Classification

Category: Malware

Type: -

Aliases: Sadmind, Sadmind/IIS, Unix/Sadmind, Solaris/Sadmind.worm, Worm.PoizonBox

Summary


Sadmind is a worm, that propagates from a Sun Solaris machine to another. It also compromises Windows NT/2000 servers running Internet Information Server 4.0 or 5.0.

Removal


Automatic action

Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.

Knowledge Base

Find the latest advice in our Community Knowledge Base.

About the product

See the manual for your F-Secure product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details



Variant:Sadmind.A

The worm uses an old vulnerability in the Solaris operating system to enter the system. In the system it first opens remote shell (rsh) service for the root user. It then extracts itself to "/dev/cuc" directory, and adds a worm startup code to the "/etc/rc2.d/S71rpc". The worm also attempts to download and install Perl on the system, and starts itself by executing "/dev/cuc/start.sh" on the victim using the rsh service.

"start.sh" creates a directory "/dev/cup", and starts worms main processes in the background.

The worm goes through random Class-B subnets looking for unpatched Windows NT/2000 machines running IIS web server. If a vulnerable machine is found, the worm will copy the "\winnt\system32\cmd.exe" to "wwwroot\scripts\root.exe" directory and replace "index.htm", "index.asp", "default.htm" and "default.asp" files with its own.

Sadmind also looks for vulnerable Solaris systems from randon Class-B networks. If a vulnerable host is found, the worm creates a tar archive "uni.tar" out of itself, and sends it to the victim using rsh service.

Both vulnerabilities have been fixed by vendors.

Futher information about the problem and the fix in sandmind service in Solaris is available from Sun: https://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/191&...

Further information about the IIS unicode vulnerability, including a fix, is available from Microsoft at: https://www.microsoft.com/technet/security/bulletin/MS00-078.asp and additional information at: https://www.microsoft.com/technet/security/bulletin/MS00-086.asp

Date Created: -

Date Last Modified: -