Skip Over Navigation Links
Center for Information TechnologyAntivirus
Antivirus Home Page
Contact Us
Questions or Comments
Disclaimers

Software
Current client downloads:
 VScan Engine/Dat (SuperDat) -4.3.20/4.0.4399
 VirusScan Enterprise 8.0i - Windows NT/2000/XP/2003
 VirusScan Enterprise 7.1 - Windows NT/2000/XP/2003
 Version 4.5.1 (install Service Pack 1) - Windows 9x/ME
 Virex (OS X) Engine/Def - 7.2(v1.1)/041013
 Virex (OS 9.x) Engine/Def - 6.2/041001
 Linux & Solaris Engine/Dat - 4.3.20/4.0.4399
 Symantec Antivirus - 9.0
 Ad-aware - 6.0
 Clean Boot 1.0
 Stinger v2.4.0 virus removal tool (Updated 9/28/04, 3:22am)
 Microsoft Patch Library
Current server downloads:
 VirusScan Enterprise 7.1
 NetShield NetWare - 4.6.2
 NetShield NetWare Engine Update - 4.3.20
 ePO agent for NetWare
 Sybari Antigen - 528/966
 TrendMicro - 6.810/200
 ScanMail eManager - 3.0
 Microsoft Patch Library

Information
 Configuration Tips
 VirusScan FAQs
 Ad-aware FAQs
 Central EMail Status
 VirusScan Instructions
 Additional Resources
 ePO 3.0/VirusScan 7.0 Presentation

Archives
 List of Viruses

Virus Archives

W32/Nachi Last Updated 8/19/03 11:04am

A new worm, W32/Nachi.worm is spreading in the wild. The worm takes advantage of the Microsoft DCOM RPC vulnerability (see "What's New") and the WebDav vulnerability (see Security Bulletin MS03-007). Presently the worm's actions appears to be replication and the installation of a trojan horse. In addition, the replication attempts are causing an effective denial of service (DoS) due to the large amount of ICMP network traffic it generates. Despite being labeled as a good worm in the media, Nachi is engineered to maintain ownership of any hosts it compromises.

The worm appears to remove the vulnerability that it used to gain access. This is done to ensure that no future worms can deinstall this worm using the vulnerabilities. It then listens on TCP port 707 for commands to the trojan horse it installs. see "What's New" regarding patch information.

The worm copies itself to the WINS subdirectory of the default Windows system directory (e.g. C:\Windows\System32\WINS) as dllhost.exe and creates a copy of TFTP.EXE as files Svchost.exe.

NAI detects W32/Nachi.Worm with the 4287 Dat/SuperDat. NAI will detect/remove W32/Nachi.Worm with the 4287 Dat/SuperDat. The 4287 DAT/SuperDat is now available.

Symantec Antivirus definitions Dated 08-19-2003 or later detect and remove W32/Nachi worm. Use the Symantec (Norton) LiveUpdate feature of Symantec Antvirus to update your software.

The Nachi/Blaster (Stinger.exe) removal tool is available here (Stinger version 1.8.3)

More information will be posted as it becomes available.

This archive is not intended to be comprehensive. For a more complete virus library, please visit NAI's Virus Information Library at http://vil.nai.com.

Contact TASC for assistance or call
301.59.Go.CIT (V) 301.496.8294 (TDD)

National Institutes of HealthCenter for Information Technology
National Institutes of Health
Bethesda, Maryland 20892

Questions or Comments | Disclaimers

Department of Health and Human ServicesHealth and Human Services
Washington, D.C. 20201
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -