what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

b-08.ciac-vmscrtl_exe-trojan-horse

b-08.ciac-vmscrtl_exe-trojan-horse
Posted Sep 23, 1999

b-08.ciac-vmscrtl_exe-trojan-horse

tags | trojan
SHA-256 | 8d199852f3d152aabbd4b0b1a65b063fdc105a4155f05017bb5f2f48dda2e1f3

b-08.ciac-vmscrtl_exe-trojan-horse

Change Mirror Download

_____________________________________________________
The Computer Incident Advisory Capability
___ __ __ _ ___
/ | / \ /
\___ __|__ /___\ \___
_____________________________________________________
Information Bulletin

Detection/Eradication Procedures for VMSCRTL.EXE Trojan Horse

November 21, 1990, 1100 PST Number B-8
__________________________________________________________________________
PROBLEM: Detection of trojan horse and recovery procedures
PLATFORM: VAX/VMS (all versions)
DAMAGE: Gives unauthorized privileged access to system if trojan
horse is implanted in system by intruders who have already obtained
privileged status
DETECTION: Several methods (described herein), of which finding
VMSCRTL.EXE in SYS$LIBRARY is the fastest
__________________________________________________________________________
Critical Trojan Horse Facts

In bulletin B-6 CIAC warned of a new pattern of intrusions into VMS
systems. Part of this pattern is placing a file named VMSCTRL.EXE into
SYS$LIBRARY. CIAC has determined that this file contains a trojan
horse program. VMSCRTL.EXE also provides a means for the attackers to
gain full privileges from a non-privileged account if this file has
been installed with the CMKRNL privilege. The presence of VMSCRTL.EXE
in SYS$LIBRARY indicates that a VMS system has been compromised and
that the attackers have been able to gain full privileges.

The trojan horse behaviors of VMSCRTL.EXE are:

1. Copies itself to SYS$LIBRARY:VMSCRTL.EXE

2. Creates the file SYS$STARTUP:DECW$INSTALL_LAT.COM This file
contains a standard DEC copyright notice and a DCL command to install
SYS$LIBRARY:VMSCRTL.EXE with CMKRNL privilege.

3. Modifies the file SYS$STARTUP:VMS$LAYERED.DAT to include the
execution of SYS$STARTUP:DECW$INSTALL_LAT.COM as part of the VMS boot
procedure.

4. Exits with a (falsified) CLI error message while returning a
status of SYS$NORMAL

The "tracks" left behind by the execution of VMSCRTL.EXE are fairly obvious:

1. The presence of SYS$LIBRARY:VMSCRTL.EXE

2. The presence of SYS$STARTUP:DECW$INSTALL_LAT.COM

3. The file SYS$STARTUP:VMS$LAYERED.DAT will have its MODIFIED
date changed to reflect the time at which VMSCRTL.EXE was run. Use the
DCL command "$ DIRECTORY/FULL SYS$STARTUP:VMS$LAYERED.DAT" or "$
DIRECTORY/DATE=MODIFIED SYS$STARTUP:VMS$LAYERED.DAT" to determine the
modification date. Note that this evidence will be destroyed if any
subsequent modifications or listings of SYS$STARTUP:VMS$LAYERED.DAT are
made via the STARTUP command to SYSMAN.

4. The DCL command "$ MCR SYSMAN STARTUP FILE" will list
DECW$INSTALL_LAT.COM as one of the startup files. Note that executing
this command will change the modification date of
SYS$STARTUP:VMS$LAYERED.DAT Be sure, therefore, to do this check after
checking the MODIFIED date as prescribed above.

5. If the infected system has been rebooted since VMSCRTL.EXE was
run, the DCL command "$ MCR INSTALL /LIST" will reveal that
SYS$LIBRARY:VMSCRTL.EXE is installed with privilege. A full list of
this installed image will show it is installed with CMKRNL.

DETECTION

The presence of the file SYS$LIBRARY:VMSCRTL.EXE is definite
confirmation that this trojan horse is present. Additional
confirmatory evidence includes:

1. The presence of the file SYS$STARTUP:DECW$INSTALL_LAT.COM

2. Modification to the SYSMAN STARTUP database file to include the
execution of SYS$STARTUP:DECW$INSTALL_LAT.COM

A search string that can be used to identify VMSCRTL.EXE regardless of
the file's name is "%VCR" For example, to search your entire system
disk you might enter:

$ SEARCH SYS$SYSDEVICE:[*...]*.* "%VCR"/WINDOW=1

If VMSCRTL.EXE is detected in a non-system directory, it is likely that
the attackers have penetrated a non-privileged account but have not yet
been able to gain full privileges.

