[60184] in North American Network Operators' Group
New or existing virus/vulnerability in Windows software?
daemon@ATHENA.MIT.EDU (Dan Lockwood)
Sat Aug 2 15:59:43 2003
Date: Sat, 2 Aug 2003 12:59:04 -0700
From: "Dan Lockwood" <dlockwood@shastalink.k12.ca.us>
To: "NANOG" <nanog@merit.edu>
Errors-To: owner-nanog-outgoing@merit.edu
This is a multi-part message in MIME format.
------_=_NextPart_001_01C35930.86562B4A
Content-Type: text/plain;
charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Everyone,
=20
We are having fits with a new? virus or vulnerability. The simptoms are
as follows: an executable saatg.exe "appears" in the startup folder of
the All Users group and after a reboot launches itself. It adds a
registry entry under
HKEY_LOCAL_MACHINE/Software/Microsoft/CurrentVersion/Run. The
executable shows under processes and seems to also launch additional
processes, e.g. ~1.exe, ~2.exe, ~3.exe, etc. I can not link any
malicious activity to this behavior, but it seems to be spreading like
wildfire on our network, apparantely with absolutely no user activity.
In testing I have do thus far it finds its was on to a _virgin_ system
that has been installed disconnected from the network with CD media
including all relevent security patches. Panda anti-virus does not seem
to detect it either. It shows up on systems where there is no
interactive login, e.g. servers, regular users, and users with elevated
privelages. Additionally once the executable is active is
systematically searches for other systems to share the good news with on
port TCP 135. I am aware of the recent vulnerabilities from Microsoft
regarding RPC and netbios, but again, the recommended security fixes do
not seem to provide any relief. Does anyone have any insight into what
this thing is? TIA
=20
Dan Lockwood
------_=_NextPart_001_01C35930.86562B4A
Content-Type: text/html;
charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD><TITLE>Message</TITLE>
<META http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<META content=3D"MSHTML 6.00.2800.1170" name=3DGENERATOR></HEAD>
<BODY>
<DIV><SPAN class=3D863504919-02082003><FONT face=3DVerdana=20
size=3D2>Everyone,</FONT></SPAN></DIV>
<DIV><SPAN class=3D863504919-02082003><FONT face=3DVerdana=20
size=3D2></FONT></SPAN> </DIV>
<DIV><SPAN class=3D863504919-02082003><FONT face=3DVerdana size=3D2>We =
are having fits=20
with a new? virus or vulnerability. The simptoms are as follows: =
an=20
executable saatg.exe "appears" in the startup folder of the All Users =
group and=20
after a reboot launches itself. It adds a registry entry under=20
HKEY_LOCAL_MACHINE/Software/Microsoft/CurrentVersion/Run. The =
executable=20
shows under processes and seems to also launch additional processes, =
e.g.=20
~1.exe, ~2.exe, ~3.exe, etc. I can not link any malicious activity =
to this=20
behavior, but it seems to be spreading like wildfire on our network, =
apparantely=20
with absolutely no user activity. In testing I have do thus far it =
finds=20
its was on to a _virgin_ system that has been installed disconnected =
from the=20
network with CD media including all relevent security patches. =
Panda=20
anti-virus does not seem to detect it either. It shows up on =
systems where=20
there is no interactive login, e.g. servers, regular users, and users =
with=20
elevated privelages. Additionally once the executable is active is =
systematically searches for other systems to share the good news with on =
port=20
TCP 135. I am aware of the recent vulnerabilities from Microsoft =
regarding=20
RPC and netbios, but again, the recommended security fixes do not seem =
to=20
provide any relief. Does anyone have any insight into what this =
thing=20
is? TIA</FONT></SPAN></DIV>
<DIV><FONT face=3DVerdana size=3D2></FONT> </DIV>
<DIV align=3Dleft><FONT face=3DVerdana size=3D2>Dan=20
Lockwood</FONT></DIV></BODY></HTML>
=00
------_=_NextPart_001_01C35930.86562B4A--