[61896] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: dns.exe virus?

daemon@ATHENA.MIT.EDU (Christopher J. Wolff)
Mon Sep 8 19:11:12 2003

From: "Christopher J. Wolff" <chris@bblabs.com>
To: <bmanning@karoshi.com>,
	"'Chris Lewis'" <clewis@nortelnetworks.com>
Cc: <nanog@merit.edu>
Date: Mon, 8 Sep 2003 16:10:36 -0700
In-Reply-To: <200309082136.h88Lala11482@karoshi.com>
Errors-To: owner-nanog-outgoing@merit.edu


FYI,

I put the suspect file up at http://www.bblabs.com/dns.exe

Regards,
Christopher J. Wolff, VP CIO
Broadband Laboratories, Inc.
http://www.bblabs.com 

-----Original Message-----
From: owner-nanog@merit.edu [mailto:owner-nanog@merit.edu] On Behalf Of
bmanning@karoshi.com
Sent: Monday, September 08, 2003 2:37 PM
To: Chris Lewis
Cc: nanog@merit.edu
Subject: Re: dns.exe virus?


> Christopher J. Wolff wrote:
> 
> > Chris,
> > 
> > It was really odd.  Here is an example of what the two hosts .3 and
.4
> > were up to.
> 
> For grins, I ran that through our blacklist tool to see what it
coughed up.
> 
> Nothing was on our blacklists.
> 
> Had rDNS's like *.google.com, *.akamai.com, sprintbbsd, 
> ns2.granitecanyon.com, DNS root servers and a few non-resolving IPs.
> 
> DNS resolution loop perchance?

	From here, they all show up in the logs attemptin
	dynamic updates of  the in-addr.arpa domain. :)
	Time to suck pkts...  although I 'spect they are
	trying to perform stupid DNS tricks like:

	floss.local.in-addr.arpa.  A  10.10.10.10

--bill


home help back first fref pref prev next nref lref last post