Does anyone know anything about this new virus?

Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

kageakuma

Thread Starter
Joined
Jun 17, 2004
Messages
29
Was wondering if anyone knew what i am up against.
Some kind of sasser.b virus or a new variant that labels itself as sasser.b seems to be installed on some of the clients where i am at. I was wondering if anyone knows what the new variant is or for that matter a place where i can find out about it. We just got this virus yesterday and it registers as sasser.b but propigates as sasser.l and is not recognized as sasser. It shuts down the computers every 15 minutes and its labeled as a new form of adaware but its not. Im looking for suggestions anyone.
 

kageakuma

Thread Starter
Joined
Jun 17, 2004
Messages
29
I tried that already actually. I have tried various fixes our network has been down for 2 days because of this thing. I am desperate here if anyone knows anything about this can you please let me know?

What I am thinking is happening is that the virus is spoofing its name with symantec. It is saying that its sasser.b or the source code is like it enough to spoof them so you cant report the new virus. If anyone can get more information on it please tell me anything you know.
 
Joined
Sep 12, 2003
Messages
20,583
Description:

This worm exploits the Windows LSASS vulnerability, which is a buffer overrun that allows remote code execution and enables an attacker to gain full control of affected systems. This vulnerability is discussed in detail in the following pages:

* MS04-011_MICROSOFT_WINDOWS
* Microsoft Security Bulletin MS04-011

Upon execution, it drops a copy of itself in the Windows folder as AVSERVE2.EXE.

Note that its previous counterpart, WORM_SASSER.A, uses the file name AVSERVE.EXE for its copy.

Unlike the previous variant that only creates one mutex named Jobaka3l, this SASSER variant creates the following mutex instead:

* Jobaka3
* JumpallsNlsTillt

If an instance of JumpallsNlsTillt is found on a system, this malware does not proceed with its execution.

To propagate, this worm sends a specially-crafted packet to TCP port 445 of random IP addresses. However it skips certain RFC 1918-reserved addresses. The packet causes a buffer overrun on vulnerable systems, which results in the execution of a remote shell that opens port 9996. This worm commands the remote shell to download its copy from the original infected source via port 5554 using FTP.

This worm can cause LSASS to crash and force Windows to restart. In this case, the following message boxes may appear:

Important: Apply the critical patch related to the Windows LSASS vulnerability, which is available at the following Microsoft page:

http://www.microsoft.com/technet/security/bulletin/ms04-011.mspx

Notes on Windows 2003 Server:

* Analysis and tests done on this malware show that it can execute and create registry entries on Windows 2003 server, but it fails to exploit the LSASS service in the said operating system version.
* Although Microsoft reports that the Windows 2003 Server is also vulnerable to the LSASS exploit, there may exist a code error within the malware exploit packet that prevents it from exploiting the LSASS vulnerability on the said platform.

Blocking of Ports

Users and administrators are strongly advised to block TCP ports 5554 and 9996 to prevent the transfer of the SASSER worm from infected systems to unpatched machines.

APPLYING PATCHES

Download the latest patches. Information on the vulnerability exploited by this malware and corresponding patch can be found at the following link:

Microsoft Security Bulletin MS04-011:
http://www.microsoft.com/technet/security/bulletin/ms04-011.mspx

-- Tom
 
Status
This thread has been Locked and is not open to further replies. Please start a New Thread if you're having a similar issue. View our Welcome Guide to learn how to use this site.

Users Who Are Viewing This Thread (Users: 0, Guests: 1)

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 807,865 other people just like you!

Latest posts

Staff online

Members online

Top