Backdoor Hack found in "Backup" folder - musa.php

General discussion of anything. Discuss a topic in and out of IntegraMOD

Moderator: Integra Moderator

Backdoor Hack found in "Backup" folder - musa.php

PostAuthor: jwernerny » Sun May 14, 2006 5:47 pm

Hey guys,

I found something rather disturbing in my backup directory of my php site today. It was a php script that allows anyone access to the backdoor of my site. It is called "musa.php". I did a search of google and of this Integramod2, and didn't see it mentioned anywhere. I am not sure how to block it other then to disable the backups (which I don't want to do, but would rather do then have an unsecure site).

BTW, the only way to remove it seems to be to use it to remove itself.

Anyway, here is the header of the code for the hack with the hope someone can block it.

- John

Code: Select all
 <?php/*********************************************************************************************************                    c99shell.php v.1.0 pre-release build #13*                            Freeware license.*                                ÃƒÆ’‚ © CCTeaM.*  c99shell - файл-менеджер через www-броузер, "заточеный" для взлома.*  Вы можете бесплатно скачать последнюю версию на домашней страничке продукта]http://ccteam.ru*[/url]  ICQ UIN #: 656555**  Особенности:*  + управление локальными и удаленными (ftp, samba) файлами/папками, сортировка*    закачивание скачивание файлов и папок*    (предворительно упаковывается/распаковывается через tar)*    продвинутый поиск (возможен внутри файлов)*    modify-time и access-time у файлов не меняются при редактировании (для откл. см $filestealth)*  + выполнение произвольного PHP-кода*  + кодировщик данных через md5, unix-md5, sha1, crc32, base64*  + быстрый локальный анализ безопасности ОС*  + быстрое ftp-сканирование на связки login;login из /etc/passwd (обычно дает доступ к 1/100 аккаунтов)*    постраничный вывод, сортировка, групповые операции над БД/таблицами, управление процессами SQL)*  + скрипт "любит" include: автоматически ищет переменные с дескрипторами и вставляет их в ссылки (опциально)      также можно изменить $surl (базовая ссылка) как через конфигурацию (принудительно) так и через cookie "c99sh_surl",      идет авто-запись значения $set_surl в cookie "set_surl"*  + возможность "забиндить" /bin/bash на определенный порт с произвольным паролем,*    или сделать back connect (производится тестирование соеденения, и выводятся параметры для запуска NetCat).*  + возможность быстрого само-удаления скрипта*  + автоматизированая отправка сообщений о недоработках и пожеланиях автору (через mail())**    Приведен далеко не полный список возможностей.**   Ожидаемые изменения:*  ~ Развитие sql-менеджера*  ~ Добавление недостающих расширений файлов**  ~-~ Пишите обо всех найденых недоработках, желаемых изменениях и доработках (даже о самых незначительных!)        в ICQ UIN #656555 либо через раздел "feedback", будут рассмотрены все предложения и пожелания.**  Last modify: 29.07.2005**  ÃƒÆ’‚ © Captain Crunch Security TeaM. Coded by tristram********************************************************************************************************/    
Last edited by jwernerny on Wed Dec 31, 1969 5:00 pm, edited 1 time in total.
User avatar
jwernerny
Members
Members
 
Posts: 87
Likes: 0 post
Liked in: 0 post
Joined: Wed Apr 12, 2006 4:58 am
Cash on hand: 0.00
Location: Fairport, NY

Re: Backdoor Hack found in "Backup" folder - musa.

PostAuthor: grizzly_cs » Sun May 14, 2006 6:50 pm

Break down in english

c99shell - file- manager through www-brouzer, "zatochenyy" for the breaking.
* you can free of charge skachat' last version on home page of the product:

* the special features:

* + control of local and remote (ftp, samba) faylami/papkami, the sorting

* injection running off it is file and the folders

* (predvoritel'no it upakovyvayetsya/raspakovyvayetsya through tar)

* the moved search (it is possible is inside file)

* modify- Time and access- Time in is file they do not change with the editing (for off. cm #$$filestealth>)

* + the fulfillment of arbitrary PHP- code * + the coder of the data through md5, unix-md5, sha1, crc32, base64 * + the rapid local analysis of safety OS

* + rapid ftp- scanning to bonds login;.login from /.etch/passshd (it usually gives access to 1/100 akkauntov)

* paginal conclusion, sorting, the group operations above BD/tablitsami, control of processes of SQL)

* + script "loves" include: automatically searches for variables with the descriptors and puts them in the references (optsial'no) also it is possible to change $surl (base reference) both through the configuration (forcedly) and through cookie "c99sh_.surl", it goes the auto-record of the value of $set_surl in cookie "set_.surl"

* + the possibility "to zabindit'" to /.bin/basyu to the specific port with the arbitrary password, or to make back connect (it is produced testing soyedeneniya, and they are derived the parameters for starting of NetCat).

* + the possibility of the rapid self-removal of the script * + the avtomatizirovanaya sending of communications about the omissions and the wishes to the author (through mail()) * * is given far from complete list of possibilities.


* * the expected changes: * ~ development sql- manager * ~ the addition of the missing expansions it is file

* * ~ - ~ write about all naydenykh omissions, desired changes and modifications (even about the insignificant!) in ICQ UIN #'shch'shchshchshch or through the division "feedback", will be examined all proposals and wishes.
Last edited by grizzly_cs on Wed Dec 31, 1969 5:00 pm, edited 1 time in total.
User avatar
grizzly_cs
Members
Members
 
Posts: 33
Likes: 0 post
Liked in: 0 post
Joined: Sat May 06, 2006 11:46 pm
Cash on hand: 0.00

Re: Backdoor Hack found in "Backup" folder - musa.

PostAuthor: found it » Mon May 15, 2006 1:41 am

hi

We are looking into it

:mrgreen:
Last edited by found it on Wed Dec 31, 1969 5:00 pm, edited 1 time in total.
[url=http]themes.[/url]
http://www.founditforum.com :: [url=http]Joining people together[/url]

[url=http][img=left]http://www.bbful.com/bbful_banner2.png[/img][/url]
User avatar
found it
Dev Team
Dev Team
 
Posts: 792
Likes: 0 post
Liked in: 0 post
Joined: Mon Mar 27, 2006 4:29 am
Cash on hand: 0.00

PostAuthor: IW4 » Fri Jun 09, 2006 2:15 pm

Y'know, I had this on mine, as well. Out of curiosity, jwernerny, who's your web host?
Last edited by IW4 on Wed Dec 31, 1969 5:00 pm, edited 1 time in total.
[url=http][img=left]http://ex500riders.com/signatures/IW4.png[/img][/url]
User avatar
IW4
Newbie
Newbie
 
Posts: 16
Likes: 0 post
Liked in: 0 post
Joined: Sat Apr 08, 2006 6:36 pm
Cash on hand: 0.00

PostAuthor: ArangeL » Fri Jun 09, 2006 4:58 pm

I found the file.

Link: http://hometown.aol.com/yarivgiladi/musa.php

This is an other stupid "BackDoor Shell Exploit" :(
Last edited by ArangeL on Wed Dec 31, 1969 5:00 pm, edited 1 time in total.
User avatar
ArangeL
Newbie
Newbie
 
Posts: 9
Likes: 0 post
Liked in: 0 post
Joined: Wed Apr 26, 2006 9:46 am
Cash on hand: 0.00

PostAuthor: jwernerny » Fri Jun 09, 2006 5:17 pm

"IW4";p="9100" wrote:Y'know, I had this on mine, as well. Out of curiosity, jwernerny, who's your web host?


I am with WB-Hosting now. I did read something that suggested it could be cross loaded from another site on a shared hosts.
Last edited by jwernerny on Wed Dec 31, 1969 5:00 pm, edited 1 time in total.
User avatar
jwernerny
Members
Members
 
Posts: 87
Likes: 0 post
Liked in: 0 post
Joined: Wed Apr 12, 2006 4:58 am
Cash on hand: 0.00
Location: Fairport, NY

Re: Backdoor Hack found in "Backup" folder - musa.

PostAuthor: Dr. Bantham » Sat Jun 10, 2006 2:58 am

I have it! I deleted my backup directory in entirety until I know what is going on. It has been there since April Fool's Day (seriously) and had edited all of the PHP files in the backup directory, according to the time stamp. However, according to the translation above, it has the ability to inject files and not change the timestamp. I am super-paranoid at this point. Should I be changing my passwords for IntegraMOD and/or my server host? Is this a destructive trojan or is it fishing for sensitive information. Help!
Last edited by Dr. Bantham on Wed Dec 31, 1969 5:00 pm, edited 1 time in total.
User avatar
Dr. Bantham
Integra Member
Integra Member
 
Posts: 152
Likes: 0 post
Liked in: 0 post
Joined: Sat Apr 08, 2006 6:25 pm
Cash on hand: 0.00

Re: Backdoor Hack found in "Backup" folder - musa.

PostAuthor: Dr. Bantham » Mon Jun 12, 2006 2:37 pm

Has anyone else found this file on their server? The file and the modified files were all stamped April 1st on my server. Is this a joke or a coincidence? It seems strange that there is not more information available. I am going to upload my backup directory from scratch again and keep an eye out. Any advice?
Last edited by Dr. Bantham on Wed Dec 31, 1969 5:00 pm, edited 1 time in total.
User avatar
Dr. Bantham
Integra Member
Integra Member
 
Posts: 152
Likes: 0 post
Liked in: 0 post
Joined: Sat Apr 08, 2006 6:25 pm
Cash on hand: 0.00

Re: Backdoor Hack found in "Backup" folder - musa.

PostAuthor: grizzly_cs » Mon Jun 12, 2006 10:13 pm

I have not.....
Last edited by grizzly_cs on Wed Dec 31, 1969 5:00 pm, edited 1 time in total.
User avatar
grizzly_cs
Members
Members
 
Posts: 33
Likes: 0 post
Liked in: 0 post
Joined: Sat May 06, 2006 11:46 pm
Cash on hand: 0.00

Re: Backdoor Hack found in "Backup" folder - musa.

PostAuthor: Dr. Bantham » Sat Jun 24, 2006 7:06 am

"found it";p="5930" wrote:We are looking into it
:mrgreen:
Any developments? I managed to delete the file and it has not reappeared for two weeks, but I am naturally concerned that security has already been compromised.
Last edited by Dr. Bantham on Wed Dec 31, 1969 5:00 pm, edited 1 time in total.
User avatar
Dr. Bantham
Integra Member
Integra Member
 
Posts: 152
Likes: 0 post
Liked in: 0 post
Joined: Sat Apr 08, 2006 6:25 pm
Cash on hand: 0.00

Re: Backdoor Hack found in "Backup" folder - musa.

PostAuthor: itunes66 » Sat Jun 24, 2006 7:54 am

was in mine to, check your root folder (/) of your host it had put a file there, so i deleted it and musa.php
Last edited by itunes66 on Wed Dec 31, 1969 5:00 pm, edited 1 time in total.

itunes66
Members
Members
 
Posts: 34
Likes: 0 post
Liked in: 0 post
Joined: Thu Apr 06, 2006 4:59 pm
Cash on hand: 0.00


Return to General Discussion

Who is online

Registered users: App360MonitorBot, Bing [Bot], Google [Bot], Majestic-12 [Bot]