North American Network Operators Group Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical RE: Worm probes
We found the following on an infected server also: For each share on the server, it generates a .eml file and puts it in the root of the share. It then creates a index.asp, index.htm, default.asp and default.htm on the root of the share which points to and downloads the .eml file from the root of the share. Neat thing is, anyone with Active Desktop (View my Desktop as a Web Page) enabled is going to get it, presumably. Simply by browsing the shared directory. It looks like it morphs the .eml file names to. Not all are "readme.eml", althought they all are ~ 79K in size. Happy disinfecting. My customer on the end of a 56K FR link was fsck'd this afternoon. Welcome to IT during the first war fo the 21st century ... Eric ========================================================================== Eric Germann CCTec [email protected] Van Wert OH 45801 http://www.cctec.com Ph: 419 968 2640 Fax: 603 825 5893 "It is so easy to miss pretty trivial solutions to problems deemed complicated. The goal of a scientist is to find an interesting problem, and live off it for a while. The goal of an engineer is to evade interesting problems :)" -- Vadim Antonov <[email protected]> on NANOG > -----Original Message----- > From: [email protected] [mailto:[email protected]]On Behalf Of > [email protected] > Sent: Tuesday, September 18, 2001 2:34 PM > To: [email protected] > Cc: [email protected] > Subject: Re: Worm probes > > > On Tue, 18 Sep 2001 13:36:48 EDT, [email protected] said: > > Along those lines, weren't there some projects last time around > to find and > > clean up the affected machines? Clearly there are LOTS of vulnerable NT > > servers still out there. Presumably these are being responded > to just like > > This also has an e-mail vector and a web DOWNLOAD vector. > > There may be lots of vulnerable NT servers, but there's a lot MORE copies > of Outlook and Internet Explorer out there. > > Think SirCam *AND* CodeRed *AND* the infect-a-surfer vector.... > -- > Valdis Kletnieks > Operating Systems Analyst > Virginia Tech > > BEGIN:VCARD VERSION:2.1 N:Germann;Eric FN:Eric Germann ORG:CCTec TEL;WORK;VOICE:(419) 968-2640 TEL;WORK;FAX:(603) 825-5893 ADR;WORK:;;17780 Middle Point Road;Van Wert;OH;45891;United States of America LABEL;WORK;ENCODING=QUOTED-PRINTABLE:17780 Middle Point Road=0D=0AVan Wert, OH 45891=0D=0AUnited States of Americ= a URL: URL:http://www.cctec.com EMAIL;PREF;INTERNET:[email protected] REV:20010529T013421Z END:VCARD
|