRTG graphs to
    last Thurs for both clients. We investigated the
    traffic volume the first
    day it appeared and at that time saw what appeared to
    be an attack against
    two hosts in .fr and one in .de. The client assured us
    at this time it was
    legitimate traffic.
    
    A port scan of one of the infected hosts shows:
    
         7  Echo
         9  Discard
        13  Daytime
        17  Quote of the Day
        19  Character Generator
        21  File Transfer Protocol [Control]
        25  Simple Mail Transfer
        80  World Wide Web HTTP
       135  DCE endpoint resolution
       139  NETBIOS Session Service
       443  https  MCom
       445  Microsoft-DS
       548  AFP over TCP
      1025  network blackjack
      1026
      1027  ICQ?
      1433  Microsoft-SQL-Server
      5631  pcANYWHEREdata
    
    The client claims that they are not running Appletalk
    (548) but I'm not sure
    whether to believe. We haven't been able to get
    console access to that
    machine to do any further investigation (but have
    blocked it upstream). Of
    the above services, most look legit from what I can
    tell with the exception
    of 548 and 1025-1027
    
    Mike
    
    
    
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS
    analyzer service.
    For more information on this free incident handling,
    management 
    and tracking system please see:
    http://aris.securityfocus.com
    
     --- randall perry <randallp@domain-logic.com> wrote:
    > Greets.
    > 
    > An IIS box I manage freaked out yesterday.  I
    > initially thought that it came under attack but
    > after digging through what was left of the crime
    > scene, it looks like MS is to blame.  The most
    > recent event before the nightmare began was at 7pm
    > the night was the creation of c:\program
    > files\WindowsUpdate\wuaudnld.tmp\.  That tells me
    > that an automagic MS Windows update is what is the
    > root of trashing that ecommerce box that took all
    > day yesterday to recover (after 2 BSODs trashing it
    > to it to the point of not having network
    > connectivity) .
    > 
    > If that wouldn't have happened, I probably would not
    > have found the following:
    > hum.exe which is really leech ftp server was
    > installed on the box and setup as service to start
    > with the box.  I found more than 30 gig of files
    > (movies, MP3s)  were there under 
    > d:\i386\winnt[some characters]\system32\system32\
    > and some funny directory names.  The movies were
    > broken into 14meg chunks, but had sample avi files
    > in the directory that showed a short clip of what
    > the movie was.
    > 
    > I have no idea how this got planted there by who. 
    > (only the office manager and graphics person are the
    > only ones to access the box)
    > 
    > A port scan of the box showed the following ports
    > open
    >           |___    21  [ftp]   File Transfer
    > [Control]
    > 	|___    25  [smtp]   Simple Mail Transfer
    > 	|___    80  [http]   World Wide Web HTTP
    > 	|___   135  [epmap]   DCE endpoint resolution
    > 	|___   389  [ldap]   Lightweight Directory Access
    > Protocol
    > 	|___   433  [nnsp]   NNSP
    > 	|___   443  [https]   https  MCom
    > 	|___   445  [microsoft-ds]   Microsoft-DS
    > 	|___  1025  [blackjack]   network blackjack
    > 	|___  1027  [ICQ]   ICQ?
    > 
    > Although typically network blackjack on port 1025, I
    > can assume that was the leech ftp server controlled
    > through port 1027.  Anyone else see this?
    > 
    > Randall Perry 
    > 
    > 
    > 
    >
    ----------------------------------------------------------------------------
    > This list is provided by the SecurityFocus ARIS
    > analyzer service.
    > For more information on this free incident handling,
    > management 
    > and tracking system please see:
    > http://aris.securityfocus.com
    >  
    
    http://careers.yahoo.com.au - Yahoo! Careers
    - 1,000's of jobs waiting online for you!
    
    ----------------------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Mon Nov 11 2002 - 13:21:26 PST