[Snort-sigs] Re: Workstations trying to GET /download/IEService215.chm HTTP/1.1 from 220.127.116.11
matt at ...2436...
Mon Jul 12 19:19:01 EDT 2004
Crude snort rule to catch it:
alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (
msg:"BLEEDING-EDGE VIRUS Psyme Trojan Download";
uricontent:"/download/IEService215.chm"; nocase; sid:2000365; rev:1; )
Updates to it will be at www.bleedingsnort.com
Axel Pettinger wrote:
> "Humes, David G." wrote:
>>Starting around July 8th we noticed workstations trying to access
>>18.104.22.168 on port 80 and do a
>>GET /download/IEService215.chm HTTP/1.1
>>Analysis of the users' browsing activity did not reveal any pattern
>>that would suggest that the activity was user-initiated. We suspect
>>that this is something trying to "phone home", but not sure quite
>>what. A reverse lookup of the IP just returns
>>22.214.171.124.ptr.us.xo.net, and whois just tells me that it belongs to
>>XO. Has anyone else seen this and know what it is?
> The CHM file is according to Kaspersky a trojan downloader called
> "TrojanDownloader.VBS.Psyme.ak". It makes use of IE's ADODB problem to
> download and execute a trojan called "Trojan.Win32.StartPage.kf".
> Detection added last Saturday.
> The funny thing is that NAI's virus research lab (APAC) decided to call
> the "StartPage trojan" (only) a "potentially unwanted application" named
> "FindFast" ... Detection via "extra.dat" at the moment, probably later
> today in their DailyDAT files.
> BTW, is the patch for MS04-013 installed on the workstations you
> Axel Pettinger
More information about the Snort-sigs