After looking around a bit more (should have researched a bit before
posting), the second sshf that currently resides at frauder.us is
infected with RST-variant.  

More info at:

http://www.lockeddown.net/rst-expl.txt

Bill


-----Original Message-----
From: Bill Roemhild 
Sent: Sunday, August 15, 2004 1:58 AM
To: [EMAIL PROTECTED]
Subject: RE: [Full-Disclosure] Automated SSH login attempts?


Ohh great.. two different versions floating around.  Not sure where I
got the first one, but the second was from frauder.us.  



-rwxr-xr-x    1 root     root      1365263 Jul 12 11:10 sshf1*
-rwxr-xr-x    1 root     root      1369359 Aug  1 19:24 sshf2*

[EMAIL PROTECTED]:/usr/local/src/ssh/show# strings sshf1 > sshf1.strings
[EMAIL PROTECTED]:/usr/local/src/ssh/show# strings sshf2 > sshf2.strings
[EMAIL PROTECTED]:/usr/local/src/ssh/show# diff sshf1.strings sshf2.strings
4402a4403,4466
> SQRVW
> _^ZY[
> SQR1
> SQRV
> H^ZY[
> SQRVW
> _^ZY[
> _^ZY[
> QSP1
> QSP1
> QSP1
> QSP1
> RQSP1
> X[YZ
> RQSP1
> X[YZ
> QSP1
> SQRV1
> ^ZY[
> /dev/hdx
> SQRVW
> ZY[=
> ZY[=
> _^ZY[
> SQRVW
> Y[_^ZY[
> ZY[=
> [SQRVW
> tBSQR
> ZY[=
> ZY[=
> [X_^ZY[
> DOM`
> /bin/sh
> xxxxyyyyzzzz
> Y[XXXXXX
> GET /~telcom69/gov.php HTTP/1.0
> ppp0
> eth0
> h/bin
> PSQRVWP
> [X_^ZY[X
> SQRVWS
> ZY[=
> ZY[f
> ZY[=
> ZY[=
> fAf;NH
> ZY[=
> YQSQR
> ZY[=
> ZY[=
> ZY[fAf;NLr
> ZY[=
> ZY[=
> F4SQR
> ZY[=
> [X_^ZY[
> ZY[=
> _WSQR
> ZY[SQR
> snortdos
> tory
> /lib/ld-linux.so.2

Bill

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to