Author Topic: New Worm Information - Everyone READ  (Read 720 times)

Offline Skuzzy

  • Support Member
  • Administrator
  • *****
  • Posts: 31462
      • HiTech Creations Home Page
New Worm Information - Everyone READ
« Reply #15 on: August 13, 2003, 06:16:52 PM »
Source ports are irrelevant, it's the destination port that is important.

4444 is the destination port used by the worm once it infects a system.  Port 135 is the port the worm initially enters.
Roy "Skuzzy" Neese
support@hitechcreations.com

Offline flakbait

  • Silver Member
  • ****
  • Posts: 867
      • http://www.worldaccessnet.com/~delta6
New Worm Information - Everyone READ
« Reply #16 on: August 13, 2003, 06:34:11 PM »
Ahhhh, gotcha. Thanks Skuzzmeister!



-----------------------
Flakbait [Delta6]
Delta Six's Flight School
Put the P-61B in Aces High

Offline lucull

  • Nickel Member
  • ***
  • Posts: 577
New Worm Information - Everyone READ
« Reply #17 on: August 15, 2003, 07:27:27 AM »
The worm starts on an infected system (A) a TFTP-server and attacks other Windows systems (B) on port 135. If an attack was succesful the infiltrated code will be executed, which opens a shell on port 4444 on system B. System A prompts system B via TFTP (tftp get msblast.exe) to download the file msblast.exe into the directory %WinDir%\system32 and execute it. After it, the worm installs itself on system B, closes port 4444, and opens a TFTP-server and attacks other systems.

The worm needs to know which system it attacks to be succesful. As it can't do that it uses offsets for Win2k and WinXP so far. In 80% of the cases it chooses WinXP, which causes the RPC service on Win2k to crash.

The microsoft patch for this exist since mid july. One problem is that the patch doesn't solve a problem in the RPC service which enables the ability for DoS attacks, therefor all ports UDP and TCP 135-139, 445 and 593 should be closed.

FYI, w32.blaster attacks also non-Windows systems if they have the Distributed Computing Environment (DCE) installed. DCE enables communication between different systems and uses also RPCs on port 135. It's often used in heterogeneous enviroments.
As w32.blaster is not able to detect what system he attacks, he attacks all systems with open port 135 and can crash the DCE-service on non-windows systems. Patches from IBM and Entegrity are available.