RPC DCOM Worm On The Loose 604
GPez writes "The first of I'm sure many RPC DCOM worms affecting Windows is on its way, according to the Internet Storm Center. Patch those systems!" According to the site, "The worm uses the RPC DCOM vulnerability [affects Win2k through Server 2003] to propagate. Once it finds a vulnerable system, it will spawn a shell on port 4444 and use it to download the actual worm via tftp."
users being hit hard (Score:5, Informative)
all xp users though
Credit... (Score:5, Informative)
ISP call center is hammered (Score:1, Informative)
Security Advisory (Score:5, Informative)
After reading the advisory, it looks like this one is going to be a bad one. I'm no expert, but I would guess that this thing is going to be around as long as code red was (and I'm still getting code red hits in my logs!)
Effects (Score:5, Informative)
Cagliostro
UNC-Chapel Hill South Campus Hit Hard (Score:3, Informative)
UNC-Chapel Hill South Campus [Medicine, Pharmacy, Nursing, etc] has been slammed by this thing.
The tragic part is that Microsoft posted the patch almost a month ago:
Virus Worm Out (Score:2, Informative)
I work for a small ISP
And the computer restarts.. This happens about every 40-60 Seconds making it "almost" impossible to Patch the Computer. Just a heads up for ANY IT Guys out there
Increase in TCP 135 Activity (Score:5, Informative)
57,003 1200 to 1230
75,317 1230
59,321 1300
52,642 1330
130,932 1400
202,996 1430
277,183 1500
247,682 1530
320,919 1600
361,504 1630 to 1700
milspec
Re:Port 4444 (Score:3, Informative)
Erkk (Score:3, Informative)
All I can say is change the properties of your RPC service repair functions. Start -> Administrative Tools -> Component Services -> Services (local). this will at least give you time to go online and download the MS patch, which we should have done weeks ago I know
Not quite safe: (Score:5, Informative)
win2k machines are still vulnerable to a dos; even patched.
Thanks microsoft...
Re:Port 4444 (Score:5, Informative)
Windows XP Symptoms (Score:2, Informative)
So, if you have strange issues with the RPC, or are experiencing similar symptoms as I have, patch up now!
Where was this story 3 hours ago? (Score:4, Informative)
More diagnoses info (Score:5, Informative)
The first is a system shutdown window tellign you that the RPC service must be restarted,. This gives you 30 seconds before reboot. Iniated by NT Authority\system. This is a succesful XP infection
The other is Windows cannot open this file:
File: TFTp784
This appears to be an unsuccesful try.
For windows 2000 it crashes svchost trying to get in it appears. Just apply the patch to stop the crashes. It does not appear to get into the system in this case
Hope this helps everyone
Cagliostro
I had the worm already today... (Score:2, Informative)
First? Not even close (Score:2, Informative)
How to patch (Score:3, Informative)
The first is necessary because it is the buffer overrun which reboots the computer.
Solution (Score:2, Informative)
Control-Alt-Delete to get to Task Manager. Look for a process msblast. Kill that process. Using Task Manager, start a new process called regedit. Using regedit, navigate to HKLM\Software\Microsoft\Windows\CurrentVersion\Ru
http://download.microsoft.com/download/9/8/b/98
Restart. That should do it.
I was *nailed* by this thing over the weekend (Score:5, Informative)
Odd, I thought. I *am* the administrator.
I realized I had been hit by a virus or worm when I rebooted and the autoexec.bat file opened up during my login. Not good.
Norton didn't pick up on this one at all; furthermore, McAfee's online virus/worm searching tool found a related virus, but not the actual baddie.
The virus that McAfee located - which probably came in after the worm opened up all those ports in my firewall - were in \WINNT\msagent\intl. Basically, anything in that directory that *isn't* a
The worm itself is in \WINNT\system32\, and is called 'msconfig[nn].exe', where [nn] is interchangeable with two numbers. Mine was 'msconfig35.exe', I've read reports on various forums of others w/ '32' and '33' after the 'msconfig'.
