Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: FourPeas
For a techno dummy like me:

I don't understand how this spreads if not through e-mail? Anyone know?
13 posted on 05/03/2004 8:53:36 AM PDT by FourtySeven (47)
[ Post Reply | Private Reply | To 1 | View Replies ]


To: FourtySeven
Starts an FTP server on TCP port 5554. This server is used to spread the worm to other hosts.


Attempts to connect to randomly-generated IP addresses on TCP port 445. If a connection is made to a computer, the worm sends shellcode to that computer which may cause it to run a remote shell on TCP port 9996. The worm then uses the shell to cause the computer to connect back to the FTP server on port 5554 and retrieve a copy of the worm. This copy will have a name consisting of 4 or 5 digits followed by _up.exe (eg 74354_up.exe).

The IP addresses generated by the worm are distributed as follows:
50% are completely random
25% have the same first octet as the IP address of the infected host
25% have the same first and second octet as the IP address of the infected host.

The worm starts 128 threads that scan randomly-chosen IP addresses. This demands a lot of CPU time and as a result an infected computer may be so slow as to be barely useable.


http://securityresponse.symantec.com/avcenter/venc/data/w32.sasser.worm.html

58 posted on 05/03/2004 10:15:12 AM PDT by CyberCowboy777 (Veritas vos liberabit)
[ Post Reply | Private Reply | To 13 | View Replies ]

To: FourtySeven
It happens in the background as part of the communications that goes on through the network.
59 posted on 05/03/2004 10:15:22 AM PDT by FourPeas
[ Post Reply | Private Reply | To 13 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson