Tom Emmelot 写é“:
Hello Li Zhou,
thank you for sending the virus!!!!!!!!
My virus scanner just catch it and the info is here:
http://uk.trendmicro-europe.com/enterprise/vinfo/encyclopedia.php?VName=WORM_SDBOT.BKC
msnmsgr.exe is normal MSN messenger program!
Regards >*< TOM >*<
Li Zhou schreef:
Yes, this should be it. It is in trendmicro database since June 23rd,
but not detected by Microsoft Antispyware yet.
I am more concerned that my windows 2000 is patched with no password
identical to those listed below, how the virus get in?
Details:
Arrival, Installation, and Autostart Technique
This worm arrives through network shares. Upon execution, it drops a
copy of itself in the Windows system folder as MSNMSGR.EXE.
It creates the following registry entries so that it runs as a service
at every system startup:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\apee
Type = "dword:00000020"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\apee
Start = "dword:00000002"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\apee
ErrorControl = "dword:00000001"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\apee
ImagePath = "hex(2):22,43,3a,5c,57,49,4e,44,4f,57,53,
5c,53,79,73,74,65,6d,33,32,5c,6d,73,6e,6d,73,67,72,2e,
65,78,65,22,20,2d,6e,65,74,73,76,63,73,00,"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\apee
DisplayName = "Logical Disk Manager Provider"
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\apee
ObjectName = "LocalSystem"
Network Propagation and Exploits
This worm spreads through network shares. It generates IP addresses and
drops a copy of itself in the default shares of the target addresses. It
uses a list of user names and passwords to gain access to restricted shares.
It searches for the following shares:
* ADMIN$
* C$
* D$
* IPC$
It uses the following user names and passwords:
* 000000
* 00000000
* 11111
* 111111
* 11111111
* 12345
* 123456
* 1234567
* 12345678
* 1234qwer
* 123abc
* 123asd
* 123qwe
* 5201314
* 54321
* 654321
* 888888
* 88888888
* abc123
* admin
* asdfgh
* computer
* database
* default
* Internet
* manager
* oracle
* passwd
* password
* private
* public
* secret
* security
* server
* super
* sybase
It exploits the following vulnerabilities to propagate:
* RPCSS vulnerability
* Windows LSASS vulnerability
More information can be found in the following pages:
* Microsoft Security Bulletin MS03-039
* Microsoft Security Bulletin MS04-011
Backdoor Capabilities
This worm has backdoor capabilities. It connects to an Internet Relay
Chat (IRC) server and joins a channel. Once connected, it listens for
commands coming from a remote malicious user, and it executes these
commands on the affected system.
It executes the following commands:
* Connect to certain Web sites
* Download/Open files
* List processes
* Perform basic IRC commands
* Update the malware