-----BEGIN PGP SIGNED MESSAGE-----
===========================================================================
A U S C E R T A L E R T
AL-2001.11 -- AUSCERT ALERT
W32/Leave.B Worm
13 July 2001
===========================================================================
PROBLEM:
AusCERT has received reports of a new Win32 based worm that has
been detected entering some Internet sites. Leave.B, which is a
variant of the Leave.A worm, has two methods of spreading.
The first method by which the variant Leave.B spreads is by
scanning for hosts that have been previously compromised and have
had the SubSeven trojan horse program installed. SubSeven may have
been installed by a user unknowingly running another piece of
malicious software, or by an intruder exploiting a vulnerability
in the system.
The second method by which Leave.B spreads is via a fake virus
warning email message crafted to look like a Microsoft Security
Bulletin. This fake bulletin directs the user to download a file
which is claimed to be a patch from Microsoft, but is actually
the Leave.B worm itself.
The virus described is a hoax and the link to the "patch" does
not point to Microsoft's server at all, but to a free hosting
server. The supposed "patch" ("cvr58-ms.exe") is Win32.Leave.B
worm.
The fake message begins with the following text:
**BEGIN FAKE MESSAGE**
Subject: Microsoft Security Bulletin MS01-037
The following is a Security Bulletin from the Microsoft
Product Security Notification Service.
Please do not reply to this message, as it was sent from
an unattended mailbox.
********************************
--------------------------------------------------------
Title: Vulnerability in Windows systems allowing an upload
of a serious virus.
Date: 30 June 2001
Software: Windows 2000
Impact: Privilege Elevation
Bulletin: MS01-037
**END FAKE MESSAGE**
There is a real Microsoft Security Bulletin MS01-037 which begins
with the following text:
**BEGIN REAL MICROSOFT BULLETIN**
Subject: Microsoft Security Bulletin MS01-037
From: Microsoft Product Security <secnotif@MICROSOFT.COM>
Date: Thu, 5 Jul 2001 18:08:16 -0700 (Fri 11:08 EST)
To: MICROSOFT_SECURITY@ANNOUNCE.MICROSOFT.COM
The following is a Security Bulletin from the Microsoft
Product Security Notification Service.
Please do not reply to this message, as it was sent from
an unattended mailbox.
********************************
-----BEGIN PGP SIGNED MESSAGE-----
- -
- --------------------------------------------------------
Title: Authentication Error in SMTP Service Could
Allow Mail Relaying
Date: 05 July, 2001
Software: Windows 2000
Impact: Mail Relaying
Bulletin: MS01-037
**END REAL MICROSOFT BULLETIN**
When the worm is executed, it copies itself into the Windows system
directory (eg C:\WINDOWS or C:\WINNT) with the filenames REGSV.EXE
and/or SERVICE.EXE. Depending on the operating system version,
the worm creates one of the registry keys and values of the
following format. This causes REGSV.EXE or SERVICE.EXE to run
when Windows is started:
Registry keys:
HKEY_LOCAL_MACHINE\Software\Microsoft\
Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\
Windows\CurrentVersion\RunServices
Key values:
regsv = %windir%\regsv.exe
service = %windir%\service.exe
PLATFORM:
Leave.B is a Win32 executable and poses a threat to Microsoft
Windows operating systems that run Win32 (32-bit) applications.
These systems include, but are not limited to Windows ME, Windows
NT4 and Windows 2000.
IMPACT:
Leave.B has the ability to download and run executable files from
Web sites, scan IP addresses, and connect to IRC (Internet Relay
Chat) servers and execute IRC commands. The effect of this is
that an intruder could execute arbitrary commands on the
compromised hosts. Additionally, the worm itself can create,
move, delete, execute files on the infected computer.
RECOMMENDATIONS:
A. Detection
It is vital to check for the presence of both the worm and the
existence of the SubSeven trojan horse program on potentially
affected systems. This may be accomplished using a current version
of an anti-virus program that is certified by the vendor to detect
them.
