J
John Coutts
I just spent several hours removing a SpyBot worm from a customer's machine.
This particular machine is on a small network with four other machines, and
all are Win2K. As a precaution, I had disabled port 445 on all the other
machines, but somehow I missed this one. It was connected to the Internet
behind a firewall, so I didn't worry about it. But these machines are also
connected to a private government network through another router. The hacker
used this port on the government network and one of the Microsoft
vulnerabilities to install a backdoor Trojan called bling.exe; one of the many
variants of the SpyBot worm. Using this backdoor, they installed several other
programs:
10/04/2003 03:54 PM 16,384 hidden32.exe
04/06/2004 11:23 AM 245,624 kernel32.exe
05/12/2003 02:04 PM 35,898 kill.exe
09/27/2004 10:44 AM 290,290 msupdates.exe
09/29/2004 07:49 AM 100,338 mswin.exe
09/25/2004 10:36 AM 86,016 bling.exe
10/11/2004 10:11 AM 21,402 msdll.gif
and several batch files:
Run.bat
Rand.bat
WinRun.bat
regNHide.bat
Sys32.bat
Secure.bat
in a newly created directory C:\windows\system32\sys32.
Hidden32.exe was used to load Mswin.exe and msdll.gif on startup. Mswin.exe is
an IRC proxy program, and msdll.gif is the configuration file for it. It
connected to port 6667 on hub.pheared.com where it listened for instructions.
The server then closed the connection. This all happened over the course of 4
days.
Then nothing happened for 10 days. Yesterday, I logged in under an
administrator account and all hell broke loose. A SERV-U FTP server was
started and network traffic began in earnest. I simply pulled the network
connection until I could figure out what was wrong. As the government workers
came back to work today, they are having nothing but problems as they battle
this worm.
To protect yourself, I strongly advise disabling port 445 on XP/2000 by adding
the following key:
Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBT\Parameters
Value: SmbDeviceEnabled
Type: DWORD value (REG_DWORD)
Content: 0 (to disable)
I also advise changing the permissions (for those not using simple networking)
on Cmd.exe to Administrators only, and perhaps Power Users. In most cases, it
is the System permission that gives rise to the ability of these hacks to run
batch files.
J.A. Coutts
This particular machine is on a small network with four other machines, and
all are Win2K. As a precaution, I had disabled port 445 on all the other
machines, but somehow I missed this one. It was connected to the Internet
behind a firewall, so I didn't worry about it. But these machines are also
connected to a private government network through another router. The hacker
used this port on the government network and one of the Microsoft
vulnerabilities to install a backdoor Trojan called bling.exe; one of the many
variants of the SpyBot worm. Using this backdoor, they installed several other
programs:
10/04/2003 03:54 PM 16,384 hidden32.exe
04/06/2004 11:23 AM 245,624 kernel32.exe
05/12/2003 02:04 PM 35,898 kill.exe
09/27/2004 10:44 AM 290,290 msupdates.exe
09/29/2004 07:49 AM 100,338 mswin.exe
09/25/2004 10:36 AM 86,016 bling.exe
10/11/2004 10:11 AM 21,402 msdll.gif
and several batch files:
Run.bat
Rand.bat
WinRun.bat
regNHide.bat
Sys32.bat
Secure.bat
in a newly created directory C:\windows\system32\sys32.
Hidden32.exe was used to load Mswin.exe and msdll.gif on startup. Mswin.exe is
an IRC proxy program, and msdll.gif is the configuration file for it. It
connected to port 6667 on hub.pheared.com where it listened for instructions.
The server then closed the connection. This all happened over the course of 4
days.
Then nothing happened for 10 days. Yesterday, I logged in under an
administrator account and all hell broke loose. A SERV-U FTP server was
started and network traffic began in earnest. I simply pulled the network
connection until I could figure out what was wrong. As the government workers
came back to work today, they are having nothing but problems as they battle
this worm.
To protect yourself, I strongly advise disabling port 445 on XP/2000 by adding
the following key:
Key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBT\Parameters
Value: SmbDeviceEnabled
Type: DWORD value (REG_DWORD)
Content: 0 (to disable)
I also advise changing the permissions (for those not using simple networking)
on Cmd.exe to Administrators only, and perhaps Power Users. In most cases, it
is the System permission that gives rise to the ability of these hacks to run
batch files.
J.A. Coutts