Show full size 924Board.org
Discussion Forum of 924.org
 
 FAQFAQ   SearchSearch   MemberlistMemberlist   UsergroupsUsergroups   RegisterRegister 
 ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 
 Technical FAQ924 FAQ (Technical)   Technical924 Technical Section   Jump to 924.org924.org   Jump to PCA 924 Registry924 Registry

NEW WORM ON THE LOOSE- Shuts your machine off every 2 minute
Goto page 1, 2, 3  Next
 
Post new topic   Reply to topic    924Board.org Forum Index -> General Discussions
View previous topic :: View next topic  
Author Message
Phogphire1  



Joined: 05 Apr 2003
Posts: 293
Location: Portland, OR

PostPosted: Tue Aug 12, 2003 2:10 pm    Post subject: NEW WORM ON THE LOOSE- Shuts your machine off every 2 minute Reply with quote

It appears that a new worm (for now we're calling it msblast after its executable, msblast.exe) has surfaced today. It attacks port 135/tcp (that's Netbios), creates lots of RPC noise - some users report random machine shutdowns and reboots - and once it takes up residence in your computer, it proceeds to scan a random IP range and propagate itself to unprotected machines. Since this worm is brand, spanking new it may not be detected by (even recently updated) anti-virus software.. so get that firewall up and secured!

_http://msn.com.com/4520-6600_16-5062407.html?part=msn&subj=ns&tag=msn_home

_http://isc.sans.org/diary.html?date=2003-08-11

_http://news.com.com/2100-1002_3-5062364.html?tag=fd_top

_http://www.symantec.com/avcenter/venc/data/w32.blaster.worm.html

_http://vil.nai.com/vil/content/v_100547.htm



You can also apply this patch from MS

http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=2354406c-c5b6-44ac-9532-3de40f69c074

PC SHUTDOWN PROBLEMS - RPC EXPLOIT/REMOTELY RESTARTING

IDENTIFIED AS THE W32.Blaster.Worm VIRUS

W32.Blaster.Worm is a worm that will exploit the DCOM RPC vulnerability using TCP port 135. It will attempt to download and run a file, msblast.exe

------------------------------------------------------------------------------------------------

TO CANCEL THE SHUTDOWN GO TO START -> RUN -> TYPE CMD TO ACCESS CMD PROMPT AND
TYPE (SHUTDOWN -A) TO CANCEL IT.

DO CTRL+ALT+DELETE AND KILL MSBLAST.EXE FROM THE PROCESSES LIST

GO TO C:\WINDOWS\SYSTEM32 AND FIND MSBLAST.EXE AND RENAME IT TO BLASTMS.BAK (DON'T DELETE IT SINCE I DON'T KNOW IF IT IS AN IMPORTANT FILE, IF ITS A VIRUS IT WILL NOT
BE ABLE TO START IF U RENAME IT, RENDERING IT USELESS.)

NOW GO TO C:\WINDOWS\PREFETCH AND DELETE THE FILE THAT HAS MSBLAST.EXE IN ITS NAME.
(IT STARTS WITH MSBLAST.EXE IN ITS FILENAME)

THE VIRUS ADDS A REGISTRY VALUE TO AUTO LOAD WHEN WINDOWS STARTS UP, YOU MUST DELETE THE REGISTRY KEY.

1. Click Start, and then click Run. (The Run dialog box appears.)
2. Type regedit

3. Then click OK. (The Registry Editor opens.)

4. Navigate to the key:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

5. In the right pane, delete the value:

"windows auto update"="msblast.exe"

6. Exit the Registry Editor.

INSTALL THE PATCH FOR YOUR SYSTEM FROM THE LINKS BELOW

NON SP1 USERS =
.http://microsoft.com/downloads/details.aspx?FamilyId=2354406C-C5B6-44AC-9532-3DE40F69C074&displaylang=en

SP1 USERS = .http://securityresponse.symantec.com/avcenter/security/Content/8205.html
_________________
Extremism in the defense of liberty is no vice. And moderation in the pursuit of justice is no virtue.

Life, Liberty and the Pursuit of thoose that dare screw with it.
Back to top
View user's profile Send private message Yahoo Messenger
Minus000  



Joined: 29 May 2003
Posts: 363
Location: Sidney, B.C.

PostPosted: Tue Aug 12, 2003 5:19 pm    Post subject: Reply with quote

oww jeez. I actually got it. Thanks. I was able to fix the crashing myself but I thought that it was just crashing, I didn't relize it was a worm and also still sending out information. I think this is the first time iv heard off a virus on the news that iv had.
Back to top
View user's profile Send private message Send e-mail
5150  



Joined: 04 Dec 2002
Posts: 767
Location: Blyth, Northumberland, UK

PostPosted: Tue Aug 12, 2003 5:25 pm    Post subject: Reply with quote

Also known as Win32/Poza and Lovsan. Doesnt appear to infect win95 or 98 though, only NT, 2000 and XP...
Back to top
View user's profile Send private message Send e-mail
Neil924  



Joined: 18 Mar 2003
Posts: 4225
Location: Canada

PostPosted: Tue Aug 12, 2003 7:57 pm    Post subject: Reply with quote

Look out for: TFTPxxx (xxx being a number) showing up during their computer restart process.

These files appear to be either temporary or marker files left behind by a Trojan running the TFTPD.EXE Windows application (this is a valid Windows file being used by the Trojan; likely to attempt file sharing between systems). This is an exploit of a new Windows vulnerability. The following Windows vulnerability...

http://support.microsoft.com/?kbid=823980

...has been announced and various Anti-virus makers report an increasing amount of traffic attempting to probe that vulnerability in Windows.

These attacks will only increase over time unless people IMMEDIATELY download and install the Windows patch described above. You can further help yourself by installing a firewall of some sort between you and the Internet. There are a number of free software firewalls that work just fine. Two, in particular, are often mentioned...

Sygate Personal Firewall - http://www.sygate.com/
Zone Alarm by ZoneLabs - http://www.zonelabs.com/

FILExt takes no position on which one of these (or others) you should use. It's your choice but you should make the choice and use something. If you have a continuous connection to the Internet instead of dial-up you should strongly consider getting a hardware firewall.

The TFTPxxx files appear to be in the Startup Group in Windows. You should be able to see them in the directory...

C:\Documents and Settings\All Users\Start Menu\Programs\Startup\TFTPxxxx

...or by choosing Start | Program Files | Startup

Delete these files (they may be read only and, if so, you may have to right click the file, select Properties, and uncheck the ReadOnly attribute).

That should solve the immediate TFTPxxx file showing up at system start problem.

Now comes the worse part...getting rid of whatever caused the problem. For this you really should have updated anti-virus software. By scanning your system it should find and handle the appropriate files for you. Again, FILExt makes no specific recommendation if you don't have any. A list of the major anti-virus software vendors can be found here...

http://www.cknow.com/vtutor/vtavsoftware.htm

So far, two different things have been identified as coming through the RPC vulnerability: Trojan/Autoroot and W32.Spybot.Worm. (Note: It's possible these are the same thing as different companies call the same malware by different names at times. It takes awhile for the various companies to update their listings with all the different names.)

In addition to the TFTPxxx files, the following file name have also been implicated in this incident and related to Spybot.Worm:

C:\WINDOWS\system32\ijexwcessr.exe
C:\WINDOWS\pss\webdav.exeCommon Startup
C:\Documents and Settings\All Users\Start Menu\Programs\Startup\webdav.exe
C:\WINDOWS\pss\TFTPxxxCommon Startup
C:\WINDOWS\pss\TFTPxxxCommon Startup
C:\WINDOWS\System32\MSCONFIG32.EXE

(In all cases the "xxx" is some number.)

In the Trojan/Autoroot case the following file names appear:

RPC.EXE, RPCTEST.EXE, TFTPD.EXE, WORM.EXE, LOLX.EXE and DCOMX.EXE (WORM.EXE and is an SFXArchive that contains the three files RPC.EXE, RPCTEST.EXE and TFTPD.EXE.)

