Security Incidents mailing list archives

Re: Spamming, 'hidden' mail server


From: Karl Levinson <levinson_k () despammed com>
Date: 10 Oct 2003 11:54:45 -0000

In-Reply-To: <20031008230117.GT92397 () sentex net>

It seems to me that analyzing the network traffic to guess what this might be is optional, whereas capturing, analyzing 
and removing the executable from the machines is mandatory.  So that's the direction I'd want to go in first.  Assuming 
that these are Windows machines and you aren't concerned about preserving evidence, the things recommended in the 
previous day's thread titled "strange windows behaviour" should still be helpful here, some of which are summarized 
here:

using something like ActivePorts or Foundstone's Fport to determine which executable is listening on that port;

a personal firewall if necessary to determine which executable is sending on a given port;

looking at the startup locations and services in the registry, possibly with the help of tools like the MSCONFIG 
command, Startup Cop, etc.

if you can't see the executable on the file system, scanning for hidden NTFS streams using tools like the one from 
Foundstone or the tool mentioned in the other thread;

if you can't see the executable on the file system, consider looking for windows root kits by booting to an alternate 
OS such as boot floppy or slaving the hard drive, or by connecting to the computer from another computer across the 
network using the Client for Microsoft Networks and possibly also running an antivirus scan remotely that way.

Then, if one or more antivirus scanners with the latest updates still don't detect it, you can submit the file to 
antivirus vendors, inspect the executable in your lab, etc.



I've been debugging a weird spamming problem lately -- customers with almost
zero technical knowledge have been spamming, and virus scans have not shown
anything yet.  Below is a dump of traffic traversing port 3101 of one of our
customers connections, which I've been looking at for the past couple of
hours.

But this looks remarkably like a remotely-started SMTP daemon, set up as an
open relay.  Take a look at this.  This doesn't look like a normal 3-way
handshake.  Apologies for length:

---------------------------------------------------------------------------
----------------------------------------------------------------------------


Current thread: