NUEVO TROYANO BLASTER,WORM.K (BACKDOOR DEL EXPLOIT DCOM RPC)

Cerrado
Avatar de Usuario
msc hotline sat
Mensajes: 93500
Registrado: 09 Mar 2004, 20:39
Ubicación: BARCELONA (ESPAÑA)
Contactar:

NUEVO TROYANO BLASTER,WORM.K (BACKDOOR DEL EXPLOIT DCOM RPC)

Mensaje por msc hotline sat » 21 Abr 2004, 16:19

McAfee nos informa de un nuevo troyano que aprovecha el agujero DCOM RPC para, a través del gusano BLASTER.K, instalarse y quedar a la escucha. Se controla a partir de los DATS 4352 de esta noche: Se recomienda además tener instalado el parche MS04-012, último acumulativo para esta vulberabilidad.



__________________________________________



http://vil.nai.com/vil/content/v_121073.htm



Trojan Name Risk Assessment

W32/Blaster.worm.k!backdoor Corporate User : Low

Home User : Low







Trojan Information

Discovery Date: 04/21/2004

Origin: Unknown

Length: 28,160 bytes

Type: Trojan

SubType: Remote Access

Minimum DAT: 4352 (04/21/2004)

Updated DAT: 4352 (04/21/2004)

Minimum Engine: 4.2.40

Description Added: 04/21/2004

Description Modified: 04/21/2004 4:00 AM (PT)





Trojan Characteristics:

This detection is for a remote access trojan that is dropped and executed by W32/Blaster.worm.k .



Installation



Upon execution, the trojan installs itself into the %SYSDIR% directory as svchosthlp.exe .



(Where %Sysdir% is the Windows System directory, for example C:\WINDOWS\SYSTEM)



For example:



C:\WINNT\system32\svchosthlp.exe



The following Registry key is added to hook system startup:



HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run "MSUpdate" = %SYSDIR%\svchosthlp.exe

The following registry keys are also added:



HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control "Sysuser"

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control "Sysuser"

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control "Sysuser"



The user's startpage of the browser is changed to the following URL by modifying the registry at the following place:



HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main "Start Page" = http://www.getgood.biz

Remote Access Functionality



Once running on the victim machine, a random port is opened on the infected system. The port numbers observed during testing were: 27507, 24367, 25519.



Mapped drives on the infected system were removed as well



Top of Page



Symptoms

Unusual ports are opened

Existence of the files/Registry keys detailed above



Top of Page



Method Of Infection

Trojans do not self-replicate. They are spread manually, often under the premise that the executable is something beneficial. Distribution channels include IRC, peer-to-peer networks, newsgroup postings, email, etc



__________________________________________





Al respecto estamos desarrollando la nueva versión 4.2 del ELIRPCA que controlorá tanto el gusano, como el backdoor como la falta de dicho parche



Sobre el gusano que crea este troyano, Blaster o LOVSAN.K / EXPLOIT DCOM RPC, cabe señalar:


[quote]
-- Update 21 April 2004 --

A new variant was discovered and was proactively detected as Exploit-DcomRpc with the 4289 DAT files when scanning compressed executables (default setting)



eschlp.exe (66,048 bytes)



Detection for this variant as W32/Blaster.worm.k had been added to 4352 DATs and above. It propagates in the same way as previous variants. A backdoor dropped by this variant was detected as W32/Blaster.worm!backdoor using the 4352 DATs and above.
[/quote]


saludos



ms, 21-04-2004

Avatar de Usuario
msc hotline sat
Mensajes: 93500
Registrado: 09 Mar 2004, 20:39
Ubicación: BARCELONA (ESPAÑA)
Contactar:

Mensaje por msc hotline sat » 21 Abr 2004, 16:37

Subida a esta web nueva version utilidad ELIRPCA v 4.2



http://www.zonavirus.com/descargas/EliRPCA.exe



saludos



ms, 21-04-2004

Cerrado

Volver a “ALERTAS VIRICAS y utilidades de eliminacion”