Security Incidents mailing list archives
RE: New Trojan
From: "James C. Slora, Jr." <james.slora () phra com>
Date: Fri, 31 Oct 2003 09:50:14 -0500
I wrote:
Downloads: http://vvv.goling2003.com:53/stop.bat http://vvv.goling2003.com:53/inf.ooo ftp.goling2003.com/ap216.exe (different type of log - URL may be incomplete)
After examining source code, the ftp link above is correct. ftp.goling.com no longer resolves on a lot of networks, which helps mitigate the risk. The latest exploit from the Coreflood author delivered two previously undetected files. New names for these detections are listed below. filename: inf[1].hta (downloaded as Inf.ooo, name changed in IE cache due to HTA MIME type declaration from the hostile server) result: This file is infected with Backdoor.Coreflood.d This file is a new version of the Backdoor.Coreflood.dr downloader. It is a VB Script that downloads stop.bat via HTTP and ap216.exe via FTP. filename: ap216.exe (detected as Backdoor.Coreflood) This file is the installer for Autoproxy and the botnet client. It's packed with UPX. filename: stop.bat result: This file is infected with Trojan.KillAV This file attempts to kill a short list of AV and PF product services.
I DO think that the "goling" and "chinesenaming" strings are persistently relevant, and are not mere one-time distractions. Block *.goling.com *.goling2003.com *.chinesenaming.com
--------------------------------------------------------------------------- Network with over 10,000 of the brightest minds in information security at the largest, most highly-anticipated industry event of the year. Don't miss RSA Conference 2004! Choose from over 200 class sessions and see demos from more than 250 industry vendors. If your job touches security, you need to be here. Learn more or register at http://www.securityfocus.com/sponsor/RSA_incidents_031023 and use priority code SF4. ----------------------------------------------------------------------------
Current thread:
- RE: New Trojan James C. Slora, Jr. (Nov 03)
