The built-in firewall of 2003 has been enabled so all ports that aren't
needed have been closed. The system will be formatted soon to clear away
anything left by the hackers.
There are two FTP servers they installed. One of them is servu (I found the
config file) and I'm not sure what the other is. Neither show up in the
task manager but they did show up using a port monitor. The only problem
was the filename shown wasn't in the directory the port monitor was say.
For example, it was showing the filename C:\Windows\System32\msvchost.exe,
but that file doesn't exist. I checked to make sure it wasn't hidden (at
least the type of hidden Windows can do) and it wasn't... just doesn't
exist. I searched the hard drive and the registry and found nothing. I
then used a program called RegMon to monitor everything that's loading from
the registry upon bootup. I found that the file is being loaded from that
location and registry keys that say they were successfully read do not even
exist.
They had created a user, which I disabled (found it first day I noticed a
problem) and eventually removed. I'll look into the Access Control List.
Brian T. Rowe said:
I agree that, preferrably, the system should be taken off the internet
asap (but not offline, to further research the break-in). Leaving it online
for any length of time can have dire consequences.
If that's not an option yet, at least try to lock the system down.
Depending on the system's function (I assume it's an externally facing web
server), block all unecessary ports, especially whatever port the ftp server
is running on - port 21 or otherwise.
As far as the disk space is concerned, check your Access Control Lists
Might be that admins are being blocked - also check for any unusual local
id's and disable them. Lastly, check for any processes in memory that are
suspicious. That Ftp server process is somewhere in memory - find it, jot
down the exe name, kill the process, delete / rename the exe, and finally
search for that process in the registry and delete any references.