>From the dshield list. Cheers,
Paulo ----- Original Message ----- From: "Danny" To: "'General DShield Discussion List'" <[EMAIL PROTECTED]> Sent: Sunday, March 09, 2003 4:25 PM Subject: RE: [Dshield] Port 445 Traffic > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > |->-----Original Message----- > |->From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On > |->Behalf Of Doug White > |->Sent: Sunday, March 09, 2003 10:19 AM > |->To: General DShield Discussion List > |->Subject: Re: [Dshield] Port 445 Traffic > |-> > |->Yes, We are experiencing the same - started around noon on Friday - > but > |->really > |->picked up the past 24 hours- and are coming from all over. > |-> > |->====================================== > |->Got DSL? Check it out! > |->For hosting solutions http://www.clickdoug.com > |->ISP rated: http://www.forta.com/cf/isp/isp.cfm?isp_id=772 > |->====================================== > > > This was sent to the full-disclosure email lists and would probably be > the reason for this increase in port 445 scanning... > > > Harbin Institute of Technology & Antiy United Cert Group > Worm.Dvldr analysis report > > On the Mar. 8th, 2003, Harbin Institute of Technology & Antiy United > Cert Group found the abnormal network communication on several monitor > nodes of the China Telecom and the China Education and Research Network. > > Abnormal performances are as follows: > 1. The monitor nodes find that several nodes send the TCP 445 > package to a large quantity of target host. > 2. Each abnormal node send the packages to the consecutive IP > address. > Through the reverse checking we found the commonness on the target host. > 1. The operating system is Windows NT/2000. > 2. The operating system opened both the 5800 and 5900 ports of the > AT&T remote manager. > > After that, we contacted with administrator of the target host in time > and obtained the samples. The first checking results are as follows: > Under the system list, there is a executable program called Dvldr32.exe, > which process the abnormal communication by sending a large quantity of > data packages. Besides, there are several abnormal files and abnormal > regedit key assignments. The lists of abnormal files are as follows: > > File name the possible directory size > dvldr32.exe %windir%/system32(NT/2K) %windir%/system(9x)745,984 > explorer.exe %windir%/fonts 212,992 > omnithread_rt.dll %windir%/fonts 57,344 > VNCHooks.dll %windir%/fonts 32,768 > rundll32.exe %windir%/fonts 29,336 > cygwin1.dll %windir%/system32(NT/2K) > %windir%/system(9x)944,968 > INST.exe C:Documents and Settings\All Users\Start Menu\Programs\Startup > C:\WINDOWS\Start Menu\Programs\Startup\inst.exe C:\WINNT\All Users\Start > Menu\Programs\Startup\inst.exe 684,562 > > The regedit table is modified as follows: > REGEDIT4 > > [HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run] > "TaskMan"="C:\\WINDOWS\\Fonts\\rundll32.exe" > "Explorer"="C:\\WINDOWS\\Fonts\\explorer.exe" > [HKEY_CURRENT_USER\Software\ORL] > > [HKEY_CURRENT_USER\Software\ORL\WinVNC3] > "SocketConnect"=dword:00000001 > "AutoPortSelect"=dword:00000001 > "InputsEnabled"=dword:00000001 "LocalInputsDisabled"=dword:00000000 > "IdleTimeout"=dword:00000000 > "QuerySetting"=dword:00000002 > "QueryTimeout"=dword:0000000a > "Password"=hex:[here we do some shields] > "PollUnderCursor"=dword:00000001 "PollForeground"=dword:00000001 > "PollFullScreen"=dword:00000001 "OnlyPollConsole"=dword:00000001 > "OnlyPollOnEvent"=dword:00000001 > > [HKEY_CURRENT_USER\Software\ORL\VNCHooks] > > [HKEY_CURRENT_USER\Software\ORL\VNCHooks\Application_Prefs] > > [HKEY_CURRENT_USER\Software\ORL\VNCHooks\Application_Prefs\EXPLORER.EXE] > The