W32.Sasser.B.Worm is a variant of W32.Sasser.Worm. It attempts to exploit the LSASS vulnerability described in Microsoft Security Bulletin MS04-011
. This worm spreads by scanning randomly selected IP addresses for vulnerable systems.
W32.Sasser.B.Worm differs from W32.Sasser.Worm as follows:
- Uses a different mutex: Jobaka3.
- Uses a different file name: avserve2.exe.
- Has a different MD5.
- Creates a different value in the registry: "avserve2.exe."
- The MD5 hash value of this worm is 0x1A2C0E6130850F8FD9B9B5309413CD00.
- Block TCP ports 5554, 9996, and 445 at the perimeter firewall and install the appropriate Microsoft patch (MS04-011) to prevent the remote exploitation of the vulnerability.
W32.Sasser.B.Worm can run on, but not infect, Windows 95/98/Me computers. Although these operating systems cannot be infected, they can still be used to infect the vulnerable systems to which they are able to connect. In this case, the worm will waste a lot of resources so that programs cannot properly run, including our removal tool. (On Windows 95/98/Me computers, the tool should be run in Safe mode.)
Security Response has provided some information to aid network administrators in ongoing efforts to track down W32.Sasser.Worm infected machines on their respective network. Please see the document, "Detecting traffic due to LSASS worms
" for additional information.
Click for a more detailed description of Rapid Release and Daily Certified virus definitions.