Start a Conversation

Unsolved

This post is more than 5 years old

5903

June 25th, 2005 20:00

norton internet worm

i am getting this security alert all the time from norton
path          c:\windows\system32\svchost.exe
file name       microsoft generic host process for win32 s...
direction          inbound
local address       all local networks
local port      1026
remote address    61.152.158.111
remote port   48222
protocol udp
 
 
i have an option to block or permit if i block it comes up again bit later
what is it?
 
 

266 Posts

June 25th, 2005 21:00

It is a legit XP internal application; see http://support.microsoft.com/?kbid=314056
 
Permit it and see what happens; Norton should be giving you an option to permit it always.  If it isn't doing that then you may have to go into Internet Security options and specifically list the app.

9 Legend

 • 

47K Posts

June 25th, 2005 23:00

It may be legit but unless you are in china then its chinese hackers that are trying to take over your system.   The posting telling you that its nothing to worry about is probably from the hacker that has remote control of your system.  LOL.

port 1026 BDDT, Dark IRC, DataSpy Network X, Delta Remote Access , Dosh, Duddie, IRC Contact, Remote Explorer 2000, RUX The TIc.K
port 1026 (UDP) - Remote Explorer 2000

Remote Explorer 2000
--------------------------------------------------------------------
Name:  Remote Explorer 2000
Aliases:  RE2K, Backdoor.RE2K, 
Ports:  1026, 1026 (UDP), 2000, 2000 (UDP)
Files:  Remoteexplorer2000.zip - 764,865 bytes Remoteexplorer2000server.zip - 17,709 bytes Remote explorer 2000.exe - 845,242 bytes Realserver.exe - 21,504 bytes Win128.exe -
Created:  Sep 1999
Requires:  Mswinsck.ocx - is required to run the trojan.
Actions:  Remote Access / Steals passwords
Registers:  HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\
Notes:  Works on Windows. 
Country:  
Program: 


I would always block this and then scan to find out what trojan is on the system.


This UDP port is known to be used by trojan horses like BackDoor-G, SubSeven Apocalypse and Tiles. Refer to http://www.simovits.com for a list of well known trojans and their preferred ports.


http://www.simovits.com/sve/nyhetsarkiv/1999/nyheter9902.html


I would scan the system with trend micro housecall.


http://housecall.trendmicro.com/housecall/start_corp.asp

inetnum:      61.152.156.0 - 61.152.159.255
netname: SHANGHAI-GLOBAL-NET
descr: Shanghai Global Network Co., Ltd.
country: CN
admin-c: JY81-AP
tech-c: JY81-AP
mnt-by: MAINT-CHINANET-SH
status: ASSIGNED NON-PORTABLE
changed: ip-admin@mail.online.sh.cn 20020819
changed: hm-changed@apnic.net 20040927
source: APNIC
person:       Ji Yi
address: 3F,333 North Jiangxi Road,Shanghai,200085,PRC
country: CN
phone: +86-21-33010742
fax-no: +86-21-63073019
e-mail: jiyi@81890.net
nic-hdl: JY81-AP
mnt-by: MAINT-CHINANET-SH
changed: sptwxl@online.sh.cn 20000920
source: APNIC

Name: SubSeven
Aliases: Sub 7, BackDoor.G, Pinkworm, SubStealth, BackDoor-G2, Backdoor.SubSeven, .LOG,
Ports: 1243, 1999, 2772, 2773, 2774, 6667, 6711, 6712, 6713, 6776, 7000, 7215, 16959, 27374, 27573, 54283 (various ports are used for different versions)
Files: Subseven.exe - 308,224 bytes Subseven.exe - 312,320 bytes Subseven.exe - 381,440 bytes Subseven.exe - 388,096 bytes Subseven.exe - 428,469 bytes Subseven.exe - 623,104 bytes Subseven.exe - 624,128 bytes Sub7.exe - 468,992 bytes Sub7.exe - 479,232 bytes Sub7.exe - 491,520 bytes Sub7.exe - 493,056 bytes Sub7.exe - 519,680 bytes Server.exe - 250,368 bytes Server.exe - 251,904 bytes Server.exe - 333,547 bytes Server.exe - 335,237 bytes Server.exe - 335,799 bytes Server.exe - 336,867 bytes Server.exe - 336,934 bytes Server.exe - 342,042 bytes Server.exe - 352,287 bytes Server.exe - 380,835 bytes Server.exe - 381,347 bytes Server.exe - 382,371 bytes Server.exe - 385,858 bytes Server.exe - 867,840 bytes Editserver.exe - 186,368 bytes Editserver.exe - 195,584 bytes Editserver.exe - 221,184 bytes Editserver.exe - 303,802 bytes Editserver.exe - 404,992 bytes Editserver.exe - 484,352 bytes Systrayicon.exe - 768 bytes Systray.exe - 33,280 bytes Icqmapi.dll - 58,368 bytes Icqmapi.dll - 58,880 bytes Kerne1.exe - Kernel16.dl - Kernel32.dl - Explore.exe - Msrexe.exe - 399,267 bytes Mueexe.exe - Fueovs.exe - Uabmruua.exe - Windos.exe - Win32.exe - Nodll.exe - 32,768 bytes Nodll.exe - 33,230 bytes Subseven.ini - Skin.ini - 454 bytes Skin.ini - 464 bytes Skin.ini - 468 bytes Skin.ini - 481 bytes Rundll1.exe - Rundll16.exe - S7undetec.exe - 321,476 bytes Subpas1.cab - 1,312,768 bytes Subpas2.cab - 145,273 bytes Setup.exe - 140,800 bytes Ssetup.exe - 140,800 bytes Setup.lst - 3,656 bytes Ssetup.lst - 3,656 bytes Task_bar.exe - Mvokh_32.dll - Favpnmcfee.dll - Watching.dll - Run.exe - 11,371 bytes Sub7bonus.exe - Wandows.com -

Message Edited by SpeedStep on 06-25-2005 08:39 PM

39 Posts

June 26th, 2005 15:00

get a router and use it along with your norton...you'll stop getting those inbound probes showing up on Norton, and have an extra layer of security.

1 Rookie

 • 

45 Posts

June 26th, 2005 16:00

trend micro found nothing

266 Posts

June 26th, 2005 17:00

I think SpeedStep is right and apologize for my post.  I stupidly missed the reference to "Inbound" when I read your post.  That means someone (or something) is attempting to open the file and use it (and as my reference the the KB article makes clear that could have dire consequences).  Follow SpeedStep's advice.

4.4K Posts

June 27th, 2005 21:00

voodoo12,

There seems to be some confusion about the direction of that traffic.

I interpret your original report...

direction inbound
local address all local networks
local port 1026
remote address 61.152.158.111
remote port 48222
protocol udp


as showing that the traffic came from IP address 61.152.158.111, and was headed for UDP port 1026 on your system.

In addition to the uses of that port cited by speedstep, an extremely common one is delivery of what's called "Messenger Spam", as described here.

If that's indeed what happened, there's a system in China that's trying to send your system spamvertising using the "Messenger Service". If the traffic's being blocked by your firewall, either locally, or because your machine is behind a router, you'll not be annoyed...except perhaps by the messages being logged by your firewall software. So far today, our automated reporting system has sent thirty-five log messages of 1026/udp traffic to MyNetWatchman.

MyNetWatchman is reporting a growing list of problems originating from 61.152.158.111, most of which are very recent and are "messenger spam".

Jim
No Events found!

Top