File: 2375.txt

package info (click to toggle)
snort 2.7.0-20.4
  • links: PTS
  • area: main
  • in suites: lenny
  • size: 34,512 kB
  • ctags: 18,772
  • sloc: ansic: 115,404; sh: 10,893; makefile: 1,372; perl: 487; sql: 213
file content (69 lines) | stat: -rw-r--r-- 1,330 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
Rule:  

--
Sid:
2375

--
Summary:
This event is generated when activity from the worm DoomJuice is
detected. 

--
Impact:
This is indicative of worm activity which may launch of a Denial of
Service condition against Microsoft from infected machines.

--
Detailed Information:
This event is indicative of activity by the DoomJuice worm. This worm
attempts to connect to random addresses on port 3127, if it receives a
response it will attempt to upload a copy of itself to the target
machine. If no response is received on that port, it will try on ports
between 3127 and 3199.

If the date is between February 8th and February 28th 2004, the worm
will attempt to launch a Denial of Service (DoS) attack against
www.microsoft.com.

--
Affected Systems:
	Windows 95
	Windows 98
	Windows Me
	Windows NT
	Windows 2000
	Windows XP
	Windows Server 2003

--
Attack Scenarios:
This is worm activity.

--
Ease of Attack:
Simple.

--
False Positives:
None Known

--
False Negatives:
It is possible to edit the binary data in the executable to create a
variant of the worm. This may evade the rule.

--
Corrective Action:
Use Anti-Virus software to remove the worm.

--
Contributors:
Sourcefire Research Team
Matt Watchinski <matthew.watchinski@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:

--