Home page logo
/

nanog logo nanog mailing list archives

RE: RPC errors
From: <Brennan_Murphy () NAI com>
Date: Mon, 11 Aug 2003 14:46:42 -0700




http://vil.nai.com/vil/content/v_100547.htm


-BM



-----Original Message-----
From: Chris Reining [mailto:creining () packetfu org] 
Sent: Monday, August 11, 2003 5:36 PM
To: Sean Donelan
Cc: Jack Bates; NANOG
Subject: Re: RPC errors


On Mon, Aug 11, 2003 at 04:17:53PM -0400, Sean Donelan wrote:
On Mon, 11 Aug 2003, Jack Bates wrote:
I'm showing signs of an RPC sweep across one of my networks that's 
killing some XP machines (only XP confirmed). How wide spread is 
this at this time. Also, does anyone know if this is just generating

a DOS symptom or if I should be looking for backdoors in these 
client systems?

http://isc.sans.org/diary.html?date=2003-08-11
The worm uses the RPC DCOM vulnerability to propagate. One it finds a 
vulnerable system, it will spawn a shell and use it to download the 
actual worm via tftp.

The name of the binary is msblast.exe. It is packed with UPX and will 
self extract. The size of the binary is about 11kByte unpacked, and 
6kBytes
packed:

I have a copy of this worm at
  http://www.packetfu.org/malware/msblast.zip


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]