Anyone seen this?
Windows.exe process monopolizing CPU on infected machines
Infected machines flood network with ARP requests for random IP addresses apparently based on subnet (i.e. 10.10.*.*).
On a hit, the ARP response to the infected host will kick off an (?)RPC(?) sequence to copy .pif, then c.bat, and finally windows.exe.
In addition to propagating itself, it appears to try to connect to 213.35.161.4
Affecting Win2K server and professional
Thanks...
Windows.exe process monopolizing CPU on infected machines
Infected machines flood network with ARP requests for random IP addresses apparently based on subnet (i.e. 10.10.*.*).
On a hit, the ARP response to the infected host will kick off an (?)RPC(?) sequence to copy .pif, then c.bat, and finally windows.exe.
In addition to propagating itself, it appears to try to connect to 213.35.161.4
Affecting Win2K server and professional
Thanks...