Code Red v.3 - getting nastier...

Medea

Golden Member
Dec 5, 2000
1,606
0
0
(No surprise that new builds will be more destructive. Hard to believe that people still haven't applied the patch. Link)

"A new version of the Code Red worm, a self-propagating malicious computer program that exploits a known Microsoft IIS web server software vulnerability to comprise Microsoft Windows 2000 computer systems is currently spreading in the field.

Unlike previous versions, the new variant of Code Red manipulates system settings, alters Windows files, and drops and launches a trojan program resulting in leaving the infected computer open to remote connection and compromise.

Please note that the analysis below is preliminary. Computer Associates anti virus researchers are sill investigating the worm and any updates on the analysis will be published on Computer Associates Web site.

Preliminary results indicate that the worm will only work on Windows 2000 systems running vulnerable version of Microsoft IIS. After infecting a machine the worm copies CMD.EXE to the

\inetpub\scripts
and
\program files\common files\system\msadc on the C: and D: drives of the attacked systems.

The worm will than start scanning the network for other infectable system in order to spread. The attack runs for 24 hours, 48 hours if it is a Chinese language system.

After executing the attack code, the worm drops a file called Explorer.exe into the root directories of the C: and D: drives. The dropped file is 8,192 bytes in size. Next the system is rebooted and the dropped trojan file is executed during the boot process.

The trojan first launches the original Windows Explorer, than disables Windows system file protection that prevents applications from modifying system files by setting

HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SFCDisable=0xFFFFFF9D

The default value for this setting is 0.

After that the trojan creates 2 virtual IIS directories called C and D that are mapped to the root directories of the C: and D: drives by manipulating values of the

HKLM\SYSTEM\CurrentControlSet\Services\W3SVC\Parameters\Virtual Roots

key.

These virtual directories are created with read, write and execute privileges effectively giving hackers full access to the C: and D: drives of an infected system through IIS.

After that the trojan goes into a loop and will redo the registry changes outlined above every 10 minutes.

The worm itself cannot be detected by anti virus software because it is not file based. Most AV software will catch the dropped trojan when it is written to disk. However if a system has been infected and rebooted before the appropriate signature was installed, it is very hard to determine if a hacker accessed that system after it was compromised and what kind of changes have been done to the system. In this case the only completely safe way to disinfect an infected system is to completely reinstall it."
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
There should have been 10's of thousands of out of work MCSE's because of the first batch...
 

DefRef

Diamond Member
Nov 9, 2000
4,041
1
81
It's hard to have any sympathy for anyone getting hit after the FIRST round because it's an easy patch and reboot to protect themselves. That's called an "I-D-Ten-T user error". (Write it out.;))
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0


<< It's hard to have any sympathy for anyone getting hit after the FIRST round because it's an easy patch and reboot to protect themselves. That's called an "I-D-Ten-T user error". (Write it out.;)) >>



And the first wave should have hit 3 people. Maybe less. That was a chair to keyboard interface error...
 

Russ

Lifer
Oct 9, 1999
21,093
3
0


<< because it's an easy patch and reboot to protect themselves. >>



Hell, in IIS 5.0, you don't even have to reboot.

Russ, NCNE
 

Viper GTS

Lifer
Oct 13, 1999
38,107
433
136
Code Red & it's variants will continue to be a bitch until every last server admin gets off their lazy ass & patches their goddamned servers.

The first time was forgiveable, the second time was not. This time we should be invoking the death penalty.

Viper GTS
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0


<< Patch was released 3 months ago... >>



And THAT right there is why all of these MCSE's should be fired.
 

Russ

Lifer
Oct 9, 1999
21,093
3
0


<< This time we should be invoking the death penalty. >>



Spoken like somebody who's fielding tech support calls from Cisco 67x users.:)

BTW, Viper, did I mention that the tech support people I get here are idiots? Most recent problem was ns1.uswest.net not releasing a domain name (tacube.com) I just moved to my own server. Everybody in the world could access the site and all the Cnames, but me. Took four phonecalls, and about eight people before I got ahold of somebody who knew what "authoritative" meant.

Russ, NCNE

 

Viper GTS

Lifer
Oct 13, 1999
38,107
433
136


<<

<< This time we should be invoking the death penalty. >>



Spoken like somebody who's fielding tech support calls from Cisco 67x users.:)
>>



Damn straight. Although, we have had very good results with moving the web port & more recently (Thursday) CBOS 2.4.3. CBOS 2.4.3 eliminates Code Red susceptibility, and also happens to resolve some routing issues (namely routing from private vipx addresses to public statics). All in all it's a very worthwhile update. But it's going to be hell walking all the morons through the update. It's amazing how many people tossed out their dial-up modems when they got DSL, don't remember their exec passwords, don't know anything about their network, etc.

And I'd have to agree with you on the .NET support being idiots. DNS issues are pretty straightforward to deal with, although the techs you talk to can't fix it they have one call access to the people who can. The problem is getting it through their heads what the problem is.

Tech Support id10t: So let me get this straight: Everyone outside the Qwest network can access your web sites, but anybody inside the Qwest network can't? I think we need to re-write your router.

D'oh!

Viper GTS