File: 3016.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: buster, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (90 lines) | stat: -rw-r--r-- 2,908 bytes parent folder | download | duplicates (8)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
Rule: 

--
Sid: 
3016
-- 
Summary: 
This event is generated when an attempt is made to request a connection on port 63536 using the Insane Network 4.0 trojan.

-- 

Impact: 
If connected, the attacker could remotetly execute a multitude of functions resulting in a full compromise of the victim's machine.

--
Detailed Information:
Insane Network 4.0 uses port 2000 as its default, but -2000, or port 63536, incarnations also exist.
Insane Network 4.0 has a number of functions. The following strings are indicative of a particular Insane Network 4.0 attack.
Be aware that some versions of Insane Network 4.0 will send their attack strings one letter at a time. For example,
to send the bomb command, some versions will send only one letter per packet, resulting in bomb being spelled out in multiple packets.

Format: Name of function (Description of what it does *only if necessary*) - string to look for

Bomb ("Bombs" monitor) - bomb
Snow (Makes monitor snowy) - snow
Melt ("Melts" the screen) - melt
Reverse (Reverses screen) - reverse
Copy File - cp followed by a file name and the destination path
Ctrl-Alt-Del (Enable/Disable Ctrl-Alt-Del) - cad -e (for enable) cad -d (for disable)
Delete File - rm followed by a file name, including path
File List - ls followed by directory
File Sharing (Gets shared file password information) - share
Dial-Up Passwords (Get Dial-up password information) - passwd
Make Text File - mktext
Popup Message - popup
Read File - cat followed by a file name, including path
Reboot - reboot
Registry Edit - regrun
Rename File - ren followed by a file and its new name
Run File - exec followed by a file name, including path
Shutdown - shutdown
Taskbar (Enable/Disable Task Bar) - task -e (for enable) tast -d (for disable)
Telnet - telnet

--
Affected Systems:
Windows 95/98/ME/NT/2000

--

Attack Scenarios: 
The victim must first install the server. Be wary of suspicious files because they often can be backdoors in disguise.
Once the victim mistakenly installs the server program, the attacker usually will employ an IP scanner program
to find the IP addresses of victims that have installed the program. Then the attacker enters the IP address, port number (which 
is assigned to the server program by the attacker: default is 2000), and presses the connect button and he has access to your computer.

-- 

Ease of Attack: 
Easy. Simply a matter of pressing the connect button once the victim has installed the server.


-- 

False Positives:
None known

--
False Negatives:
None known

-- 

Corrective Action: 
Remove insane network.exe and commands.txt
Kill insane network.exe in the process list

Keep your anti-virus software updated with the latest virus definitions.

--
Contributors:
Original Rule Writer: Ricky Macatee <rmacatee@sourcefire.com> 
Sourcefire Research Team

-- 
Additional References:
http://www.pestpatrol.com/PestInfo/i/insane_network.asp


--