[nsp-sec] srv5.su and some other interesting shellshocky stuff.
Scott A. McIntyre
scott at howyagoin.net
Thu Apr 9 18:05:16 EDT 2015
Hi,
I've noticed some interesting attempts to exploit Bash bugs this week.
Seems that there's an ircd on 188.42.240.97 (6667, possibly other ports)
which is where the Linux bot tries to connect.
SU1: ELF 64-bit LSB executable, x86-64, version 1 (SYSV), dynamically
linked (uses shared libs), for GNU/Linux 2.6.0, stripped
SU2: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV),
dynamically linked (uses shared libs), for GNU/Linux 2.2.5, stripped
The inbound traffic sets a few http headers:
Cookie: () { :;} ;echo;/usr/bin/php -r %s
Referer: () { :;} ;echo;/usr/local/bin/php -r %s
And from there
Tries to insert itself into rc.conf or rc.local, and then begins outward
scanning for:
/dana-na/auth/url_default/welcome.cgi
/cgi-bin/ICuGI/EST/blast_detail.cgi
/cgi-sys/entropysearch.cgi
/cgi-sys/defaultwebpage.cgi
/cgi-mod/index.cgi
/cgi-bin/test.cgi
/cgi-bin-sdb/printenv
/admin.cgi
/cgi-bin/bash
/cgi-bin/hello
/cgi-bin/helpme
/cgi-bin/info.sh
/cgi-bin/php5-cli?
/cgi-bin/php5?
/cgi-bin/test-cgi
/cgi-bin/test.sh
/cgi-sys/guestbook.cgi
/cgi-sys/php5?
/phppath/cgi_wrapper?
/phppath/php?
/tmUnblock.cgi
/cgi-bin/contact.cgi
/cgi-bin/defaultwebpage.cgi
/cgi-bin/env.cgi
/cgi-bin/forum.cgi
/cgi-bin/hello.cgi
/cgi-bin/index.cgi
/cgi-bin/login.cgi
/cgi-bin/main.cgi
/cgi-bin/meme.cgi
/cgi-bin/recent.cgi
/cgi-bin/sat-ir-web.pl
/cgi-bin/signon.cgi
/cgi-bin/test-cgi.pl
/cgi-bin/tools/tools.pl
/phppath/cgi_wrapper
/phppath/php
/cgi-sys/FormMail-clone.cgi
/xul/
/gitweb/
/gitweb.cgi
/cgi-bin/
/cgi-bin/php4
/cgi-bin/php.cgi
/cgi-bin/firmwarecfg
/cgi-bin/%2f/admin.html
/cgi-bin/admin.html
/sys-cgi
/cgi-bin/tree.php
/cgi-bin/w3mman2html.cgi
/cgi-bin/status/status.cgi
The binaries themselves live at:
http:// srv5.su /SU2
http:// srv5.su /SU1
Top inbound sources today are:
16339 | 212.78.67.123 | VI-UK Virtual Internet (UK) Ltd,GB
16095 | 81.19.235.60 | JAYNET jay.net a/s,DK
Anyone else been digging into this one?
Just a mild curiosity thus far, but it showed up earlier this week at
another domain, x5d.su. Same attempted exploits, same binaries (but AS1
and AS2)..
Thanks,
Scott A. McIntyre
Telstra AS1221
More information about the nsp-security
mailing list