Symantec’s site is also reporting another virus (technically a worm) targetting the MS05-039 vulnerability. This one is called w32.esbot.a and is also rated at level 3 on their 5 level threat assessment scale.
This one creates a mutex called mousebm so that it can only run once. It creates a file called mousebm.exe in the system folder (WinNT / Windows /as the case may be).
It runs itself as a service…
Service Name: mousebm
Display Name: Mouse Button Monitor
Description: Enables a computer to maintain synchronization with a PS/2 pointing device. Stopping or disabling this service will result in system instability.
Path to executable: %System%mousebm.exe
Inserts itself into Explorer.exe
then it modifies a registry key with
“EnableDCOM” = “N”
in the registry subkey:
to disable DCOM.
“restrictanonymous” = “1″
to the registry subkey:
to restrict anonymous network share access.
It creates a readonly file at %Windir%debugdcpromo.log
connects using port 30722 to
esxt.legi0n.net (IRC servers)
to await commands
The command set included allows…
Download and execute files
List, stop, and start processes and threads
Launch Denial of Service (DoS) attacks
Find files on local hard disks
Scans for computers and attempts to exploit the Microsoft Windows Plug and Play Buffer Overflow Vulnerability (described in Microsoft Security Bulletin MS05-039). If successful, the worm sends shell code to the remote machine.
All of the above from Symantecs writeup at their site. They also have removal instructions. Hopefully the attention paid to zotob will help get this one cleaned out as well since it uses the same vulnerability. It sounds as though this could be a sleeper and may not give many outward signs of infection.
Related PostsRelated Posts
- The latest and greatest in Malware Removals I have started referring to malware more and more lately because the term virus doesn't exactly describe the pests I see on peoples machines and the terms spyware or adware aren't doing justice to some of these pests either. (There are many pieces of what I would consider malware that......
- More on the Windows WMF zero-day exploit There seems to be quite a bit developing on the Windows Meta File (WMF) zero-day (0-day) exploit which was first reported yesterday. Sans has raised their alert level to yellow in an effort to get attention to this problem. It looks like the original site serving the exploit is down,......
- Park Your Virus Impervious Smugness Mac (and Linux) Users [/caption] I use linux. I prefer it over Windows for many reasons. It's more resistant to viruses, less of a target, but that doesn't mean that malware or other viruses are impossible. If someone were to trick me into running something and even worse, trick me into using my administrator......
- Creating a Professional Corporate Blog There are three basic ingredients that are necessarily in building a successful and professional blog, which are the ability to provide high quality content, the need to develop a loyal readership, and the offering of quality products or services based on the niche or industry the blog is based in.......
- Review of: Brute Force RSS (An RSS Blasting Service) Brute Force SEO has long been a popular solution for businesses and individuals looking to create a more efficient web presence online. Taking things one step further, Brute force RSS, an RSS blasting service, is creating this same type of improved web presence, but this time focusing on corporate blogs......
- REG file parser using the Boost Spirit Parser Framework I would like to thank the people who developed the following projects - they made the implementation of this project easier: I want to say a personal thank you to Silviu Simen for his article "INI file reader using the Spirit library". There was a project in which I took......
- Zotob details
- Zotob worm bites big media outlets
- Esbot and Zotob updates….
- Windows cleanmgr takes too long at compress old files
- If the cumulitive IE patch fails to install