G
Guest
Just found out that our Windows 2000 server (on dial-up with dynamic IP;
all the Microsoft patches are installed) got infected by a virus that
executes WinMailNaq.exe and WinbmBozal.exe.
As Google, Google Groups, NAI, Sophos etc. have nothing, zilch, nada
about this virus, I'd like to know what kind of virus this is and how I
can secure my system in the future?
Anatomy:
1. WinMailNaq.exe is 13.856 bytes, WinbmBozal.exe is 1.617.411 bytes.
2. The first one doesn't have any meaningful resources to look at, the
second one is wrapped in PackageForTheWeb, its VERSIONINFO resource is
as follows:
VALUE "Comments", "Commodore forever
\000"
VALUE "CompanyName", "Immortal warez
\000"
VALUE "FileDescription", "C
\000"
VALUE "InternalName", "stub32
\000"
VALUE "OriginalFilename", "stub32i.exe
\000"
VALUE "FileVersion", "1.2
\000"
VALUE "LegalCopyright", "
\000"
VALUE "ProductName", "Commodore Interceptor
\000"
VALUE "ProductVersion", "1.2
\000"
3. The virus seems to get downloaded over Internet Explorer (the MRU
list of IE in the registry keeps some info). IE has NOT been used to
browse on this machine, with the exception of going to
windowsupdate.microsoft.com.
4. The virus creates c:\windows and c:\winnt\system32, puts a bunch of
files in there and then installs FireDaemon as a service. It also
replaces svchost with a svchost.exe file of its own.
5. Here are the contents of c:\windows:
13.03.2003 04:15 6 ircnick
13.03.2003 04:12 23.644 nickpool
18.03.2003 07:21 971.080 cygwin1.dll
24.10.2003 19:00 40 drone3.dat
02.05.2003 23:39 284 gen.reg
24.10.2003 19:00 255 servers
22.10.2003 20:45 148.992 svchost.exe
30.03.2003 14:37 19.968 echo.exe
30.03.2003 14:38 32.256 FireDaemon.exe
15.07.2004 17:21 59.392 ncx99.exe
14.02.2003 21:33 289.280 tcl84.dll
13.03.2003 04:27 126.464 wget.exe
30.03.2003 14:38 0 identd
18.07.2003 10:55 10.240 void.exe
13.03.2003 05:02 874 ntsvc.xml
23.10.2003 07:45 0 core
23.10.2003 07:45 7 user
23.10.2003 07:45 9 nick
23.10.2003 07:45 4 port
23.10.2003 08:37 5 pid.drone
24.10.2003 00:00 586 drone2.dat~bak
24.10.2003 19:00 586 drone2.dat
6. Here are the contents of c:\winnt\system32:
21.05.03 15:45 <DIR> haha
10.07.00 13:06 90.112 admdll.dll
3.07.02 14:50 29.696 hidden32.exe
9.05.03 15:03 13 nick.txt
8.07.00 7:29 29.408 raddrv.dll
27.04.03 12:36 275.456 Rar.exe
9.05.03 15:03 1.006 rmtcfg.cfg
24.07.01 16:15 241.664 r_server.exe
28.04.03 13:51 692 update1.bat
7. Here are the contents of c:\winnt\system32\haha:
21.05.03 15:37 1.028 bot.xdcc
24.07.02 0:53 904.008 cygwin1.dll
18.02.03 15:55 81.920 FireDaemon.exe
14.05.03 10:05 496 rb.bat
24.04.03 17:04 10 Regadd.bat
14.05.03 10:05 473 regadd.reg
14.05.03 10:06 85 sb.bat
16.11.02 13:37 189 secure.bat
24.07.02 2:51 5.632 SecureNetbios.exe
13.05.03 12:07 845 SERV-U.INI
24.07.02 0:51 228.940 setup.exe
11.04.03 9:37 227 sys.txt
11.04.03 9:37 1.015.296 winmgnt.exe
13.05.03 12:08 1.253 wm.txt
8. When the virus executes (it installs itself in the AutoRun portion of
the registry), it connects to one of several IRC servers and maxes out
the upload on my DSL connection. It also sometimes maxes out the CPU
time (this is an oldish P200 MMX used as a net proxy).
9. I removed it as follows (don't know if that was sufficient):
9a. Hang up the dial-up connection
9b. Kill WinMailNaq.exe in the Task Manager
9c. Stop FireDaemon in the Windows 2000 Services.
9d. Rename c:\windows to c:\windows.not
9e. Rename c:\winnt to c:\winnt.not
9f. Remove all traces of FireDaemon, svchost, WinMailNaq, and WinbmBozal
from the registry.
Snag: FireDaemon cannot be removed from all places in the registry
because the system prevents that.
OK, some of the above might be less-than-exact because I'm doing it all
from memory, but PLEASE someone tell me (a) what virus this is and (b)
how to prevent it from hitting the system again. (Yeah, I know, install
Linux. Looking at the files list, that might have been the ultimate
intention of those haxor dudes).
-mk
all the Microsoft patches are installed) got infected by a virus that
executes WinMailNaq.exe and WinbmBozal.exe.
As Google, Google Groups, NAI, Sophos etc. have nothing, zilch, nada
about this virus, I'd like to know what kind of virus this is and how I
can secure my system in the future?
Anatomy:
1. WinMailNaq.exe is 13.856 bytes, WinbmBozal.exe is 1.617.411 bytes.
2. The first one doesn't have any meaningful resources to look at, the
second one is wrapped in PackageForTheWeb, its VERSIONINFO resource is
as follows:
VALUE "Comments", "Commodore forever
\000"
VALUE "CompanyName", "Immortal warez
\000"
VALUE "FileDescription", "C
\000"
VALUE "InternalName", "stub32
\000"
VALUE "OriginalFilename", "stub32i.exe
\000"
VALUE "FileVersion", "1.2
\000"
VALUE "LegalCopyright", "
\000"
VALUE "ProductName", "Commodore Interceptor
\000"
VALUE "ProductVersion", "1.2
\000"
3. The virus seems to get downloaded over Internet Explorer (the MRU
list of IE in the registry keeps some info). IE has NOT been used to
browse on this machine, with the exception of going to
windowsupdate.microsoft.com.
4. The virus creates c:\windows and c:\winnt\system32, puts a bunch of
files in there and then installs FireDaemon as a service. It also
replaces svchost with a svchost.exe file of its own.
5. Here are the contents of c:\windows:
13.03.2003 04:15 6 ircnick
13.03.2003 04:12 23.644 nickpool
18.03.2003 07:21 971.080 cygwin1.dll
24.10.2003 19:00 40 drone3.dat
02.05.2003 23:39 284 gen.reg
24.10.2003 19:00 255 servers
22.10.2003 20:45 148.992 svchost.exe
30.03.2003 14:37 19.968 echo.exe
30.03.2003 14:38 32.256 FireDaemon.exe
15.07.2004 17:21 59.392 ncx99.exe
14.02.2003 21:33 289.280 tcl84.dll
13.03.2003 04:27 126.464 wget.exe
30.03.2003 14:38 0 identd
18.07.2003 10:55 10.240 void.exe
13.03.2003 05:02 874 ntsvc.xml
23.10.2003 07:45 0 core
23.10.2003 07:45 7 user
23.10.2003 07:45 9 nick
23.10.2003 07:45 4 port
23.10.2003 08:37 5 pid.drone
24.10.2003 00:00 586 drone2.dat~bak
24.10.2003 19:00 586 drone2.dat
6. Here are the contents of c:\winnt\system32:
21.05.03 15:45 <DIR> haha
10.07.00 13:06 90.112 admdll.dll
3.07.02 14:50 29.696 hidden32.exe
9.05.03 15:03 13 nick.txt
8.07.00 7:29 29.408 raddrv.dll
27.04.03 12:36 275.456 Rar.exe
9.05.03 15:03 1.006 rmtcfg.cfg
24.07.01 16:15 241.664 r_server.exe
28.04.03 13:51 692 update1.bat
7. Here are the contents of c:\winnt\system32\haha:
21.05.03 15:37 1.028 bot.xdcc
24.07.02 0:53 904.008 cygwin1.dll
18.02.03 15:55 81.920 FireDaemon.exe
14.05.03 10:05 496 rb.bat
24.04.03 17:04 10 Regadd.bat
14.05.03 10:05 473 regadd.reg
14.05.03 10:06 85 sb.bat
16.11.02 13:37 189 secure.bat
24.07.02 2:51 5.632 SecureNetbios.exe
13.05.03 12:07 845 SERV-U.INI
24.07.02 0:51 228.940 setup.exe
11.04.03 9:37 227 sys.txt
11.04.03 9:37 1.015.296 winmgnt.exe
13.05.03 12:08 1.253 wm.txt
8. When the virus executes (it installs itself in the AutoRun portion of
the registry), it connects to one of several IRC servers and maxes out
the upload on my DSL connection. It also sometimes maxes out the CPU
time (this is an oldish P200 MMX used as a net proxy).
9. I removed it as follows (don't know if that was sufficient):
9a. Hang up the dial-up connection
9b. Kill WinMailNaq.exe in the Task Manager
9c. Stop FireDaemon in the Windows 2000 Services.
9d. Rename c:\windows to c:\windows.not
9e. Rename c:\winnt to c:\winnt.not
9f. Remove all traces of FireDaemon, svchost, WinMailNaq, and WinbmBozal
from the registry.
Snag: FireDaemon cannot be removed from all places in the registry
because the system prevents that.
OK, some of the above might be less-than-exact because I'm doing it all
from memory, but PLEASE someone tell me (a) what virus this is and (b)
how to prevent it from hitting the system again. (Yeah, I know, install
Linux. Looking at the files list, that might have been the ultimate
intention of those haxor dudes).
-mk