Full Disclosure mailing list archives

Re: KIT.GED


From: GuidoZ <uberguidoz () gmail com>
Date: Sat, 18 Dec 2004 03:20:22 -0500

Hello Raoul!

It might of been due to something ELSE running on your server. What
other services/ports are open? (SSH, Telnet, SMTP, VNC, etc) It's
possible another protocol or service was exploited, allowing access.
(Then might of just upped the kit for later retrieval from a malware
infection or something.)

Leaving it up there, then monitoring the traffic to it could prove to
be useful. I'd also highly advise looking through log files and the
event viewer for anything out of the ordinary, or related whatsoever.
Judging from the files contained in the kit, it looks like they were
preparing to cover their tracks if necessary.

If you'd like to send a copy of it my way, I'd be happy to peek at it
and see if anything else becomes obvious. You may send it to my virus
catch all - guidoz _AT guidoz _DOT_ com (Make the subject meaningful,
like "Rootkit from FD as requested" or something. Otherwise I'll skip
right over it thinking it's spam.) Will email you directly with any
results.

--
Peace. ~G


On Fri, 17 Dec 2004 11:33:25 +0300, Raoul Nakhmanson-Kulish
<raoul () elforsoft com> wrote:
Hello, all!

On one of our IIS servers (W2K fully patched, IIS Lockdown tool is
installed) I have found in WWW root directory a file named KIT.GED and
having size 834552 bytes.

This is a RAR-packed self-executable containing these files:

01.03.2004  18:16               10240 caclsENG.exe
18.01.2004  19:33               53760 carun.dll
24.06.2004  00:58                8609 carun.ocx
19.02.2004  01:15                 498 change.txt
24.06.2004  00:59               11780 chkdrv.vxd
24.06.2004  01:06               24646 install.cmd
01.03.2004  16:33                 356 logoff.txt
01.03.2004  16:32                1234 logon.txt
16.03.2004  02:34                5119 settimedate.exe
23.06.2004  23:02              800256 tskman.exe

Seems that this is a backdoor kit. Fortunately, it wasn't installed on
this webserver and on any server in our network

But how can somebody put this file in WWW root? What should we do to
prevent it for future?

Of course, I'll send this file or any listed above if required.

--
Best regards,
Raoul Nakhmanson-Kulish
Elfor Soft Ltd.,
ERP Department
http://www.elforsoft.ru/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: