[AusNOG] Conficker virus variants and April 1st

Richard Billington richard at auscert.org.au
Tue Mar 31 10:18:23 EST 2009


Hi Andrew and all,

Thought this may be of interest in relation to identification.

Researchers have found that Conficker leaves a fingerprint because of how
it changes the Windows network stack. This fingerprint can be checked for
with tools such as nmap.

Nmap has released a new (beta) release that enables Conficker infections
just by scanning the network.

For more information (including commands for Conficker scanning) see:
  http://insecure.org/

An original tool (before it was added into nmap) is also available:
  http://iv.cs.uni-bonn.de/uploads/media/scs.zip

And further info can be found at these sites:
  http://www.honeynet.org/
  (https://www.honeynet.org/node/389)
  http://iv.cs.uni-bonn.de/wg/cs/applications/containing-conficker/

Happy Scanning

Regards,
Richard

--
Security Analyst           |  Hotline: +61 7 3365 4417
AusCERT                    |  Fax:     +61 7 3365 7031
Australia's National CERT  |  WWW:     www.auscert.org.au
Brisbane QLD Australia     |  Email:   auscert at auscert.org.au


> Having noticed some of our guest users infected with the Conficker 
> virus, I've been working on methods to block access and identify 
> internal users of ours that are infected with the Conficker virus variants.
> Before anyone notes I should be managing these computers better with 
> virus updates etc: Note that we [AccessPlus] provide transient user 
> access.. hotspots and the like so *nyah!* :-)
> 
> Has anyone else been looking at this in their own networks?
> If not, as it stands the Current variant (Conficker.C) is poised to 
> become active on April 1st, however we have no knowledge of exactly what 
> the system will do when all computers come online.
> 
> Theres quite a bit of detail on the varients available online, including 
> a pre-predicted list of 250 domains per day that variants A and B try to 
> phone home to - 
> http://blogs.technet.com/msrc/archive/2009/02/12/conficker-domain-information.aspx
> 
> As for variant C, it generates a list of 50,000 domains each day and 
> attempts to connect to 500 of those.
> Full info on variant C can be found  - 
> http://mtc.sri.com/Conficker/addendumC/index.html
> 
> ---
> One of the most devious things I've discovered in my quest to block 
> conficker for my users is the way the DNS system on conficker.c works, 
> dropping duplicated IP's (obvious spoofing from an ISP's side) or any 
> IP's from an internal blacklist - 
> http://mtc.sri.com/Conficker/addendumC/appendix2.html
> ---
> 
> Regards,
> Andrew Cox
> AccessPlus HNA
> 
> 
> _______________________________________________
> AusNOG mailing list
> AusNOG at lists.ausnog.net
> http://lists.ausnog.net/mailman/listinfo/ausnog



More information about the AusNOG mailing list