North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

RE: Worm probes

  • From: Eric Germann
  • Date: Tue Sep 18 20:04:54 2001

We found the following on an infected server also:

For each share on the server, it generates a .eml file and puts it in the
root of the share.  It then creates a index.asp, index.htm, default.asp and
default.htm on the root of the share which points to and downloads the .eml
file from the root of the share.  Neat thing is, anyone with Active Desktop
(View my Desktop as a Web Page) enabled is going to get it, presumably.
Simply by browsing the shared directory.  It looks like it morphs the .eml
file names to.  Not all are "readme.eml", althought they all are ~ 79K in
size.

Happy disinfecting.  My customer on the end of a 56K FR link was fsck'd this
afternoon.  Welcome to IT during the first war fo the 21st century ...

Eric


==========================================================================
  Eric Germann                                        CCTec
  [email protected]                                 Van Wert OH 45801
  http://www.cctec.com                                Ph:  419 968 2640
                                                      Fax: 603 825 5893

"It is so easy to miss pretty trivial solutions to problems deemed
complicated.  The goal of a scientist is to find an interesting problem,
and live off it for a while.  The goal of an engineer is to evade
interesting problems :)"  -- Vadim Antonov <[email protected]> on NANOG




> -----Original Message-----
> From: [email protected] [mailto:[email protected]]On Behalf Of
> [email protected]
> Sent: Tuesday, September 18, 2001 2:34 PM
> To: [email protected]
> Cc: [email protected]
> Subject: Re: Worm probes
>
>
> On Tue, 18 Sep 2001 13:36:48 EDT, [email protected]  said:
> > Along those lines, weren't there some projects last time around
> to find and
> > clean up the affected machines?  Clearly there are LOTS of vulnerable NT
> > servers still out there.  Presumably these are being responded
> to just like
>
> This also has an e-mail vector and a web DOWNLOAD vector.
>
> There may be lots of vulnerable NT servers, but there's a lot MORE copies
> of Outlook and Internet Explorer out there.
>
> Think SirCam *AND* CodeRed *AND* the infect-a-surfer vector....
> --
> 				Valdis Kletnieks
> 				Operating Systems Analyst
> 				Virginia Tech
>
>
BEGIN:VCARD
VERSION:2.1
N:Germann;Eric
FN:Eric Germann
ORG:CCTec
TEL;WORK;VOICE:(419) 968-2640
TEL;WORK;FAX:(603) 825-5893
ADR;WORK:;;17780 Middle Point Road;Van Wert;OH;45891;United States of America
LABEL;WORK;ENCODING=QUOTED-PRINTABLE:17780 Middle Point Road=0D=0AVan Wert, OH 45891=0D=0AUnited States of Americ=
a
URL:
URL:http://www.cctec.com
EMAIL;PREF;INTERNET:[email protected]
REV:20010529T013421Z
END:VCARD