Symantec’s site is also reporting another virus (technically a worm) targetting the MS05-039 vulnerability. This one is called w32.esbot.a and is also rated at level 3 on their 5 level threat assessment scale.
This one creates a mutex called mousebm so that it can only run once. It creates a file called mousebm.exe in the system folder (WinNT / Windows /as the case may be).
It runs itself as a service…
Service Name: mousebm
Display Name: Mouse Button Monitor
Description: Enables a computer to maintain synchronization with a PS/2 pointing device. Stopping or disabling this service will result in system instability.
Path to executable: %System%mousebm.exe
Inserts itself into Explorer.exe
then it modifies a registry key with
“EnableDCOM” = “N”
in the registry subkey:
to disable DCOM.
“restrictanonymous” = “1″
to the registry subkey:
to restrict anonymous network share access.
It creates a readonly file at %Windir%debugdcpromo.log
connects using port 30722 to
esxt.legi0n.net (IRC servers)
to await commands
The command set included allows…
Download and execute files
List, stop, and start processes and threads
Launch Denial of Service (DoS) attacks
Find files on local hard disks
Scans for computers and attempts to exploit the Microsoft Windows Plug and Play Buffer Overflow Vulnerability (described in Microsoft Security Bulletin MS05-039). If successful, the worm sends shell code to the remote machine.
All of the above from Symantecs writeup at their site. They also have removal instructions. Hopefully the attention paid to zotob will help get this one cleaned out as well since it uses the same vulnerability. It sounds as though this could be a sleeper and may not give many outward signs of infection.
Related PostsRelated Posts
- WMF vulnerability not an accident? Was it an intentional backdoor? I'm not quite sure if I'm willing to attribute to design, what I could attribute to a mistake... but, slashdot has pointed out that Steve Gibson in his latest Security Now! podcast (link is to transcript), is suggesting that it appears as though the WMF vulnerability of recent weeks appears......
- More on the Windows WMF zero-day exploit There seems to be quite a bit developing on the Windows Meta File (WMF) zero-day (0-day) exploit which was first reported yesterday. Sans has raised their alert level to yellow in an effort to get attention to this problem. It looks like the original site serving the exploit is down,......
- The latest and greatest in Malware Removals I have started referring to malware more and more lately because the term virus doesn't exactly describe the pests I see on peoples machines and the terms spyware or adware aren't doing justice to some of these pests either. (There are many pieces of what I would consider malware that......
- Review of: Brute Force RSS (An RSS Blasting Service) Brute Force SEO has long been a popular solution for businesses and individuals looking to create a more efficient web presence online. Taking things one step further, Brute force RSS, an RSS blasting service, is creating this same type of improved web presence, but this time focusing on corporate blogs......
- Free Registry Cleaner- Free Download Safely Scan And Repair Registry Problems A good registry cleaner can help fix several common computer ailments. If you're experiencing problems such as frequent error message, slow bootups, crashes and freezes, and overall sluggish performance, you probably have errors in the Windows registry. These errors can cause Windows to "trip" over itself when looking for files......
- REG file parser using the Boost Spirit Parser Framework I would like to thank the people who developed the following projects - they made the implementation of this project easier: I want to say a personal thank you to Silviu Simen for his article "INI file reader using the Spirit library". There was a project in which I took......
- Zotob details
- Zotob worm bites big media outlets
- Esbot and Zotob updates….
- Windows cleanmgr takes too long at compress old files
- If the cumulitive IE patch fails to install