[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-Disclosure] DCOM WORM Killer 2.0
- To: full-disclosure@lists.netsys.com
- Subject: Re: [Full-Disclosure] DCOM WORM Killer 2.0
- From: w g <xillwillx@yahoo.com>
- Date: Fri, 15 Aug 2003 18:49:05 -0700 (PDT)
<P><A href="http://illmob.org/rpc/cleaners/dcom2.zip">http://illmob.org/rpc/cleaners/dcom2.zip</A></P>
<P>kills and removes the blaster worm and the b and c variants of it. all in a pretty little package of 1.62kb (gotta love assembly) </P>
<P> Coded in MASM by:<BR> illwill <BR> <A href="mailto:xillwillx@yahoo.com">xillwillx@yahoo.com</A> <BR> <A href="http://www.illmob.org/">www.illmob.org</A> <BR></P>
<P> DCOM worm killer (W32.Blaster.Worm) <BR> Aliases: W32/Lovsan.worm [McAfee], Win32.Poza [CA], Lovsan [F-Secure]<BR> WORM_MSBLAST.A [Trend], W32/Blaster-A [Sophos], W32/Blaster [Panda]<BR>WORM_MSBLAST.B [Trend], Win32.Poza.C [CA], W32/Lovsan.worm.c [McAfee], Worm.Win32.Lovesan [KAV]<BR>etc..... blablablabla keep changing it motherfuckers we'll still find yer ass :)</P>
<P><BR> This program is a tool to remove the malicious worm(s)<BR> that spread through exploiting the DCOM RPC vulnerability using TCP port 135. <BR> This worm attempts to download the msblast.exe file to the %WinDir%\system32 directory and execute it.<BR> Once executed it creates a hidden Cmd.exe remote shell that will listen on TCP port 4444, <BR> allowing an attacker to issue remote commands on the infected system.<BR> This tool was made to Automate the process of removing the worm from memory and all files related to it.</P>
<P>-------------------------------------------------------------------------<BR> Directions:<BR> 1. Execute the file called DCOM2.exe<BR> a. Deletes the registry values that have been added.<BR> b. Terminates the W32.Blaster.Worm, W32.Blaster.B.Worm, and W32.Blaster.C.Worm viral processes. <BR> c. Deletes the W32.Blaster.Worm, W32.Blaster.B.Worm and W32.Blaster.C.Worm files. <BR> d. Deletes the dropped files. </P>
<P>-------------------------------------------------------------------------<BR>Tech Info:<BR>Startup registry keys-<BR> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run<BR> "windows auto update"="msblast.exe"<BR> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run<BR> "windows auto update"="penis32.exe"<BR> HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run<BR> "Microsoft Inet Xp.."="teekids.exe"</P>
<P>Dropped files-<BR> Windows system directory (c:\windows\system32 c:\winnt\system32)<BR> 'msblast.exe' 'penis32.exe' 'teekids.exe' 'root32.exe' 'index.exe'</P>
<P>Source:<BR><A href="http://illmob.org/sources/DCOM2.html">http://illmob.org/sources/DCOM2.html</A><BR><A href="http://illmob.org/sources/DCOM2.asm">http://illmob.org/sources/DCOM2.asm</A><BR></P><p><hr SIZE=1>
Do you Yahoo!?<br>
<a href="http://us.rd.yahoo.com/evt=10469/*http://sitebuilder.yahoo.com">Yahoo! SiteBuilder</a> - Free, easy-to-use web site design software