Re: Code Red Sniffer

  • From: Javier Gonzalez <Javier@xxxxxxxxxx>
  • To: "'[ISAserver.org Discussion List]'" <isalist@xxxxxxxxxxxxx>
  • Date: Wed, 8 Aug 2001 17:55:05 +0200

even with 
from:  http://www.microsoft.com/downloads/release.asp?ReleaseID=31878
applied, too...
is to go mad.
Javier

-----Mensaje original-----
De: David Dellanno [mailto:david@xxxxxxxxxx]
Enviado el: miércoles, 08 de agosto de 2001 17:36
Para: [ISAserver.org Discussion List]
Asunto: [isalist] Re: Code Red Sniffer

Hi Jim, very interesting.....  


I ran your script with the results:

Code Red infection search for SOFTPROBDC on 8/8/01 9:16:15 AM
  **  Checking for the bad 'explorer.exe' and 'root.exe' files
C:\explorer.exe - not found
C:\inetpub\Scripts\Root.exe - not found
C:\progra~1\Common~1\System\MSADC\Root.exe - not found
  **  Checking for the bad Virtual Folders entries
HKLM\SYSTEM\CurrentControlSet\Services\W3SVC\Parameters\Virtual Roots\/C -
not found
HKLM\SYSTEM\CurrentControlSet\Services\W3SVC\Parameters\Virtual Roots\/D -
not found
  **  Checking for the bad System File Checker entry
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable - not
found

  **  Checking for the rogue Explorer.exe

Rogue Explorer process - found
        **  you've definitely been infected ! **

** You have one or more definite indications of Code Red V2 on your system.
** You need to flatten this box and start over.  DO NOT connect to a network
** until you have completely rebuilt the system AND installed the security
** patch from Microsoft.

Then I ran the Symantec's 'CRDetect.exe' on the system tha with the results:


'Your computer does not appear to be Vunerable to the CodeRed Worm'.


Is this right?


-----Original Message-----
From: Jim Harrison [mailto:jim@xxxxxxxxxxxx]
Sent: Wednesday, August 08, 2001 9:59 AM
To: [ISAserver.org Discussion List]
Subject: [isalist] Re: Code Red Sniffer


http://www.ISAserver.org


I think that's trying to be a bit too general.

Both variants exploit a buffer vulnerability known to exist in NT4 and W2K.
Both variants propagate themselves to other machines.
Both variants run hidden outside the IIS process space, making a reboot
necessary to stop them
CR2 copies a fake "Explorer.exe" and copies "cmd.exe" to "root.exe" to your
drive; these can affect NT4 as well.
CR2 creates virtual folders under the default web site; this affects both
NT4 and W2K.
CR2 on the other hand, takes some actions that are specific to W2K, such as
modifying the SFCDisable regkey.

The differences between the NT4 and W2K damage are so slight as to be
irrelevant.  Check any machine running IIS 4.0 or higher.  Apparently, WXP
is immune (probably a redesign of the IIS space).

Jim Harrison
MCP(2K), A+, Network+, PCG

----- Original Message -----
From: "Jeremy Pullicino" <jeremyp@xxxxxxx>
To: "[ISAserver.org Discussion List]" <isalist@xxxxxxxxxxxxx>
Sent: Wednesday, August 08, 2001 6:55 AM
Subject: [isalist] Re: Code Red Sniffer


http://www.ISAserver.org


Code Red II only affects W2K

The origincal Code Red and it's variants work on NT4

Jeremy.

-----Original Message-----
From: Jeremy Lake [mailto:jeremy.lake@xxxxxxxxxxxxxxxxxx]
Sent: Wednesday, August 08, 2001 3:42 PM
To: [ISAserver.org Discussion List]
Subject: [isalist] Re: Code Red Sniffer


http://www.ISAserver.org


NAI are saying Code Red only effects W2K, not NT4 is this true?

Jez

-----Original Message-----
From: David Dellanno [mailto:david@xxxxxxxxxx]
Sent: 08 August 2001 14:42
To: [ISAserver.org Discussion List]
Subject: [isalist] Re: Code Red Sniffer


http://www.ISAserver.org


Interesting, I have found two boxes that were infected - rogue explorer
found, both NT4SP6a, IIS 4.0 and both had the MS security patch installed
and are behind ISA2000.  Oh no...not the rebuild...not the rebuild!

-----Original Message-----
From: Jim Harrison [mailto:jim@xxxxxxxxxxxx]
Sent: Wednesday, August 08, 2001 9:37 AM
To: [ISAserver.org Discussion List]
Subject: [isalist] Re: Code Red Sniffer


http://www.ISAserver.org


Symantec has instructions on their site for "eradication" of the Code Red
worm, but I've found those to be a bit unreliable. It's not totally their
fault; Code Red is actually a hidden process running on your machine that
sleeps most of the time, so "making it gone" is very difficult. You can use
task mangler to stop the single-thread "explorer" process, but it'll just
come back again later.  You have to rebuild the box while it's unplugged
from any network until you get the MS security patch installed or you stand
a good chance of getting reinfected.

