[Snort-sigs] Possible FP on sid:26529 - Cdorked backdoor command attempt ?

Joel Esler jesler at ...435...
Fri May 3 16:27:29 EDT 2013


Thanks Andre,

I'll get the analyst that wrote these on it.

--
Joel Esler
Senior Research Engineer, VRT
OpenSource Community Manager
Sourcefire

On May 3, 2013, at 12:09 PM, Andre DiMino <adimino at ...3810...> wrote:

> I'm seeing this alert fire quite a bit today, and I'm not seeing
> anything seemingly related to Linux-Cdorked commands. I'm wondering if
> it may be a FP?
> The sig is as follows:
> 
> alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS
> (msg:"INDICATOR-COMPROMISE Unix.Backdoor.Cdorked backdoor command
> attempt"; flow:to_server,established; content:"SECID=";
> fast_pattern:only; content:"SECID="; nocase; http_cookie;
> pcre:"/^\/[^?]*?\?[a-f0-9]{4}/Ui"; metadata:impact_flag red, policy
> balanced-ips drop, policy security-ips drop, service http;
> reference:url,blog.sucuri.net/2013/04/apache-binary-backdoors-on-cpanel-based-servers.html;
> reference:url,virustotal.com/en/file/7b3cd8c1bd0249df458084f28d91648ad14e1baf455fdd53b174481d540070c6/analysis/;
> classtype:trojan-activity; sid:26529; rev:1; )
> 
> Traffic I'm seeing looks like this:
> 
> GET /ba.html?1095 HTTP/1.1
> Host: c.betrad. com
> User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3)
> AppleWebKit/536.29.13 (KHTML, like Gecko) Version/6.0.4
> Safari/536.29.13
> Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
> Referer: hxxp://ad.media6degrees.
> com/adserv/cs?adType=iframe|is_preview=0|cId=16057|ec=1|spId=91095|advId=1218|tpCId=4954476|exId=9|price=0.354173|vurlId=216248|srcUrlEnc=http://screenrant.
> com/captain-america-2-falcon-winter-soldier-costumes/|tpInvId=95|notifyServer=aeq311.eq.pl.pvt|notifyPort=8080|bdie=1c7o0s87z0jj8|bid=1.7799999713897705|tId=6892644925539300|pubId=7854|invId=12998|secId=56|tpSecId=1319854|foo=bar|cb=1367595784
> Accept-Language: en-us
> Accept-Encoding: gzip, deflate
> Connection: keep-alive
> 
> Remote host is
> e5413.g.akamaiedge.net. A 184.26.51.231
> e5413.g.akamaiedge.net.0.1.cn.akamaiedge.net. A 184.26.51.231
> 
> It doesn't *appear* that screenrant. com is infected with Cdork, so I
> thought I'd just throw this out here for consideration.
> 
> Here are a few more:
> 
> ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
> GET /ba.html?1095 HTTP/1.1
> Host: c.betrad. com
> User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:20.0)
> Gecko/20100101 Firefox/20.0
> Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
> Accept-Language: en-US,en;q=0.5
> Accept-Encoding: gzip, deflate
> Referer: http://ad.media6degrees.
> com/adserv/cs?tId=6809218409273906|cb=1367595163|adType=iframe|cId=15604|ec=1|spId=82885|advId=1065|exId=21|price=2.010000|pubId=127|secId=414|invId=1186|tpInvId=3|notifyServer=aeq194.eq.pl.pvt|notifyPort=8080|bdie=1jkm6wt1e2vod|bid=1.50|srcUrlEnc=http%3A%2F%2Fnation.foxnews.
> com%2Fstatic%2Fv%2Fall%2Fhtml%2Fad-ifr.html%3Fid%3Dframe2-300x100%26ns%3DfriendlyComm|bms=3
> Connection: keep-alive
> If-Modified-Since: Thu, 02 May 2013 22:08:34 GMT
> If-None-Match: "5389a15bc989f3e0f559222cf19c0064:1367532514"
> +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
> GET /reportV3/ft.stat?10476941-0-310-0-19070F3B686BBB-945671-0x0x0x123 HTTP/1.1
> Host: stat.flashtalking. com
> User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0)
> Gecko/20100101 Firefox/17.0
> Accept: image/png,image/*;q=0.8,*/*;q=0.5
> Accept-Language: en-US,en;q=0.5
> Accept-Encoding: gzip, deflate
> Connection: keep-alive
> Referer: http://servedby.flashtalking.
> com/imp/3/25598;543598;201;jsiframe;Media6Degrees;Media6degrees728x90/?ft_custom=&imageType=gif&ftDestID=3642763&ft_width=728&ft_height=90&click=http://ad.media6degrees.
> com/adserv/clk?tId=6676444134860084|cId=16511|cb=1367594173|notifyPort=8080|exId=25|tpAuctId=41b7d3ef371e05ead0634b808e1e96f5c4f3d910|tId=6676444134860084|tpInvId=2010722|ec=1|secId=460|price=883B0423C1C85454|pubId=5593|advId=1451|notifyServer=asd155.sd.pl.pvt|bdie=1pelg95qfwmya|spId=83223|adType=iframe|invId=10620|bms=2010722|bid=10.00|ctrack=&ftOBA=1&cachebuster=1367594174168
> Cookie: flashtalkingad1="GUID=19070F3B686BBB|segment=(y8BWISEA-m:c400last,SEABWI-m:c400ret,ags,bi7-m:origdest)|tp=(244-1477-v-19421841)"
> 
> --
> 
> Andre' M. DiMino
> DeepEnd Research
> http://deependresearch.org
> http://sempersecurus.org
> 
> "Make sure that nobody pays back wrong for wrong, but always try to be
> kind to each other and to everyone else" - 1 Thess 5:15 (NIV)
> 
> ------------------------------------------------------------------------------
> Get 100% visibility into Java/.NET code with AppDynamics Lite
> It's a free troubleshooting tool designed for production
> Get down to code-level detail for bottlenecks, with <2% overhead.
> Download for free and get started troubleshooting in minutes.
> http://p.sf.net/sfu/appdyn_d2d_ap2
> _______________________________________________
> Snort-sigs mailing list
> Snort-sigs at lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/snort-sigs
> http://www.snort.org
> 
> 
> Please visit http://blog.snort.org for the latest news about Snort!

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20130503/c8fe100d/attachment.html>


More information about the Snort-sigs mailing list