Variants of the worm may be using different filenames on the
affected systems. Check for the existence of C:\WINDOWS\Regsv.exe
(or C:\WINNT\Regsv.exe on Windows NT and Windows 2000 systems) or
C:\WINDOWS\Service.exe (or C:\WINNT\Service.exe on Windows NT and
Windows 2000 systems).
Microsoft security bulletins are cryptographically signed with
PGP. Sites are strongly encouraged to validate the PGP signature
on any security bulletin before following the enclosed information.
B. Recovery
If you detect that your system is already compromised, then
you may need to instigate a full recovery procedure.
You should keep in mind that if a machine is compromised,
anything on that system could have been modified, including
the kernel, binaries, datafiles, running processes, and
memory. In general, the only way to trust that a machine
is free from backdoors and intruder modifications is to
reinstall the operating system from the distribution media
and install all of the security patches before connecting
back to the network. Merely determining and fixing the
vulnerability that was used to initially compromise this
machine may not be enough.
We encourage you to restore your system using known clean
binaries. In order to put the machine into a known state,
you should re-install the operating system using the original
distribution media. You should also ensure that you have
applied all relevant security fixes and patched all
application software according the latest vendor information.
For detailed information about recovering from a system compromise,
there are several documents available from:
http://www.auscert.org.au/Information/Auscert_info/papers.html
eg. Windows NT Intruder Detection Checklist
Steps for Recovering from a UNIX or NT System Compromise
which can provide some assistance.
C. User Education
System Administrators are urged to inform their users about proper
precautions with regards to handling email attachments.
AusCERT recommends that sites should update and check their virus
defences and either delete or quarantine any email messages or
attachments that resemble those described above or in the following
links.
D. Update Anti-Virus Packages
System administrators and users are urged to ensure that the latest
Anti-Virus software is installed and that it is using the most
current up-to-date virus databases.
More information can be found at:
http://www.europe.f-secure.com/v-descs/leave.shtml
http://www.antivirus.com/vinfo/virusencyclo/default5.asp?VName=TROJ_LEAVE.B
http://www.symantec.com/avcenter/venc/data/w32.leave.b.worm.html
http://www.sophos.com/virusinfo/analyses/w32leavea.html
http://www.cai.com/virusinfo/encyclopedia/descriptions/l/leaveb.htm
AusCERT is continuing to monitor this problem.
- ---------------------------------------------------------------------------
For more information contact your Anti-Virus software vendor.
- ---------------------------------------------------------------------------
The AusCERT team has made every effort to ensure that the information
contained in this document is accurate at the time of publication. However,
the decision to use the information described is the responsibility of
each user or organisation. The appropriateness of this document for an
organisation or individual system should be considered before application
in conjunction with local policies and procedures. AusCERT takes no
responsibility for the consequences of applying the contents of this
document.
If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).
AusCERT maintains an anonymous FTP service which is found on:
ftp://ftp.auscert.org.au/pub/. This archive contains past SERT
and AusCERT Advisories, and other computer security information.
AusCERT maintains a World Wide Web service which is found on:
http://www.auscert.org.au/.
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business
hours which are GMT+10:00 (AEST). On call
after hours for emergencies.
Postal:
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
AUSTRALIA
===========================================================================
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key
iQCVAwUBO08iBih9+71yA2DNAQHnMAP/RpjjdtvtcnVA3qXbc3J8G3nAvFQbjBsg
45LW5J/F3ADjaypTsiCOfWSgGXiPesFvBuY9rKOnHZ/rmVUM3Gw868AE9Nogak6x
z6i3JEzOUCLyEE6EhBYfOaS+jfKIkwxGE+Fe4SShaWunxWWoO3XaNSa6mwwRSxzU
5PII90idCzc=
=nCNC
-----END PGP SIGNATURE-----
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH