[Snort-sigs] Re: Workstations trying to GET /download/IEService215.chm HTTP/1.1 from

Matthew Jonkman matt at ...2436...
Mon Jul 12 19:19:01 EDT 2004

Crude snort rule to catch it:

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS ( 
msg:"BLEEDING-EDGE VIRUS Psyme Trojan Download"; 
uricontent:"/download/IEService215.chm"; nocase; sid:2000365; rev:1; )

Updates to it will be at www.bleedingsnort.com


Axel Pettinger wrote:

> "Humes, David G." wrote:
>>Starting around July 8th we noticed workstations trying to access
>> on port 80 and do a
>>GET /download/IEService215.chm HTTP/1.1
>>Analysis of the users' browsing activity did not reveal any pattern 
>>that would suggest that the activity was user-initiated.  We suspect 
>>that this is something trying to "phone home", but not sure quite 
>>what.  A reverse lookup of the IP just returns 
>>, and whois just tells me that it belongs to 
>>XO.  Has anyone else seen this and know what it is?
> The CHM file is according to Kaspersky a trojan downloader called
> "TrojanDownloader.VBS.Psyme.ak". It makes use of IE's ADODB problem to
> download and execute a trojan called "Trojan.Win32.StartPage.kf".
> Detection added last Saturday.
> The funny thing is that NAI's virus research lab (APAC) decided to call
> the "StartPage trojan" (only) a "potentially unwanted application" named
> "FindFast" ... Detection via "extra.dat" at the moment, probably later
> today in their DailyDAT files.
> BTW, is the patch for MS04-013 installed on the workstations you
> mentioned?
> Regards,
> Axel Pettinger

More information about the Snort-sigs mailing list