Some more information on my issue. The system is a production server
running exchange for one client. It is a new machine that was
recently built from know good media. It has been firewalled since it
has been built, during the build it was not open to the internet. Once
it was put into our production environment it had the following ports
open to it 25,80,443,143,110.
At this point I think the machine is cleaned. I am just guessing that
the machine was hit by some automated tool. I could kick myself for
not saving the files that I found on the machine and submitting to the
sites suggested by some on the list. I also did not save the registry
keys I found on the system, again another mistake on my part but I was
in a hurry to get the machine back into production. Sadly I wasn't
worried about gathering the information I needed to find out exactly
what happened to the machine.
Thanks for all of the responses I will have to add all of the
suggested steps to a process document on what to do when you find a
machine that has been compromised in some way.
Thanks,
Patrick
On 6/5/06, Patrick Beam <[EMAIL PROTECTED]> wrote:
Came in this morning to find a windows 2003 server I manage scanning the
Internet for machines listening on tcp 139 and 445. While looking at the
machine I noticed the following processes running.
Mwvsta.exe found in c:\windows\system32
rundll16.exe c:\windows\system23
Ponoas.exe c:\windows\system32
I believe that the ponoas.exe is some sort of rootkit although searching on
google for this file name returns nothing. Also searching
mwvsta.exereturns nothing. At this point I have removed these files
from the system
and registry but am weary that the server will get hit again. Has anyone
had an experience with the following file or have any idea what rookkit of
virus they are associated with?
Thanks,
Patrick
------------------------------------------------------------------------------
This List Sponsored by: Black Hat
Attend the Black Hat Briefings & Training USA, July 29. August 3 in Las Vegas.
World renowned security experts reveal tomorrow.s threats today. Free of
vendor pitches, the Briefings are designed to be pragmatic regardless of your
security environment. Featuring 36 hands-on training courses and 10 conference
tracks, networking opportunities with over 2,500 delegates from 40+ nations.
http://www.blackhat.com
------------------------------------------------------------------------------