Santa IM Worm (bot) update

Published: 2005-12-22
Last Updated: 2005-12-22 20:06:28 UTC
by Marcus Sachs (Version: 1)
0 comment(s)
More details came to us on the Santa IM worm discussed earlier.  We were able to capture and examine the malware and found that is hosting it.  When executed, resolves to and attempts connections to tcp/53.  If we discover more details we will issue further updates.

Further info: renames itself to c:\windows\winrpc.exe, and sets itself up as the service "Windows RPC Services".  There is no rootkit built in, it is totally dependant on download instructions from the command and control site.  Rather than calling it a "worm" as was reported in the press, a more accurate description is that it's a bot with replicating capabilities.  Digging a bit deeper into the code, we found that it was also likely compiled/pushed to the distro point on 2005-12-18 18:09:11.000000000 -0500.

0 comment(s)


Diary Archives