Another thing you might want to watch for is a web application flaw. Maybe a flaw in a php page that allowed an attacker to insert PHP commands into a page? I would have a line-by-line look at your access_log and error_log around the time the file was put on the server. I would be happy to take a look at the logs if you need some assistance. On Thursday, July 3, 2003, at 08:17 AM, shimi wrote: > > stupid question (but since you didn't mention, i have to ask): is > apache > the only server running on this machine? if so, we have a big problem > ;) > > On Wed, 2 Jul 2003, Dayne Jordan wrote: > >> Greetings, >> >> Over the past 2 days we were alerted to 2 machines doing over >> 10mbits/sec >> each. Upon further investigation here is what we found... >> >> Lets start with OS and essentials: >> ===================================== >> - BSDi 4.2, patched current >> - Apache 1.3.27 (running as nobody:nobody) non-suexec >> - PHP-4.3.2 (allow_uploads=Off) >> >> We have found v2k.tar uploaded to /tmp/ and a new directory: /tmp/v/. >> >> su-2.02# ls -la /tmp >> drwxrwxrwt 2 root wheel 2560 Jul 2 13:40 . >> drwxr-xr-x 17 root wheel 512 Nov 3 2002 .. >> -rw-r--r-- 1 nobody wheel 1762550 Jul 2 12:07 iprot-ip_log >> -rw-r--r-- 1 nobody wheel 739326 Jul 2 11:13 iprot-user_log >> -rw-r--r-- 1 nobody wheel 16384 Jul 2 13:48 iprot.db >> srwxrwxrwx 1 root wheel 0 Apr 29 02:16 mysql.sock >> drwxr-xr-x 3 nobody wheel 512 Oct 9 2002 v >> -rw-r--r-- 1 nobody wheel 253952 Jul 2 09:21 v2k.tar >> >> Contents of /tmp/v: >> >> su-2.02# ls -lR >> total 164 >> -rwxr-xr-x 1 nobody wheel 13157 Nov 28 2002 hell >> -rw-r--r-- 1 nobody wheel 102400 Sep 13 2002 k.tar >> drwxr-xr-x 2 nobody wheel 512 Nov 28 2002 netbios >> -rwxr-xr-x 1 nobody wheel 21866 Oct 9 2002 usg >> -rwxr-xr-x 1 nobody wheel 15807 Nov 8 2002 vadimI >> >> ./netbios: >> total 94 >> -rwxr-xr-x 1 nobody wheel 53760 Nov 28 2002 nbtscan >> -rwxr-xr-x 1 nobody wheel 18070 Nov 28 2002 smbkill >> -rwxr-xr-x 1 nobody wheel 23305 Nov 28 2002 smbnuke >> >> The program found running was 'hell': >> An excerpt from ps aux/axl: >> >> nobody 3981 1 252 22385e0 0 I ?? 0:00.01 sh -c v/hell >> 62.221.xxx.xx 110 2>&1 >> nobody 3982 3981 252 22385e0 0 RN ?? 10:17.28 v/hell 62.221.xxx.xx >> 110 >> nobody 4002 1 252 22385e0 0 I ?? 0:00.07 sh -c v/hell 62.221.xxx.xx >> 110 2>&1 >> nobody 4003 4002 252 22385e0 0 R ?? 9:53.19 v/hell >> 62.221.xxx.xx 110 >> nobody 4033 1 252 22385e0 0 I ?? 0:00.09 sh -c v/hell 202.8.xxx.xxx >> 110 2>&1 >> nobody 4034 4033 252 22385e0 0 R ?? 8:18.19 v/hell 202.8.xxx.xxx 110 >> nobody 4051 1 252 22385e0 0 I ?? 0:00.08 sh -c v/hell 202.8.xxx.xxx >> 110 2>&1 >> nobody 4052 4051 252 22385e0 0 R ?? 7:40.63 v/hell 202.8.xxx.xxx 110 >> nobody 4122 1 252 22385e0 0 I ?? 0:00.04 sh -c v/hell 202.73.xxx.xxx >> 110\r\nwhoami; 2>&1 >> nobody 4179 1 252 22385e0 0 I ?? 0:00.06 sh -c v/hell 202.73.xxx.xxx >> 110\r\nwhoami; 2>&1 >> nobody 4180 4179 252 22385e0 0 R ?? 4:43.55 v/hell 202.73.xxx.xxx >> 110\r >> nobody 4213 1 252 22385e0 0 I ?? 0:00.05 sh -c v/hell 66.151.xx.xx >> 110\r\nwhoami; 2>&1 >> >> su-2.02# strings hell >> /lib/ld-linux.so.2 >> __gmon_start__ >> libc.so.6 >> printf >> connect >> socket >> bzero >> send >> __deregister_frame_info >> bcopy >> gethostbyname >> htons >> exit >> atoi >> _IO_stdin_used >> __libc_start_main >> __register_frame_info >> GLIBC_2.0 >> PTRh >> Bombing %s, port %d >> Unknown host: %s >> Syntax: ./hell host port >> Port can be any port, any of them work equally well >> FUCKER!!!! >> su-2.02# >> >> -System binaries are fine checking via known good BSDi 4.2 machines >> md5 output >> -Nothing unusual running via netstat/sockstat >> -Scanned externally for anything rogue listening - 0 found. >> -root/admin accounts are not compromised >> >> The v2k.tar date/time was 09:21 July 2nd, 2003. A grep thru all the >> webserver >> logs for 1-2 minutes on either side of that time do not reveal any >> unusual >> requests that would look like an overflow type string that we've seen >> attempted >> in the past. >> >> Any clues? >> >> D. >> =========== >> >> ---------------------------------------------------------------------- >> ------ >> Attend the Black Hat Briefings & Training, July 28 - 31 in Las Vegas, >> the >> world's premier technical IT security event! 10 tracks, 15 training >> sessions, >> 1,800 delegates from 30 nations including all of the top experts, >> from CSO's to >> "underground" security specialists. See for yourself what the buzz >> is about! >> Early-bird registration ends July 3. This event will sell out. >> www.blackhat.com >> ---------------------------------------------------------------------- >> ------ >> > > -- > > Best regards, > Shimi > > > ---- > > "Outlook is a massive flaming horrid blatant security violation, > which > also happens to be a mail reader." > > "Sure UNIX is user friendly; it's just picky about who its friends > are." > > > ----------------------------------------------------------------------- > ----- > Attend the Black Hat Briefings & Training, July 28 - 31 in Las Vegas, > the > world's premier technical IT security event! 10 tracks, 15 training > sessions, > 1,800 delegates from 30 nations including all of the top experts, from > CSO's to > "underground" security specialists. See for yourself what the buzz is > about! > Early-bird registration ends July 3. This event will sell out. > www.blackhat.com > ----------------------------------------------------------------------- > ----- > > --- Bill Pennington, CISSP, CCNA Chief Technology Officer WhiteHat Security Inc. http://www.whitehatsec.com ---------------------------------------------------------------------------- Attend the Black Hat Briefings & Training, July 28 - 31 in Las Vegas, the world's premier technical IT security event! 10 tracks, 15 training sessions, 1,800 delegates from 30 nations including all of the top experts, from CSO's to "underground" security specialists. See for yourself what the buzz is about! Early-bird registration ends July 3. This event will sell out. www.blackhat.com ----------------------------------------------------------------------------
This archive was generated by hypermail 2b30 : Thu Jul 03 2003 - 09:16:27 PDT