Be careful here, as this app will spawn identical, hidden copies of itself with random names (like 'dwigjenjig.exe' or 'zajdfanltef.exe'). The easiest way I found to discern between real MS files and the worm was by looking at the last modified date displayed by Explorer, vs the last modified date that pops up when you mouse over the file name. All of the worm files had discrepancies between the two.
Hope that helps someone out there!
Stanford and Cal hit hard by RPC exploit! (Score:4, Informative)
And Cal(Berkeley) is blocking their network from outside access [theargusonline.com] starting today for four days. Makes me wonder how many other large networks have been compromised, but don't know it.
I'm glad I don't work at Stanford.....don't envy them having to wipe 2,400 machines and sort through files that need to be replaced.....trying to avoid trojans, etc
The fun begins... (Score:3, Informative)
I have a feeling this worm will hit especially hard on home broadband users that never touch Windows Update.
Quick-Fix (Score:4, Informative)
Re:The fun begins... (Score:3, Informative)
He called me because he got this "strange error message" when he logged in, saying that there was "something wrong" with RPC, and that he had 1 minute to save his files before the machine rebooted. I thought "riiight, RPC.. I guess we need to check your running processes and your registry here..". And of course, msblast.exe was running. He wasn't using Windows XP's built in firewall either. A portscan using GRC.com Shield's UP! revealed the story: His machine was wide open. No we're patching, patching and even more patching.
Re:Effects (Score:5, Informative)
1) Delete msblast.exe (usually found at: winnt\system32\msblast.exe)r rentVersion\Run\windows auto update" . That key should contain the "msblast.exe" process, and is what starts it up again on reboot.
2) delete the Registry key: "HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Cu
3) Patch DCOM, or you'll just get this again.
Confirmed some details (Score:3, Informative)
After the "to say LOVE YOU SAN!!" string, I find these words: bill gates you make hi possi. And before it, it looks like it says "I ju wan to say" (with control characters that may or may not be of interest).
Sure enough, Symantec [symantec.com] has some info now, too (just sent by someone in my co.).
Timing sucks on this one -- I'm right in the middle of coding for 3rd quarter tax changes. Crap!
Re:Great (Score:2, Informative)
http://www.k-otik.com/exploits/07.30.dcom48.c
Re:users being hit hard (Score:3, Informative)
I found that the msblast.exe has a mechanism to restore itself if removed from the registry. Have to wait for the rest of the analysis before you can even start to clean up the machines.
(which you may want to mention to management is a hell of a lot more time consuming and expensive than patching would have been)
ISC Advisory (Score:5, Informative)
NOTE: the scanning is being done Code Red style, so it is concentrating on the class B pseudo-subnet, e.g. 123.123.x.x. If this gets inside your corporate firewall then you are screwed.
I count about 1 scan every 10 seconds at present.
--x8 Cut here ----
This RPC DCOM worm started spreading early afternoon EDT (evening UTC). At this point, it is spreading rapidly.
**********
NOTE: PRELIMINARY. Do not base your incidents response solely on this writeup. **********
Increase in port 135 activity: http://isc.sans.org/images/port135percent.png
The worm may launch a syn flood against windowsupdate.com on the 16th. It has the ability to infect Windows 2000 and XP.
The worm uses the RPC DCOM vulnerability to propagate. One it finds a vulnerable system, it will spawn a shell on port 4444 and use it to download the actual worm via tftp. The exploit itself is very close to 'dcom.c' and so far appears to use the "universal Win2k" offset only.
Infection sequence: 1. SOURCE sends packets to port 135 tcp with variation of dcom.c exploit to TARGET
2. this causes a remote shell on port 4444 at the TARGET
3. the SOURCE now sends the tftp get command to the TARGET, using the shell on port 4444,
4. the target will now connect to the tftp server at the SOURCE.
The name of the binary is msblast.exe. It is packed with UPX and will self extract. The size of the binary is about 11kByte unpacked, and 6kBytes packed:
MD5sum packed: 5ae700c1dffb00cef492844a4db6cd69 (6176 Bytes)
So far we found the following properties:
- Scans sequentially for machines with open port 135, starting at a presumably random IP address
- uses multiple TFTP servers to pull the binary
- adds a registry key to start itself after reboot
Name of registry key:
SOFTWARE\Microsoft\Windows\CurrentVersion\R
Strings of interest:
msblast.exe
I just want to say LOVE YOU SAN!!
billy gates why do you make this possible ? Stop making money and fix your software!!
windowsupdate.com
start %s
tftp -i %s GET %s
%d.%d.%d.%d
%i.%i.%i.%i
BILLY
windows auto update
SOFTWARE\Microsoft\Windows\CurrentVersion
Existing RPC DCOM snort signatures will detect this worm. The worm is based on dcom.c
Re:This is just sick. (Score:3, Informative)
Fix We use at our internet provider for WinXP (Score:2, Informative)
Internet Connection Firewall (Score:2, Informative)
Darn, I really need to configure wingate properly, thought i had it tight...
Win NT4? (Score:2, Informative)
More Information (Score:2, Informative)
Re:Where was this story 3 hours ago? (Score:2, Informative)
Catch-22 cleanup (Score:3, Informative)
Here's a work-around I've been talking some of my relatived through tonight. It's not something I'd normally want to expose them to, but it certainly saves me a visit to do it myself!
Re:On the way? (Score:5, Informative)
If the server is not firewalled, but it is patched, the msbash.exe worm probing can crash the RPC service. Which then crashes Exchange, Some AD stuff, some windows explorer stuff, and other things (including windows update). It can still bring the DMZ servers to their knees EVEN IF THEY ARE PATCHED.
You are only fully protected if you are both patched AND the 135/445 ports are shut off from the internet. (No naked DMZ stuff.)
I personally patched all the DMZ servers with the hotfix the day it came out, then some other servers with SP4 that included the exploit fix Only the SP4 ones are unaffected.
Note, I am talking about services available, none of the boxes in question actually got infected. The infection attempt caused the problem.
Naked un-firewalled computers are going to get this thing, and get it bad.
It will be interesting to see if that August 16th date pans out to be a dDOS or what...
[Note, auto update is fine for PCs, but is fucking dangerous for production servers. Sometimes the updates do not play nice with whatever is there, if it happens when so-and-so is on vacation there could be real trouble. Do what you gotta do, but I am never going to let MS put anything on my stuff. You'll probably see when someone figures out how to spoof that and gets all 375 of your boxes rooted due to Windows Update.]
Patching an infected system online solved. (Score:2, Informative)
connected to the net do the above steps look for both MSBLAST and msblast in the registry.
Also create a
!joatlanta@@yahoo.com
Re:SP3? (Score:2, Informative)
Re: To Delete msblast: 1st End Process "msblast" (Score:3, Informative)
Re:Already Patched! (Score:2, Informative)
Apache (running on my aforementioned patched win2k server) keeps logging a bunch of http requests matching that of code red... appearantly even that one is still floating around.
"I guess I wonder why windows can't make it more difficult for people to create self spreading virus ? Linux, BSD, and UNIX don't SEEM have these self spreading virus. Don't you ever wonder why MS with all is billions of spare dollars, can't prevent this?"
Actually, Linux has some known (nasty) worms out there, too. I should know, one of my linux servers was hit by a nasty one a couple years ago. Now, had I kept up with security notices & patched my systems more regularly as I do now that wouldn't have been a problem. These days I am on the CERT advisory mailing list, and a few others as well.
W32.Blaster.Worm Removal Tool (Score:3, Informative)
Re:Effects (Score:2, Informative)
1. you should KILL the msblast process first, otherwise you won't be able to delete the file as it will be held open.
2. The file msblast.exe is marked as read-only. This generally won't be a problem, but can be a gottcha if you try and delete it from a CMD shell without running attrib -r msblast.exe first.
3. You should patch the system and reboot before attempting to remove the virus, otherwise you're open to reinfection from the moment you kill the msblast process.
4. This thing causes odd behaviour on different systems. When svchost.exe gets killed on w2k pro, that stops cut and paste working. If you're running office, word will behave VERY oddly. If you're browsing your hard drive, some directories may appear to have no files in them, when in fact they really do, and lastly, IE may fail to draw some of the images on some web sites.
Re:Credit... (Score:3, Informative)