Sasser.A/B/C/D/E/F Worm Removal Tool

A situation has been identified where the Sasser. A or Sasser. B worms could have infected some systems before the application of MS04-011. This tool will help remove the Sasser.

This topic was started by ,


data/avatar/default/avatar03.webp

1352 Posts
Location -
Joined 2004-02-01
A situation has been identified where the Sasser.A or Sasser.B worms could have infected some systems before the application of MS04-011 [KB835732]. This tool will help remove the Sasser.A and Sasser.B worms from these systems. For systems with MS04-011 [KB835732], no further action is needed once this tool is installed. Install this tool to help remove this worm from your PC


DirectDownload via Microsoft: Link
for latest release

update:
Version 3.0 - Released 5/9/04. Added detection/removal for Sasser.E.
Version 4.0 - Released 5/11/04. Added detection/removal for Sasser.F.

Participate on our website and join the conversation

You have already an account on our website? Use the link below to login.
Login
Create a new user account. Registration is free and takes only a few seconds.
Register
This topic is archived. New comments cannot be posted and votes cannot be cast.

Responses to this topic


data/avatar/default/avatar03.webp

1352 Posts
Location -
Joined 2004-02-01
OP
btw:
for all ppl that are interested :
Indications of Infection

The virus copies itself to the Windows directory as avserve.exe and creates a registry run key to load itself at startup

* HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows
CurrentVersionRun "avserve.exe" = C:WINDOWSavserve.exe

As the worm scans random ip addresses it listens on successive TCP ports starting at 1068. It also acts as an FTP server on TCP port 5554, and creates a remote shell on TCP port 9996.

A file named win.log is created on the root of the C: drive. This file contains the IP address of the localhost.

Copies of the worm are created in the Windows System directory as mybb_up.exe.

Examples

* c:WINDOWSsystem3211583_up.exe
* c:WINDOWSsystem3216913_up.exe
* c:WINDOWSsystem3229739_up.exe

Method of Infection

This worm spreads by exploiting a recent Microsoft vulnerability, spreading from machine to machine with no user intervention required.

This worm scans random IP addresses for exploitable systems. When one is found, the worm exploits the vulnerable system, by overflowing a buffer in LSASS.EXE. It creates a remote shell on TCP port 9996. Next it creates an FTP script named cmd.ftp on the remote host and executes it. This FTP script instructs the target victim to download and execute the worm (with the filename mybb_up.exe as aforementioned) from the infected host. The infected host accepts this FTP traffic on TCP port 5554.

The worm spawns multiple threads, some of which scan the local class A subnet, others the class B subnet, and others completely random subnets. The destination port is TCP 445


assets/images/contentteller/avatar_disabled.webp

0 Posts
Location -
Joined -
huh ? updating ... what updateing ? ..
it wasn't me ...
must be the W2S geek hacked into my account ...
LMAO

data/avatar/default/avatar03.webp

1352 Posts
Location -
Joined 2004-02-01
OP
another update:
Sasser (A-F) Worm Removal Tool (KB841720)

Version 4.0 - Released 5/11/04. Added detection/removal for Sasser.F.

Link to Microsoft