RE: [AppSec-research] New Worm/Virus April 8th Apr 08 2004 04:28PM
Polazzo Justin (Justin Polazzo facilities gatech edu)
I know that it is bad form to reply to your own post, but here it goes anyway:

There is an accompanying file called nwiz.exe in the \Winnt folder.

The worm/virus writes the following to an infected machines hosts file www.symantec.com securityresponse.symantec.com symantec.com www.sophos.com sophos.com www.mcafee.com mcafee.com liveupdate.symantecliveupdate.com www.viruslist.com viruslist.com viruslist.com f-secure.com www.f-secure.com kaspersky.com www.avp.com www.kaspersky.com avp.com www.networkassociates.com networkassociates.com www.ca.com ca.com mast.mcafee.com my-etrust.com www.my-etrust.com download.mcafee.com dispatch.mcafee.com secure.nai.com nai.com www.nai.com update.symantec.com updates.symantec.com us.mcafee.com liveupdate.symantec.com customer.symantec.com rads.mcafee.com trendmicro.com www.trendmicro.com

I also noticed that the fully patched and av protected machines that were infected had lame administrator passwords (and the account "Administrator" had not been renamed), which is the most likely point of compromise.

All in all not something to worry about unless you dont have MS03-039 or use 123456 as your admin password :)


-----Original Message-----
From: owner-appsec-research (at) linuxbox (dot) org [email concealed]
[mailto:owner-appsec-research (at) linuxbox (dot) org [email concealed]]On Behalf Of Polazzo Justin
Sent: Thursday, April 08, 2004 9:53 AM
To: appsec-research (at) linuxbox (dot) org [email concealed]
Cc: bugtraq (at) securityfocus (dot) com [email concealed]
Subject: [AppSec-research] New Worm/Virus April 8th

Mail from "Polazzo Justin" <Justin.Polazzo (at) facilities.gatech (dot) edu [email concealed]>

Concerning the new worm type infection spreading around today (6:15am EST)

the file is called ndemon.exe (.99k) and it puts itself into c:\winnt and c:winnt\system32. Registry entries HKLM\Software|Microsoft|CurrentVersion\Run and HKLM\Software|Microsoft|CurrentVersion\RunServices (Think it creates that one).

At first look:
it then tries to propagate itself via MS ports 135, and 139 VIA known flaws and password guessing. It also listens for other infected machines on port 1025 and scans for MS IIS boxes on port 80 (to try known exploits as well)

The infected machines were win2k SP4 (fully Patched) Running Symantec AV v8.6

Just a heads up


Justin Polazzo
CSS II, Facilities IT
Georgia Institute of Technology
915 Atlantic Drive
Atlanta, GA 30332-0350

404-894-6804 Voice
404-894-8088 Facsimile

justin.polazzo (at) facilities.gatech (dot) edu [email concealed]

Request assistance at < http://it.facilities.gatech.edu/it-helpdesk.php>

Submit a question or comment at < http://it.facilities.gatech.edu/comments.php>

http://www.cauce.org A site to help fight Spam

The information transmitted is intended only for the person or entity to which it is addressed and may contain confidential and/or privileged material. Any review, retransmission, dissemination or other use of, or taking of any action in reliance upon, this information by persons or entities other than the intended recipient is prohibited.

If you received this in error, please contact the sender and delete the material from any computer.

AppSec-Research, the place for Reverse Engineers.
To unsubscribe send mail to majordomo (at) linuxbox (dot) org [email concealed]
with 'unsubscribe AppSec-Research' in the message body.

[ reply ]


Privacy Statement
Copyright 2010, SecurityFocus