Re: MSBlast and other known exploits..

From: Phil Roginski (philat_private)
Date: Wed Aug 13 2003 - 17:39:02 PDT

  • Next message: Steffen Kluge: "Re: rpc dcom worm and windowsupdate"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
     We had some machines today with the same symptoms.  We found out that they
    also have spybot worm on them.  Once we got rid of that and msblaster
    everything is fine.
    
    Phil
    
    - ----- Original Message ----- 
    From: "John Ives" <jivesat_private>
    To: "Micheal Patterson" <michealat_private>;
    <incidentsat_private>
    Sent: Wednesday, August 13, 2003 10:27 AM
    Subject: Re: MSBlast and other known exploits..
    
    
    > The khat2 download has a binary infector, source code and a file called
    > macto.txt.  The macro file has some information for downloading hacker
    > defender (hxdef), a user level root kit, that if installed as part of the
    > exploit could run at start up and do a very good job of hiding itself.
    The
    > best way to learn about hxdef to download the zip file
    > http://rootkit.host.sk.  What your describing doesn't sound like hxdef,
    > unless something went wrong in the execution, but rather like a stability
    > problem that comes along when the rpc service crashes but the system
    hasn't
    > been restarted.  Unfortunately the best way to discover hxdef on a system
    > is with an off-line analysis.
    > I've used FIRE to mount the disk of a rootkited windows box and then
    > compared the files with what it said were there when it was on-line.  You
    > just have to be careful to make sure that you keep in mind normal hidden
    > files.  In my case there were a group of files starting with MsMgr that
    > didn't appear elsewhere.  This is of course the very short version of what
    > I went through to find it.
    >
    > John
    >
    >
    > At 07:44 AM 8/13/2003 -0500, you wrote:
    > >I've got reports of msblast infection that I've checked and they indeed
    do
    > >have msblast. Also, these systems all have what appears to be a corrupted
    > >control panel applet. The normal control panel shows up in a left hand
    frame
    > >and the contents of add/remove programs is missing. Also, various popup
    > >windows simply will not open.  I've read that there was a known root kit
    > >that utilized the same dcom exploit called khat2 (spelling) but I'm not
    > >having much luck in locating the symptoms of systems that have been
    rooted
    > >in this manner. Any information would be appreciated. I will be
    recommending
    > >that these systems be blown away and reinstalled from clean media, I'm
    just
    > >looking for some info to verify what's eaten away at these things.
    > >
    > >Thank you.
    > >
    > >--
    > >
    > >Micheal Patterson
    > >Network Administration
    > >Cancer Care Network
    > >405-733-2230
    > >
    > >
    > >
    >
    >---------------------------------------------------------------------------
    >
    >---------------------------------------------------------------------------
    -
    >
    > -------------------------------------------------
    > John Ives, GCWN, GSEC
    > Systems Administrator
    > College of Chemistry
    > (510) 643-1033
    >
    > "If you spend more on coffee than on IT security,  Then you will be
    hacked.
    > What's more,  you deserve to be hacked."   - Richard Clarke
    >
    > Any opinions expressed are my own and not those of the Regents of the
    > University of California.
    >
    >
    > --------------------------------------------------------------------------
    -
    > --------------------------------------------------------------------------
    --
    >
    -----BEGIN PGP SIGNATURE-----
    Version: PGP 8.0
    
    iQA/AwUBPzraI2EotYGToENLEQJSnQCg8D0se/q7n4jei+fuD0TPYkeL9IsAoKx3
    gXRgrCIW0VuJTULb9cvnX2RR
    =z1av
    -----END PGP SIGNATURE-----
    
    
    ---------------------------------------------------------------------------
    ----------------------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Wed Aug 13 2003 - 19:37:31 PDT