Threat Advisory: Network Associates McAfee AVERT raises risk assessment on newly discovered W32/Sasser.Worm.D

By Our Corporate Bureau | 06 May 2004

Mumbai: Network Associates, Inc, provider of intrusion prevention solutions, yesterday announced that McAfeeÒ AVERTÔ (Anti-virus and Vulnerability Emergency Response Team), the research division of Network Associates, has raised the risk assessment to medium for W32/Sasser.worm.d, also known as Sasser.d.

Sasser.d is the fourth self-executing variant in the Sasser family to attack the MS04-011 vulnerability announced by Microsoft in April. McAfee AVERT has raised the risk assessment to medium due to its prevalence in the field and its ability to move without the support of email, which has been the primary vehicle of delivery for most of the recent worms prior to the Sasser family. This new worm is a self-executable program that spreads by scanning random IP addresses for exploitable systems. To date, McAfee AVERT has received several reports of the worm being stopped or infecting users on several continents, with most of the reports coming from the United States and Europe.

Symptoms
Sasser.d is a self-executing worm that spreads by exploiting the Microsoft MS04-011 vulnerability http://www.microsoft.com/technet/security/bulletin/MS04-011.mspx. The primary purpose of the worm is to spread to as many vulnerable machines as possible by exploiting un-patched Windows systems, giving it the ability to execute without requiring any action on the part of the user. Once activated the worm copies itself to a folder in the Windows System directory and adds a registry run key to load at system start-up. Sasser.d has many similarities to the previous Sasser variants, yet Sasser.d spreads with a different filename, sends ICMP echo packets as a way to discover its potential victims and creates a remote shell on TCP Port 9995.

Pathology
After being executed, Sasser.d scans random IP addresses on TCP port 445 for exploitable systems. When one is found, the worm exploits the vulnerable system by creating a script and executing it. This script instructs the target victim to download and execute the worm from the infected host. As the worm scans random IP addresses, it listens on successive TCP ports starting at 1068. It also acts as an FTP server on TCP port 5554 and creates a remote shell on TCP port 9995.

Cure
Immediate information and cure for this worm can be found online at the Network Associates McAfee AVERT site located at http://vil.nai.com/vil/content/v_125012.htm. McAfee AVERT is advising its customers to update to the 4357 DATs to stay protected.