MINIMAL RECOVERY PROCEDURE

If you have detected VMSCRTL.EXE in SYS$LIBRARY, the VMS system has
been compromised by attackers who were able to gain full privileges.
(If these attackers are able to reenter the system, they will again be
able to gain full privileges). The minimal recovery procedure
described below is provided only as a quick, short-term, "stop gap"
measure. (The possibility that other damage to the compromised VMS
system was done by the attackers is large--we therefore recommend that
when time permits the full recovery procedure be implemented.) The
minimal recovery procedure is:

1. Use INSTALL to remove SYS$LIBRARY:VMSCRTL.EXE with the
command: "$ MCR INSTALL SYS$LIBRARY:VMSCRTL.EXE/DELETE"

Note: It is possible that VMSCRTL.EXE is not installed (yet) and so
this command may produce the appropriate error message.

2. Remove the startup entry SYS$STARTUP:DECW$INSTALL_LAT.COM from
SYSMAN's database with the command: "$ MCR SYSMAN STARTUP REMOVE FILE
SYS$STARTUP:DECW$INSTALL_LAT.COM

3. Delete the file SYS$LIBRARY:VMSCRTL.EXE and the file
SYS$STARTUP:DECW$INSTALL_LAT.COM

4. Disable all inactive accounts using AUTHORIZE. For example, to
disable an account named JONES, enter:

$ SET DEF SYS$SYSTEM
$ RUN AUTHORIZE
UAF> MOD JONES/FLAGS=DISUSER
UAF> EXIT

5. Change the passwords on all active accounts.

6. Review all entries in SYSUAF.DAT and make appropriate corrections

7. Review all SYSGEN parameters and make appropriate corrections

8. Review all system files for modifications occurring after the
penetration. The following DCL command can prove very useful in this
endeavor:

$ DIR/FULL/MODIFIED/SINCE="<actual penetration date>"

For example, if the penetration date were October 31st, enter:

$ DIR/FULL/MODIFIED/SINCE="31-OCT-1990"


FULL RECOVERY PROCEDURE

For the full recovery procedure, follow the complete VMS recovery
procedure given in the appendix to this bulletin.

For additional information or assistance, please contact CIAC

Hal R. Brand
(415) 422-6312 or (FTS) 532-6312

or call (415) 422-8193 or (FTS) 532-8193

send FAX messages to: (415) 423-0913 or (FTS) 543-0913

Neither the United States Government nor the University of California
nor any of their employees, makes any warranty, expressed or implied,
or assumes any legal liability or responsibility for the accuracy,
completeness, or usefulness of any information, product, or process
disclosed, or represents that its use would not infringe privately
owned rights. Reference herein to any specific commercial products,
process, or service by trade name, trademark manufacturer, or
otherwise, does not necessarily constitute or imply its endorsement,
recommendation, or favoring by the United States Government or the
University of California. The views and opinions of authors expressed
herein do not necessarily state or reflect those of the United States
Government nor the University of California, and shall not be used for
advertising or product endorsement purposes.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

COMPLETE VMS RECOVERY PROCEDURE

This recovery procedure should be applied to a compromised VMS system
whenever it can not be determined that the intruders failed to gain
system privilege.

1. Get a hardcopy listing of your current SYSUAF.DAT If
SYSUAF.DAT contains an extremely large number of users, it will take
considerable time to restore all accounts (so it may be expedient to
save SYSUAF.DAT to tape or elsewhere so it can be restored, although we
do not generally recommend this procedure).

2. Remove from all disks all executable code (including DCL
command procedures) run by privileged accounts.

3. Initialize the system disk to remove all files. (This is an
extreme step, but it is guaranteed to remove any damage done by the
intruder.)

4. Install VMS and all layered products.

5. Use AUTHORIZE to add only currently active accounts (or restore
the SYSUAF.DAT you saved). If you restore SYSUAF.DAT you must
scrutinize it very carefully. To restore SYSUAF.DAT is not generally
recommended. It is better to re-create only the active accounts,
because this not only removes all dormant accounts, but also guarantees
elimination of bogus accounts and unauthorized modifications.

6. Restore from TRUSTED backups all site specific files found on
the system disk. In the event you do not have TRUSTED backups, we
recommend you re-create these files.

Note: "Trusted backups" are defined as backups in which there is a
high degree of assurance that there were no unauthorized changes made
to any of the files before the backup was made.

7. Restore from TRUSTED backups all files removed in step 2. In
the event you do not have TRUSTED backups, we recommend that you
re-create these files.

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close