Finally, some folks have found a program named like TFTP.EXE-2FB50BCA.pf (the number may vary). This program also seems related to this incident and should probably be copied off to disk (so you can recover it if it turns out to be a red herring and not related to this incident).

So, in short, be certain to get that patch whatever you do. The more patched systems, the less the new exploits will spread to others. Then, be certain to scan your system with updated anti-virus software and keep it up to date on a daily basis as the AV companies are fighting this thing as I write this.
Back to top
View user's profile Send private message
Phogphire1  



Joined: 05 Apr 2003
Posts: 293
Location: Portland, OR

PostPosted: Tue Aug 12, 2003 11:48 pm    Post subject: Reply with quote

BUMP
_________________
Extremism in the defense of liberty is no vice. And moderation in the pursuit of justice is no virtue.

Life, Liberty and the Pursuit of thoose that dare screw with it.
Back to top
View user's profile Send private message Yahoo Messenger
Stu2j  



Joined: 03 Nov 2002
Posts: 1285
Location: Virginia Beach, VA

PostPosted: Wed Aug 13, 2003 1:10 am    Post subject: Reply with quote

Join the 21st century.

A hardware firewall eliminates these problems.

Are folks still using dial up services?
_________________
-Stu
924 owner since 1988
924S owner since 2002
Click here to view them:
Back to top
View user's profile Send private message Send e-mail Visit poster's website MSN Messenger
Neil924  



Joined: 18 Mar 2003
Posts: 4225
Location: Canada

PostPosted: Wed Aug 13, 2003 6:35 am    Post subject: Reply with quote

I'm not on dial up and I don't have a firewall
Back to top
View user's profile Send private message
Lizard  



Joined: 03 Nov 2002
Posts: 9364
Location: Abbotsford BC. Canada

PostPosted: Wed Aug 13, 2003 8:01 am    Post subject: Reply with quote

to stop comp from restarting right click my computer and go into manage, then click on services and aplications, then click services, and look through the list for remote procedure call there will be 2 (1 will have locator beside it u dont want this one) open the 1 that doesn't list locator and u will see 3 drop down boxes, set them all to take no action click ok then update virus softrware
_________________
3 928s,
Back to top
View user's profile Send private message Send e-mail
Neil924  



Joined: 18 Mar 2003
Posts: 4225
Location: Canada

PostPosted: Wed Aug 13, 2003 8:59 am    Post subject: Reply with quote

My computer is done. I'm saving 35 GB of info then restoring the system. I had 30 files infected and 28 erased, 2 worms are still present so I'm cleaning house. 1 win32blaster worm and 2 win32spybot worm. ANYone know what these are???
Back to top
View user's profile Send private message
Lizard  



Joined: 03 Nov 2002
Posts: 9364
Location: Abbotsford BC. Canada

PostPosted: Wed Aug 13, 2003 9:37 am    Post subject: Reply with quote

yah they are the worms that are causing your comp to restart, if you follow the steps in my last post then get your norton AV updated you should be able to fix it instead of restarting the comp
_________________
3 928s,
Back to top
View user's profile Send private message Send e-mail
jamez  



Joined: 03 Nov 2002
Posts: 401
Location: Chehalis, Wa

PostPosted: Wed Aug 13, 2003 9:58 am    Post subject: Reply with quote

wow, I had it to.. thanks you saved my day
Back to top
View user's profile Send private message Send e-mail Visit poster's website
Phogphire1  



Joined: 05 Apr 2003
Posts: 293
Location: Portland, OR

PostPosted: Wed Aug 13, 2003 11:13 am    Post subject: Reply with quote

http://download.nai.com/products/mcafee-avert/stinger.exe

Is also a repairer. I have'nt tried it.
_________________
Extremism in the defense of liberty is no vice. And moderation in the pursuit of justice is no virtue.

Life, Liberty and the Pursuit of thoose that dare screw with it.
Back to top
View user's profile Send private message Yahoo Messenger
Phogphire1  



Joined: 05 Apr 2003
Posts: 293
Location: Portland, OR

PostPosted: Wed Aug 13, 2003 11:15 am    Post subject: Reply with quote

Neil924 wrote:
I'm not on dial up and I don't have a firewall


I created a thread with links to free Firewall, anti-virus, and spyware remover. Before you re-load or restore, Try AVG, to remove and heal infected files.
_________________
Extremism in the defense of liberty is no vice. And moderation in the pursuit of justice is no virtue.

