ms08-067 exploitation by 126.96.36.199
Last Updated: 2008-11-05 15:31:35 UTC
by donald smith (Version: 1)
Tillmann at mwcollect.org wrote in with a sample ms08-067 analysis.
“we've caught an MS08-067 exploitation attempt and provide the
trace and a brief analysis here: http://honeytrap.mwcollect.org/msexploit “
The analysis is good. They have sample packets of the exploit and the call back shell. They show an example of libemu’s sctest. They find the exploiting ip 188.8.131.52. That IP is definitely sequentially scanning ip addresses for tcp 445 looking for vulnerable systems so blocking it at your enterprise gateway is recommended.
Emerging Threats has released signature's to catch trojan checkin and worm traffic outbound.
2008737 - ET CURRENT_EVENTS KernelBot/MS08-67 related Trojan Checkin (emerging.rules)
2008739 - ET CURRENT_EVENTS MS08067 Worm Traffic Outbound (emerging.rules)
Joel covered Sourcefire's signatures and other details related to this activity in his diary here: