Security Incidents mailing list archives
Re: Initial analysis of the .ida "Code Red" Worm
From: Matt Power <mhpower () bos bindview com>
Date: Wed, 18 Jul 2001 14:23:15 -0400
We've injected a copy of the Code Red worm onto one of our lab systems
(Windows 2000 Server with SP1; IIS 5.0 with no content additions or
configuration changes, e.g., the "The site you were trying to reach
does not currently have a default page" home page; idq.dll from prior
to the MS01-033/Q300972 patch). A few preliminary notes:
-- Within about 10 seconds after the worm data was sent, the victim
machine began generating port-80 SYN packets to many random IP
addresses, as described in the other reports of this worm.
However, there was no "Hacked By Chinese!" home page created on
this machine. Also, in a similar attack on a Windows 2000 Server
machine that had a brief c:\inetpub\wwwroot\default.htm file, the
attack did not result in that home page being changed or
replaced. I have also heard other reports of Code Red activity on
machines that did not have a home-page defacement.
This suggests that scanning your own networks for machines with
a "Hacked By Chinese!" home page might not be an especially
comprehensive way to identify machines compromised by Code Red.
-- The victim machine sends the string "GET " to the attacking
machine over the TCP connection that was used for the attack.
It's possible that looking for short outgoing packets ending with
the application data "GET ", with TCP source port 80, may be a
useful way to detect breakins in some environments.
-- fport (http://www.foundstone.com/rdlabs/proddesc/fport.html)
listed about 100 TCP ports for inetinfo.exe on the victim
machine. This may be useful in a rough first pass at assessing
whether a suspected machine was compromised by Code Red.
Matt Power
BindView Corporation, RAZOR Team
mhpower () bos bindview com
----------------------------------------------------------------------------
This list is provided by the SecurityFocus ARIS analyzer service.
For more information on this free incident handling, management
and tracking system please see:
http://aris.securityfocus.com
Current thread:
- Initial analysis of the .ida "Code Red" Worm aleph1 (Jul 17)
- Re: Initial analysis of the .ida "Code Red" Worm Matt Power (Jul 18)