forwarded analysis is as follows: > Dvldr32.exe is packed by Aspack. This virus, which is written by MS > VC6.0, send out amount of packages with the aim to infect the network. > This File also include 3 executable files. Two of them are "Psexesvc" > and "Remote process lancher". They are command tools which published by > Sysinternals Corporation. They don't create to the file system, and been > called by the Dvldr32.exe only. Another program is a install package > which made by a uncommon install tool. The package include 5 files,3 of > them (Explorer.exe,VNCdll32.dll and Omnithread_rt.dll) are networking > managerial tools which belong to the corporation AT&T. > Rundll32.dll is not the normal one in the Microsoft operating system. > It maybe a Linux's program which transplanted to Windows. We have been > still analysising the basic principle in it. Spread principle: > When running , the program will select 2 IP section in random and > connect the target host's port on 445 to get networking package. Once > the target machine's administrator's password is null or in the list > which included in this file , the program will copy itself to its > system. > Backdoor: > The virus uses the regular system managerial tool--VCN(edition is > 3.3.3.9) as its backdoor, and installs it to the target computer's > operating system. Though some technical disposals, the icon will not > appear when VNC is running. Because the VNC cannot connect the computer > when the machine is locked, this function is limited. User can do: > The user with NT/2K OS must set a strong password of admin at first, > then use AntiyPort http://www.antiy.net/download/antiyports.exe > or other process managerial tools to kill the process named > dvldr32.exe.After doing this, user must delete all files appeared in the > above table, and then restart your computer. > > The special kill tool & the forwarded response message: > Harbin Institute of Technology & Antiy United Cert Group will go on > paying our attentions on the developing state of affairs. And we will > release the in-depth analysis report. We will also release two copies > (both the Chinese and the English ones) of the special kill tool at > about 21:40 Beijing Time (the Mar. 8th, 2003 ) On the Mar.9th, 2003 of > the Beijing Time, the anti-virus database will be updated. > after that,you can download Antiy Ghostbusters datebase file here > http://www.antiy.net/update/ex.gbl > you can overwrite same file in Antiy Ghostbusters install path(default > is :\Program Files\Antiy Labs\Antiy Ghostbusters) after that you can > check this worm by Antiy Ghostbusters. more information of Antiy > ghostbusters http://www.antiy.net/ghostbusters password list of this > worm > .data:0040A038 dd offset aAdmin ; "admin" > .data:0040A03C dd offset aAdmin_0 ; "Admin" > .data:0040A040 dd offset aPassword ; "password" > .data:0040A044 dd offset aPassword_0 ; "Password" > .data:0040A048 dd offset a1 ; "1" > .data:0040A04C dd offset a12 ; "12" > .data:0040A050 dd offset a123 ; "123" > .data:0040A054 dd offset a1234 ; "1234" > .data:0040A058 dd offset a12345 ; "12345" > .data:0040A05C dd offset a123456 ; "123456" > .data:0040A060 dd offset a1234567 ; "1234567" > .data:0040A064 dd offset a12345678 ; "12345678" > .data:0040A068 dd offset a123456789 ; "123456789" > .data:0040A06C dd offset a654321 ; "654321" > .data:0040A070 dd offset a54321 ; "54321" > .data:0040A074 dd offset a111 ; "111" > .data:0040A078 dd offset a000000 ; "000000" > .data:0040A07C dd offset a00000000 ; "00000000" > .data:0040A080 dd offset a11111111 ; "11111111" > .data:0040A084 dd offset a88888888 ; "88888888" > .data:0040A088 dd offset aPass ; "pass" > .data:0040A08C dd offset aPasswd ; "passwd" > .data:0040A090 dd offset aDatabase ; "database" > .data:0040A094 dd offset aAbcd ; "abcd" > .data:0040A098 dd offset aAbc123 ; "abc123" > .data:0040A09C dd offset aOracle ; "oracle" > .data:0040A0A0 dd offset aSybase ; "sybase" > .data:0040A0A4 dd offset a123qwe ; "123qwe" > .data:0040A0A8 dd offset aServer ; "server" > .data:0040A0AC dd offset aComputer ; "computer" > .data:0040A0B0 dd offset aInternet ; "Internet" > .data:0040A0B4 dd offset aSuper ; "super" > .data:0040A0B8 dd offset a123asd ; "123asd" > .data:0040A0BC dd offset aIhavenopass ; "ihavenopass" > .data:0040A0C0 dd offset aGodblessyou ; "godblessyou" > .data:0040A0C4 dd offset aEnable ; "enable" > .data:0040A0C8 dd offset aXp ; "xp" > .data:0040A0CC dd offset a2002 ; "2002" > .data:0040A0D0 dd offset a2003 ; "2003" > .data:0040A0D4 dd offset a2600 ; "2600" > .data:0040A0D8 dd offset a0 ; "0" > .data:0040A0DC dd offset a110 ; "110" > .data:0040A0E0 dd offset a111111 ; "111111" > .data:0040A0E4 dd offset a121212 ; "121212" > .data:0040A0E8 dd offset a123123 ; "123123" > .data:0040A0EC dd offset a1234qwer ; "1234qwer" > .data:0040A0F0 dd offset a123abc ; "123abc" > .data:0040A0F4 dd offset a007 ; "007" > .data:0040A0F8 dd offset aAlpha ; "alpha" > .data:0040A0FC dd offset aPatrick ; "patrick" > .data:0040A100 dd offset aPat ; "pat" > .data:0040A104 dd offset aAdministrator ; > "administrator" > .data:0040A108 dd offset aRoot ; "root" > .data:0040A10C dd offset aSex ; "sex" > .data:0040A110 dd offset aGod ; "god" > .data:0040A114 dd offset aFoobar ; "foobar" > .data:0040A118 dd offset aA ; "a" > .data:0040A11C dd offset aAaa ; "aaa" > .data:0040A120 dd offset aAbc ; "abc" > .data:0040A124 dd offset aTest ; "test" > .data:0040A128 dd offset aTest123 ; "test123" > .data:0040A12C dd offset aTemp ; "temp" > .data:0040A130 dd offset aTemp123 ; "temp123" > .data:0040A134 dd offset aWin ; "win" > .data:0040A138 dd offset aPc ; "pc" > .data:0040A13C dd offset aAsdf ; "asdf" > .data:0040A140 dd offset aSecret ; "secret" > .data:0040A144 dd offset aQwer ; "qwer" > .data:0040A148 dd offset aYxcv ; "yxcv" > .data:0040A14C dd offset aZxcv ; "zxcv" > .data:0040A150 dd offset aHome ; "home" > .data:0040A154 dd offset aXxx ; "xxx" > .data:0040A158 dd offset aOwner ; "owner" > .data:0040A15C dd offset aLogin ; "login" > .data:0040A160 dd offset aLogin_0 ; "Login" > .data:0040A164 dd offset aPwd ; "pwd" > .data:0040A168 dd offset aPass ; "pass" > .data:0040A16C dd offset aLove ; "love" > .data:0040A170 dd offset aMypc ; "mypc" > .data:0040A174 dd offset aMypc123 ; "mypc123" > .data:0040A178 dd offset aAdmin123 ; "admin123" > .data:0040A17C dd offset aPw123 ; "pw123" > .data:0040A180 dd offset aMypass ; "mypass" > .data:0040A184 dd offset aMypass123 ; "mypass123" > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.netsys.com/full-disclosure-charter.html > > Cheers > Danny > Network Security Engineer > > > -----BEGIN PGP SIGNATURE----- > Version: PGP 8.0 > > iQA/AwUBPmtq5X8l+vsju1DoEQIZmwCg7F5vKjse9BflYT3Sw17R1LQKKnEAni7t > jS6k4Rdb8OUM0+JAhijF+Tzg > =xPgF > -----END PGP SIGNATURE----- > > _______________________________________________ > list mailing list > [EMAIL PROTECTED] > To change your subscription options (or unsubscribe), see: http://www.dshield.org/mailman/listinfo/list _______________________________________________ VNC-List mailing list [EMAIL PROTECTED] http://www.realvnc.com/mailman/listinfo/vnc-list