Mal...where?

Fighting the Global War on Malicious Code

Worms, Part 3

So...looks like Mr. Rinbot has decided to release a new version of the beastie through computers already infected with the recent Rinbot.BC variant. Symantec is supposedly detecting this one as Rinbot.BF, though the variant mentioned in the write-up is NOT the same as the recent nasty, which runs from a file named "norantivirus.exe" in the Windows\System32 directory.

File name: norantivirus.exe
File size: 252416 bytes
MD5: e0fd62d3d4c0258547690524563d8419
SHA1: a63f017a3ab3405465ba90ba5377f30674aedbd3
packers: EXECryptor

AhnLab-V32007.4.21.004.20.2007no virus found
AntiVir7.3.1.5304.22.2007BDS/VanBot.CN
Authentium4.93.804.20.2007no virus found
Avast4.7.981.004.21.2007no virus found
AVG7.5.0.46404.22.2007Win32/CryptExe
BitDefender7.204.22.2007no virus found
CAT-QuickHeal9.0004.21.2007Backdoor.VanBot.cn
ClamAVdevel-2007041604.23.2007no virus found
DrWeb4.3304.22.2007BackDoor.IRC.Sdbot.1323
eSafe7.0.15.004.22.2007Win32.VanBot.cn
eTrust-Vet30.7.358504.21.2007Win32/Nirbot.AZ
Ewido4.004.22.2007Backdoor.VanBot.cn
FileAdvisor104.23.2007no virus found
Fortinet2.85.0.004.23.2007W32/VanBot.BX!worm
F-Prot4.3.2.4804.20.2007no virus found
F-Secure6.70.13030.004.23.2007Backdoor.Win32.VanBot.cn
IkarusT3.1.1.504.23.2007Backdoor.Win32.VanBot.cn
Kaspersky4.0.2.2404.23.2007Backdoor.Win32.VanBot.cn
McAfee501404.20.2007W32/Nirbot.worm.gen
Microsoft1.240504.23.2007no virus found
NOD32v2221004.22.2007no virus found
Norman5.80.0204.21.2007W32/Malware.PXQ
Panda9.0.0.404.22.2007no virus found
Prevx1V204.23.2007Malware.Trojan.Backdoor.Gen
Sophos4.16.004.20.2007W32/ExDns-Fam
Sunbelt2.2.907.004.19.2007no virus found
Symantec1004.23.2007W32.Rinbot.BF
TheHacker6.1.6.09504.15.2007no virus found
VBA323.11.404.21.2007no virus found
VirusBuster4.3.7:904.22.2007no virus found
Webwasher-Gateway6.0.104.23.2007Trojan.VanBot.CN

In addition, it was found active on a system running a vulnerable version of Symantec Client Security, but with NEW definitions loaded -- it was not detected upon a manual scan, either. Strange. Many of the vulnerable systems have already been exploited, cleaned, and patched with the BC run, though, so this one may have a harder time of things. Until there's a new 0-day to target, and there remains one dormant backdoored system on the network...

If nothing else, this is a reminder that a backdoor on a system is not just a risk for the user -- it's a backdoor into an entire network, and, conceivably, any and every computer on it.

- David

Labels: ,

posted by David @ 7:23 PM,

0 Comments:

Post a Comment

<< Home


Web This Blog

About me

    I'm David From Atlanta, Georgia, United States -- I'm a Computer Science undergrad at Emory University seeking to go into Network Security after grad school. More than that, I am a follower of Christ and a Christian, living the Journey and learning from others who are doing the same. My family and home rest in Fredericksburg, VA.
    My profile

Archives

Previous Posts

Helpful Sites

Favorite Forums

Favorite Blogs

Powered By

Powered by Blogger>