Life, Liberty and the Pursuit of thoose that dare screw with it.
Back to top
View user's profile Send private message Yahoo Messenger
78porsche924  



Joined: 14 Dec 2002
Posts: 1217
Location: Newark, DE(near where DE,MD and PA meets)

PostPosted: Wed Aug 13, 2003 11:56 am    Post subject: Reply with quote

I was wondering wtf was up with my comp. Apparently my subscription to norton ran out. Thanks for the heads up, i have the random restarts with the network server file(dunno what it is called, i forgot) and i always get this can't open file tftp1507 whenever i start my comp.

Thanks again guys.
_________________
90 944 S2
78 924 NA <---now sold and killed by new owner
snailshell trans
Bae turbo kit
to check out my 944 S2 http://www.cardomain.com/member_pages/view_page.pl?page_id=388139
Back to top
View user's profile Send private message Send e-mail Visit poster's website AIM Address Yahoo Messenger
Phogphire1  



Joined: 05 Apr 2003
Posts: 293
Location: Portland, OR

PostPosted: Wed Aug 13, 2003 12:03 pm    Post subject: Reply with quote

78porsche924 wrote:
I was wondering wtf was up with my comp. Apparently my subscription to norton ran out. Thanks for the heads up, i have the random restarts with the network server file(dunno what it is called, i forgot) and i always get this can't open file tftp1507 whenever i start my comp.

Thanks again guys.



I think that the tftp problem is explained


Code:

BKDR_CIREBOT.A

This is a new virus and uses a exploit in windows all versions to install multipul backdoors. The side effect of this virus. is it will cause your system to crash warning that something went wrong with RPC then it will tell you it is going to reboot the system.

The first thing you need to do if you have this error and a reboot is to, start back up the system. do a ctrl-alt-del go to proccesses and end task on
RPC.EXE
RPCTEST.EXE
DCOMX.EXE
TFTPD.EXE
LoLX.exe

once that is done it should stop it from crashing. You will then need to go to these directories and manually delete these files.
C:\helped.exe
C:\lolx.exe
C:\rpc.exe
C:\rpctest.exe
C:\WINDOWS\system32\dcomx.exe
C:\WINDOWS\system32\lolx.exe
and on xp and winnt/2k make sure you also delete C:\TFTPD.EXE

After that you need to edit the reg for 2 entries i only found one i deleted that one the other i could not find however i have not had a reacurence. here is the reg keys that need to be edited.

Open Registry Editor. To do this, click Start>Run, type Regedit, then press Enter.
In the left panel, double-click the following:
HKEY_LOCAL_MACHINE>Software>Microsoft>Windows>
CurrentVersion>Run
In the right panel, locate and delete the entry:
system = “dcomx.exe”
In the left panel, double-click the following:
HKEY_LOCAL_MACHINE>Software>Microsoft>Windows>
CurrentVersion>RunServices
In the right panel, locate and delete the entry:
system = “dcomx.exe”
Close Registry Editor.

After all that is done download the Microsoft Patch and stop this from ever happening again here is a link to all the patches for different flavors of win.

All Flavors:
http://www.microsoft.com/technet/treeview/?url=/technet/security/bulletin/MS03-026.asp

And For those that are lazy as can be here is a cleaner released by Trend AntiVirus.

Cleaner:
http://www.trendmicro.com/download/tsc.asp

_________________
Extremism in the defense of liberty is no vice. And moderation in the pursuit of justice is no virtue.

Life, Liberty and the Pursuit of thoose that dare screw with it.
Back to top
View user's profile Send private message Yahoo Messenger
Display posts from previous:   
Post new topic   Reply to topic    924Board.org Forum Index -> General Discussions All times are GMT + 10 Hours
Goto page 1, 2, 3  Next
Page 1 of 3

 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum


Powered by phpBB © 2001, 2005 phpBB Group