Analysis by: Karl Dominguez

 PLATFORM:

Windows 2000, Windows XP, Windows Server 2003

 OVERALL RISK RATING:
 REPORTED INFECTION:
 SYSTEM IMPACT RATING:
 INFORMATION EXPOSURE:

  • Threat Type: Hacking Tool

  • Destructiveness: No

  • Encrypted: Yes

  • In the wild: Yes

  OVERVIEW

This hacktool may arrive on the system via software exploits or through security weaknesses taken advantage of attackers.

It is an SQL Injection Toolkit used to compromise Web servers. It enables remote user to gain full access to affected servers. This toolkit also includes a Graphical User Interface that the attacker could use to perform arbitrary commands.

It allows an attacker to do certain actions to the affected server.

  TECHNICAL DETAILS

File Size: Varies
File Type: ASP
Memory Resident: No
Initial Samples Received Date: 30 Mar 2011

NOTES:

This hacktool may arrive to the system via software exploits or through security weaknesses taken advantage of attackers.

It is an SQL Injection Toolkit used to compromise Web servers. It enables remote user to gain full access to affected servers. This toolkit also includes a Graphical User Interface that the attacker could use to perform arbitrary commands.

It allows an attacker to do the following to the affected server:

  • Brute force password-protected servers
  • Execute SQL Commands
  • Manipulate database
  • Execute remote commands using command prompt
  • Modify registry entries
  • Turn Off Server
  • Restart Server
  • Disable TCP/IP filter
  • Upload/Download files
  • Manipulate files
  • Execute files
  • Perform a DoS Attack
  • Perform a RAM & CPU Attack
  • Send Spam Mails
  • Deface Web pages including index pages such as the following:
    index.htm
    index.html
    index.asp
    index.cfm
    index.php
    default.htm
    default.html
    default.asp
    default.cfm
    default.php

It can gather the following information:

  • User Properties: User Credentials, Computer Name, User Domain Name
  • CPU Information: Processor Architecture, Number of Processors, Identifier, Level, Revision
  • Operating System Information: Operating Sytem, IP address, Server Software, CMD Path, Public Paths, System Path, Executables
  • Drives information: File System, Free Space, Capacity
  • IIS User name and password
  • FTP credentials

  SOLUTION

Minimum Scan Engine: 8.900
SSAPI PATTERN File: 7.940.17
SSAPI PATTERN Date: 30 Mar 2011

Step 1

For Windows XP and Windows Server 2003 users, before doing any scans, please make sure you disable System Restore to allow full scanning of your computer.

Step 2

Scan your computer with your Trend Micro product to delete files detected as HKTL_ACE. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.


Did this description help? Tell us how we did.