Šta je novo?

PAZNJA: worm.sco napada!

kUdtiHaEX

Super ridža
Administrator
Učlanjen(a)
18.07.2001
Poruke
18,077
Poena
1,365
Moja oprema  
CPU & Cooler
Intel® Core™ i5-9500F, NZXT Kraken Z63
GPU
Asus GTX 2070 Super
Storage
Samsung 980 Pro NVMe 1 TB
Kućište
NZXT H210i
Monitor
LG C2 42"
Miš & tastatura
Logitech G502, Keychron K8, Nuphy Air75, Ducky TKL One 2
Ostale periferije
Glupi HP štampač
Laptop
Apple Macbook Pro 14" M1
Tablet
Apple iPad Pro 11"
Mobilni telefon
Apple iPhone 13 Pro Max
Pametni uređaji
Apple Watch Ultra
Pristup internetu
  1. Kablovski internet
Primio sam 10 poruka koje su u sebi sadrzale virus WORM.SCO, koji je kako citam na nekim konferencijama, poprilicno napravio problema...



Anyone else encountering this? I've just got hammered with a
few
>hundred of these in the last hour and a half and I can't quite discern
>what exactly the virii is. There doesn't seam to be a map from ClamAV
>virus naming format to any other. Anyone have a clue of what this virus
>is?
>
> I looked at the quarantine, and it seamed to be just the virii
>payload and no content, file.pif.exe. I've also seen it as a file.zip,
>doc.zip, document.zip, document.pif, rhn.scr, data.zip, message.zip,
>test.zip. There could be more, but I just don't have the time to check
>the payload on all the messages.
>
>-------------------AMAVIS REPORT------------------
>A virus (Worm.SCO.A) was found.
>
>Two banned names (file.pif, .exe) were found.
>
>Scanner detecting a virus: Clam Antivirus-clamd
>
>The mail originated from: <[email protected]>
>
>According to the 'Received:' trace, the message originated at:
> aol.com (unknown [12.9.171.xxx])
>
>The message WAS NOT delivered to:
><[email protected]>:
> 550 5.7.1 Message content rejected, id=28441-07 - VIRUS: Worm.SCO.A
>
>Virus scanner output:
> /var/amavisd/tmp/amavis-20040126T141220-28441/parts/part-00002:
>Worm.SCO.A FOUND
>
>The message has been quarantined as:
> /var/amavisd/quarantine/virus-20040126-141800-28441-07
>
>------------------------- BEGIN HEADERS -----------------------------
>Return-Path: <[email protected]>
>Received: from aol.com (unknown [12.9.171.xxx])
> by mta1.horizonusa.com (Postfix) with ESMTP id DFA572D8106
> for <[email protected]>; Mon, 26 Jan 2004 14:17:59 -0800
(PST)
>From: [email protected]
>To: [email protected]
>Subject:
>Date: Mon, 26 Jan 2004 14:17:47 -0800
>MIME-Version: 1.0
>Content-Type: multipart/mixed;
> boundary="----=_NextPart_000_0010_465EEF13.4CF1817C"
>X-Priority: 3
>X-MSMail-Priority: Normal
>Message-Id: <[email protected]>


According to this (http://www.math.org.il/newworm-digest1.txt) the worm
is supposed to die on Feb 12th 2004. A theory is that the DDoS attack
against SCO was just a plant, and not part of 'actual' operations on the
worm, i.e. to throw someone off while working on the worm. Its primary
function, besides spreading, seams to be the accepting a file transfer
on port 3127 then running it. Doesn't seam like a 'normal' spammer virii
tactic as some seam to be suggesting.

I haven't had time myself to pour through the assembly of the worm and
am going off the assembly provided in the document above. But they seam
to point out the bits and bytes pretty well.
 
Vrh Dno