[60399] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: RPC errors

daemon@ATHENA.MIT.EDU (Jack Bates)
Mon Aug 11 16:52:31 2003

Date: Mon, 11 Aug 2003 15:51:57 -0500
From: Jack Bates <jbates@brightok.net>
To: Sean Donelan <sean@donelan.com>
Cc: NANOG <nanog@merit.edu>
In-Reply-To: <Pine.GSO.4.44.0308111616400.3565-100000@clifden.donelan.com>
Errors-To: owner-nanog-outgoing@merit.edu


Sean Donelan wrote:

> http://isc.sans.org/diary.html?date=2003-08-11
> The worm uses the RPC DCOM vulnerability to propagate. One it finds a
> vulnerable system, it will spawn a shell and use it to download the actual
> worm via tftp.
> 
> The name of the binary is msblast.exe. It is packed with UPX and will self
> extract. The size of the binary is about 11kByte unpacked, and 6kBytes
> packed:
> 

That shows what I'm seeing. 10% of all outbound packets are tcp/135. 
Currently blocked both directions at edges in my network until further 
notice. Keeping an eye on other ports, but this is the only one causing 
any amount of load to draw concern.

-Jack


home help back first fref pref prev next nref lref last post