JS/SQLSpida.worm (listed both Spida.a and Spida.b versions)
McAfee AVERT Assessment: LOW
This worm targets Microsoft SQL servers. It probes the Internet for SQL servers on port 1433 and compromises those servers using the default SQL administrator account "SA". SQL administrators should take appropriate action to ensure that the "SA" account is not vulnerable. For information on securing your SQL server see: SQL Server w/ Blank SA Password Opens Vulnerability to Worm.
NOTE:
THIS IS NOT AN SQL VULNERABILITY! This virus is spread due to insecure systems.
VARIANT "A"
Once a SQL server has been accessed, the worm creates the NT user "sqlagentcmdexec", sets a password on that account, adds the user to the local administrators group and adds the user to the "Domain Admins" group.
The worm then writes several files to the compromised server and kicks off the propagation routine.
VARIANT "B"
Once a SQL server has been accessed, the worm activates the NT user guest, sets a password on that account, adds the user to the local administrators group and adds the user to the "Domain Admins" group.
The worm then writes several files to the compromised server and kicks off the propagation routine.
SYMPTOMS
Presence of the following files:
%WinDir%\system32\drivers\services.exe
%WinDir%\system32\sqlexec.js
%WinDir%\system32\clemail.exe
%WinDir%\system32\sqlprocess.js
%WinDir%\system32\sqlinstall.bat
%WinDir%\system32\sqldir.js
%WinDir%\system32\run.js
%WinDir%\system32\timer.dll
%WinDir%\system32\samdump.dll
%WinDir%\system32\pwdump2.exe
METHOD OF INFECTION
This worm uses several files to accomplish its task.
services.exe - A port scanning utility
sqlexec.exe - Establishes the SQL connection and initiates the xp_cmdshell commands.
clemail.exe - A command line SMTP emailer tool
sqlprocess.js - Calls SQLDIR.JS, IPCONFIG /ALL, and PWDUMP redirecting the output of each tool to SEND.TXT. The contents of SEND.TXT are placed into the body of an email message and sent to the addresses: "system@digitalspider.org", "system@hiddennet.org", "system@infinityspace.net. The worm attempts to delete the files that it created.
sqlinstall.bat - Creates the NT account as described in the Characteristics section of this description; Copies the files mentioned here to the target system, and activates SQLPROCESS.JS on the remote system.
sqldir.js - Tool to display database information
run.js - Shell run tool
timer.dll - Contains timer function
samdump.dll - Used by PWDUMP2.EXE
pwdump2.exe - Dumps the SAM database
The worm scans port 1433 on the following IP addresses, and infects systems that are vulnerable:
IP = A.B.C.D where:
A = random number [not equal to] 10 or 127 or 172 or 192
B = random number 0 - 255
C = 1-255
D = 1-254
REMOVAL
Detection will be completely performed by DAT 4204 found here.
-- Manual Removal Instructions --
Delete all files mentioned in the Symptoms section of this description.
Securing your SQL server (see SQL Server w/ Blank SA Password Opens Vulnerability to Worm)
Also make sure you have a secure password for your SA account or any administrator account.
W32/Benjamin.worm
McAfee AVERT Assessment: LOW
When this worm is run, it copies itself to %WINDIR%\SYSTEM\EXPLORER.SCR, where %WINDIR% is the directory Windows is installed in. Then it adds the registry key:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\
Run\SystemService=%WINDIR%\SYSTEM\EXPLORER.SCR
To spread, the worm requires that the Kazaa software is installed on the machine. It creates a directory called %WINDIR%\TEMP\SYS32, and changes the Kazaa settings so that remote users can download from this directory. Then it copies itself to that directory under many different names which other users may search for. The size of these files can vary since the worm pads them with garbage bytes. This method of spreading is comparable to the VBS/GWV worm.
SYMPTOMS
Presence of EXPLORER.SCR and registry key pointing to it.
Presence of %WINDIR%\TEMP\SYS32 and many files inside.
METHOD OF INFECTION
Since this worm offers itself over the Kazaa network under names that users may find tempting, users who are not infected may download and run the worm from infected machines, and thus spread the worm themselves. Again, this worm spreads via the KAZAA sharing software.
REMOVAL
Detection and removal will be possible with DAT 4204 found here.
FatesWebb
if you do what I suggested it is not my fault...