Threat Level: green Handler on Duty: Daniel Wesemann

SANS ISC InfoSec Handlers Diary Blog


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

MyDoom.B Update

Published: 2004-01-29
Last Updated: 2004-02-01 03:46:25 UTC
by Handlers (Version: 1)
0 comment(s)
MyDoom.B is rapidly spreading, and using some new techniques in addition to features shown in yesterday's diary:

- MyDoom.B will replace the 'hosts' file on infected system. This file is used to override DNS resolution. If a system is infected with MyDoom.B, sites like support.microsoft.com, some anti virus sites (www.symantec.com, www.sophos.com, www.my-etrust.com and other) will no longer be reachable.

- There are reports that MyDoom.B will scan for systems which are infected with MyDoom.A, and it will upload itself to such systems.

- while MyDoom.A included code to launch a DDOS attack on www.sco.com, MyDoom.B modified the target host to www.microsoft.com

Recommendation

- closely monitor your network for excessive port 3127 traffic. It may pinpoint MyDoom.B infected systems. - MyDoom uses fake 'From' headers. DO NOT REPLY to infected messages. Some Antivirus filters will automatically notify the sender of an infected e-mail. Turn off this feature, as it may flood innocent bystanders.

Removal

Antivirus vendors are offering free removal tools. However, in particular for MyDoom.A, attempts have been observed to upload additional malware using the backdoor installed by the virus. A more thorough forensic analysis of the system may be necessary. Removal tools will only remove the specific virus, not any additional malware installed later.

Links

- MSFT Details about how to restore the hosts file:
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/alerts/mydoom.asp
- Network Associates analysis:
http://vil.nai.com/vil/content/v_100988.htm
- Trend Micro:
http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_MYDOOM.B
- Symantec:
http://securityresponse.symantec.com/avcenter/venc/data/w32.mydoom.b@mm.html
- Computer Associates:
http://www3.ca.com/virusinfo/virus.aspx?ID=38114
-------
Johannes Ullrich, jullrich@sans.org,http://isc.sans.org/contact.html
Keywords:
0 comment(s)
Diary Archives