id = "Kibuv worm" description = "\ A fake FTP server was installed by the KIBUV.B worm \ on this port. This worm uses known security flaws to \ infect the system. \ \ This machine may already be a 'zombi' used by crackers \ to perform distributed denial of service. \ \ http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_KIBUV.B&VSect=T" author = "Diman Todorov " license = "See nmaps COPYING for licence" categories = {"malware"} portrule = function(host, port) local decision if ( port.number == 7955 or port.number == 14920 or port.number == 42260) and port.service == "ftp" and port.protocol == "tcp" and port.state == "open" then decision = true else decision = false end return decision end action = function(host, port) local socket = nmap.new_socket() socket:connect(host.ip, port.number) local status, s = socket:receive_lines(1) if string.match(s, "220 StnyFtpd 0wns j0") or string.match(s, "220 fuckFtpd 0wns j0") then return "Suspecting that the host is KIBUV.B infected" end return end