Jim Harrison
MCP(2K), A+, Network+, PCG

----- Original Message -----
From: "Network Administrator" <shivi@xxxxxxxxxxx>
To: "[ISAserver.org Discussion List]" <isalist@xxxxxxxxxxxxx>
Sent: Wednesday, August 08, 2001 12:23 AM
Subject: [isalist] Re: Code Red Sniffer


http://www.ISAserver.org


Hi JIm,
    Just ran your codered sniffer, and found the Rogue explorer.exe in some
machins. what is the work around for that??

thanks a lot
shivi

Shivanthan Balendra Network Administrator Arabian Network Information
Services W.L.L., P.O.Box 10141, Manama, Bahrain. Tel Off: ?298444 Fax Off: ?
311551 Email: shivi@xxxxxxxxxxx Web : www.arabian.net
----- Original Message -----
From: "Jim Harrison" <jim@xxxxxxxxxxxx>
To: "[ISAserver.org Discussion List]" <isalist@xxxxxxxxxxxxx>
Cc: "CommuniGate Pro Discussions" <CGatePro@xxxxxxxxxxxxxxxx>
Sent: Wednesday, August 08, 2001 9:45 AM
Subject: [isalist] Code Red Sniffer


> http://www.ISAserver.org
>
>
>
> This is a multi-part message in MIME format.
>
>


----------------------------------------------------------------------------
----


> Hello weary Code Red battlers,
>
> I've created a script that searches your system to sniff out the Code
> Red worm.  Since I had to help a hapless friend who's web farm was
> destroying itself,  I had to make the search a little more
> streamlined.
>
> It does:
>     1. find the (presently) known droppings Code Red leaves in its wake
>     2. leave a log file on your system as "C:\CodeRed_insp_<MachName>.log"
>     3. tell you if definitely identifies Code Red
> It DOES NOT:
>     1. say that Code Red is NOT on your system
>     2. attempt to clean Code Red from your system; this is a
box-flattening
> worm
>
> Since Code Red is known to sleep for at least 24 hours before trashing
your
> box, you should run this script at least daily for the next several
> days
to
> see if anything new shows up.
>
> It ain't much, but it's something, anyway...  Good luck to all.
>
>
> Jim Harrison
> MCP(2K), A+, Network+, PCG
>
>


----------------------------------------------------------------------------
----


> ------------------------------------------------------
> You are currently subscribed to this ISAserver.org Discussion List as:
shivi@xxxxxxxxxxx
> To unsubscribe send a blank email to
> $subst('Email.Unsub')
>


------------------------------------------------------
You are currently subscribed to this ISAserver.org Discussion List as:
jim@xxxxxxxxxxxx To unsubscribe send a blank email to
$subst('Email.Unsub')



------------------------------------------------------
You are currently subscribed to this ISAserver.org Discussion List as:
david@xxxxxxxxxxxxxxx To unsubscribe send a blank email to
$subst('Email.Unsub')

------------------------------------------------------
You are currently subscribed to this ISAserver.org Discussion List as:
jeremy.lake@xxxxxxxxxxxxxxxxxx To unsubscribe send a blank email to
$subst('Email.Unsub')


This message is intended only for the use of the person(s) ("The intended
recipient(s)") to whom it is addressed. It may contain information that is
privileged and confidential within the meaning of applicable law. If you are
not the intended recipient, please contact the sender as soon as possible.
The views expressed in this communication are not necessarily those held by
Quantum Information Systems Limited.



------------------------------------------------------
You are currently subscribed to this ISAserver.org Discussion List as:
jeremyp@xxxxxxx
To unsubscribe send a blank email to $subst('Email.Unsub')






GFI - Security & communications products for Windows NT/2000
http://www.gfi.com

**********************************************************
This mail was content checked for malicious code or viruses
by Mail essentials. Mail essentials for Exchange/SMTP is an
email security, content checking & anti-virus gateway that
removes all types of email-borne threats before they can affect
your email users. Spam, viruses, dangerous attachments & offensive
content can be removed before they reach your mail server.
In addition it has server-based email encryption, disclaimers
and other email features.
***********************************************************

In addition to Mail essentials, GFI also produces the FAXmaker
fax server product range & LANguard internet access control &
intrusion detection. For more information on our products please
visit http://www.gfi.com



------------------------------------------------------
You are currently subscribed to this ISAserver.org Discussion List as:
jim@xxxxxxxxxxxx
To unsubscribe send a blank email to $subst('Email.Unsub')



------------------------------------------------------
You are currently subscribed to this ISAserver.org Discussion List as:
david@xxxxxxxxxxxxxxx
To unsubscribe send a blank email to $subst('Email.Unsub')

------------------------------------------------------
You are currently subscribed to this ISAserver.org Discussion List as:
javier@xxxxxxxxxx
To unsubscribe send a blank email to $subst('Email.Unsub')


Other related posts: