Not sure if I'm allowed to upload stuff here, but to follow up on this,
I've attached a zip containing the original decoded infection php code, the
infection in its natural state (doubly base64 encoded), definitions that
match it, and other nfo like a simple script that can clean the infection
without damaging php files its been injected into (with sed + regex).

On Sat, Feb 6, 2016 at 7:19 PM, Jesse Nicholson <ascensionsyst...@gmail.com>
wrote:

> @ant indeed, this is what I'm doing. Original server is gone, new server
> was built from the ground up but the xferred required user files (web root)
> is quarantined while I go through it and lean up. There's a really nasty
> php injection that appears to intercept, proxy requests to various IPs that
> come from control server(s), attempts to download new viruses and such to
> your configured temp upload directory and then inject them into responses
> and such. I've made a definition that works very well, and have uncovered
> nearly 300 infected files using that sig. Other root shells were also
> present, but existing definitions cleaned them up.
>
> Was curious because I'd like to submit the definition in case it helps, so
> far I've only submitted one sample of the infection as found in the wild
> and a second file (both zipped) of the decoded main function group.
>
> @Al Yep I subscribed to the db list. MD5 is 92 3b 61 7b a7 9a da 3b 04 e7
> ba d7 a4 d7 04 74
>
> The infection has many things in common with the one posted here:
> http://stackoverflow.com/q/22647441
>
> On Sat, Feb 6, 2016 at 7:05 PM, Crap <c...@the-tiddler.co.uk> wrote:
>
>> > I'm cleaning a server
>> > that got badly infected,
>>
>> I know this doesn't answer the OP, but destroy the server and treat all
>> data as compromised.
>> Rebuild for a fresh trusted base and attempt to clean the data away from
>> the original server..
>>
>> -- ant
>>
>> > On 6 Feb 2016, at 23:41, Jesse Nicholson <ascensionsyst...@gmail.com>
>> wrote:
>> >
>> > Where/how can I check on the status of a submission? I'm cleaning a
>> server
>> > that got badly infected, and while doing so discovered what I believe
>> to be
>> > a PHP exploit that maldet and clamav don't have definitions for.
>> Virustotal
>> > also has 0 hits on it. However, I'm sure it's malicious because the main
>> > function block is double base 64 encoded, everything else that interacts
>> > with it is salted and random. Decoding the main function block, there
>> > appears to functions to compress local files and xfer them to unknown
>> > locations.
>> >
>> > Anyway I've successfully created a definition for it, have nearly 300
>> hits
>> > and am curious about following up after I've submitted one sample via
>> the
>> > website. Never done anything like this before, so looking for
>> > guidance/advice.
>> >
>> > --
>> > Jesse Nicholson
>> > _______________________________________________
>> > Help us build a comprehensive ClamAV guide:
>> > https://github.com/vrtadmin/clamav-faq
>> >
>> > http://www.clamav.net/contact.html#ml
>> _______________________________________________
>> Help us build a comprehensive ClamAV guide:
>> https://github.com/vrtadmin/clamav-faq
>>
>> http://www.clamav.net/contact.html#ml
>>
>
>
>
> --
> Jesse Nicholson
>



-- 
Jesse Nicholson
_______________________________________________
Help us build a comprehensive ClamAV guide:
https://github.com/vrtadmin/clamav-faq

http://www.clamav.net/contact.html#ml

Reply via email to