Skip to content

Latest commit

 

History

History

promos

promos.php

Email spamming tool.

Origin

Internet Protocol Address

188.40.81.84 => static.84.81.40.188.clients.your-server.de

An IP address from AS24940, Hetzner Online, Datacenter 10

traceroute shows a route going into hetzner.interxionfra4.nl-ix.net and then core21.fsn1.hetzner.com, so the whois and DNS lookup seem believeable.

p0f3 data:

[2017/12/08 06:00:07] mod=syn|cli=188.40.81.84/62158|srv=162.246.45.144/80|subj=cli|os=Windows 7 or 8|dist=12|params=none|raw_sig=4:116+12:0:1306:8192,2:mss,nop,ws,nop,nop,sok:df,id+:0
[2017/12/08 06:00:07] mod=mtu|cli=188.40.81.84/62158|srv=162.246.45.144/80|subj=cli|link=???|raw_mtu=1346
[2017/12/08 06:00:07] mod=syn+ack|cli=188.40.81.84/62158|srv=162.246.45.144/80|subj=srv|os=???|dist=0|params=none|raw_sig=4:64+0:0:1460:mss*20,7:mss,nop,nop,sok,nop,ws:df:0
[2017/12/08 06:00:07] mod=mtu|cli=188.40.81.84/62158|srv=162.246.45.144/80|subj=srv|link=Ethernet or modem|raw_mtu=1500

A Windows 7 or 8 machine. Interesting.

Download

Download to a fake WSO web shell that is part of my WordPress honey pot.

Took advantage of WSO features by having the login pasword in a POST name/value pair, "[pass] => nhzgrf", along with the "Php" action, and the PHP source code to evaluate, which lets the downloader combine logging in with remote code execution.

Decoding

  1. cp 188.40.81.84WiqM2DM84DBGMCs7q5JorQAAAAU.php.file dc1.php
  2. Hand edit dc1.php to remove goop, and verify it doesn't do bad things.
  3. php dc1.php, which yields promos.php

It looks like the code in dc1.php will echo something like:

p_url_to_check: http://compromised.host/directory/promos.php

This may be a way to communicate what URL to use to get at promos.php fabulous functionality after it gets installed.

Usage

Invoked via HTTP POST.

Two main functions, "Check" (?ch=1) and "Send" (?sn=1).

The "Send" function looks like it can explode a single email to many unwilling receipients. It looks like it can do attachments, and maybe append randomized blobs of characters to attempt to fool spam filters. It ultimately uses PHP's built-in mail() function.

The "Check" function can send test emails. It can check if the IP address of the compromised WordPress site appears in these email spam blacklists:

b.barracudacentral.org
xbl.spamhaus.org
sbl.spamhaus.org
zen.spamhaus.org
bl.spamcop.net