• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Code Red II LogFile Fingerprints

IaPuP

Golden Member
Can anyone give me a FOR SURE logfile fingerprint on the *ENTIRETY* of the Code Red II worm??

I'm aware of the "default.ida" buffer overflow fingerprint, but I want to know if any of the "root.exe" files that are executed by default of if those must be exploited manually by a malicious user.

I have a fingerprint of several days of repeated attempts to compromise the system through various "root.exe" copies of the Command Shell. Also, I have logs of an effective comprimise of "root.exe" and the installation of "admin.dll" and the replacement of "httpodbc.dll" via this backdoor.

I need to know whether to pursue the source of these attacks further or whether to chalk it up to a random-IP scan.


Please, no "only idiots get Code Red" comments- I'm just here to clean up someone else's mess. 🙂


Thanks!!

Eric
 
That looks more like the nimda worm. I am not positive as my logs only show the scans, no infections.
 
I just took a look at the CERT website. It is, in fact, Nimda. I didn't realize it used the CodeRed II holes to get in. 🙂

Thanks, I'm scanning the system now.

Eric
 
Back
Top