Author Topic: Malware and vulnerabilities on a eu.server Apache HTTP server  (Read 1691 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33900
  • malware fighter
« Last Edit: October 02, 2019, 02:32:44 PM by polonus »
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline Michael (alan1998)

  • Massive Poster
  • ****
  • Posts: 2768
  • Volunteer
Re: Malware and vulnerabilities on a eu.server Apache HTTP server
« Reply #1 on: October 02, 2019, 02:28:21 PM »
Ports (Open/Filtered)

Code: [Select]
Port 22 - SSH - v7.4p1 Debian
Port 25 - SMTP
Port 80 - HTTP - v2.4.25 (Debian Linux)
(Filtered) Port 111 - rpcbind
Port 443 - HTTPS - v2.4.25 (Debian Linux)
(Filtered) Port 445 - microsoft-ds
Port 2000 - Cisco?
Port 5060 - Cisco?
Port 8081 - Apache - v2.4.25 (Debian Linux)
Port 8181 - nginx - (phpMyAdmin exposed)
Port 9876 - Back-end access

Apache is vulnerable
Code: [Select]
(Priv Escalation) https://www.exploit-db.com/exploits/46676

Interestingly enough - they also have a mysql service running there.
Code: [Select]
mySQLi_real_connect(): (28000/1045): Access Denied for user 'admin'@'X.X.X.X' (using password: NO)
[b]*IP Removed*[/b]

Cheers
VOLUNTEER

Senior Security Analyst; Sys Admin (Linux); Forensics/Incident Response.

Security is a mindset, not an application. Think BEFORE you click.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33900
  • malware fighter
Re: Malware and vulnerabilities on a eu.server Apache HTTP server
« Reply #2 on: October 02, 2019, 03:53:56 PM »
Hi Michael (alan1998)

Thank you for that additional info, very interesting indeed.

Shodan.io and Censys.io for that matter are among your best friends online.
I have a personal Censys account and the data, they sit on, are often quite revealing.

For quite other security background info use https://intelx.io/ 
Peter Kleissner's specific info search engine, quite remarkable to say the least.
This security expert educated me on sinkholing, a couple of years ago,
while seeking ways to automate the process, which was hard to do.

Combine with the findings of a Dazzlepod IP scan and you know so much more,
what is behind an address or service there.

You can use these results according to these site's policies,
but are never allowed to use such retrieved  info against a(ny) particular website.
That is a big no-no against the Confidentiality Integrity Awareness regulations.
This is whenever you operate in the field of website security.

Then see: https://urlscan.io/ also a source not to be missed in website security analysis and website error-hunting  ;)

polonus a.k.a. Damian

Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37532
  • Not a avast user
Re: Malware and vulnerabilities on a eu.server Apache HTTP server
« Reply #3 on: October 02, 2019, 05:05:53 PM »
Quote
malicious word documents, which avast detects: https://www.virustotal.com/gui/file/14445473a8b471e550c9e36677223a3d0ffb017647dc8d7a01ae88efd1b993ac/detection
Payload from the fake .doc (downloader) is Emotet banking trojan

First Submission   2019-10-02
https://www.virustotal.com/gui/file/3c3fec3cef9506c1e7d333a079384baa19b70f6ed56ec2f51485682543ac1235/detection



Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33900
  • malware fighter
Re: Malware and vulnerabilities on a eu.server Apache HTTP server
« Reply #4 on: October 02, 2019, 05:34:39 PM »
Good to give this detection, Pondus.

But emotet is an ongoing malware campaign of what is really a gigantic size.

Emotet galore, see how it spreads everywhere like ill weed online:
https://urlhaus.abuse.ch/browse/

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!

Offline Pondus

  • Probably Bot
  • ****
  • Posts: 37532
  • Not a avast user
Re: Malware and vulnerabilities on a eu.server Apache HTTP server
« Reply #5 on: October 02, 2019, 05:38:13 PM »
yepp, and for those interested

Let’s talk Emotet malware 
https://www.malwarebytes.com/emotet/

Emotet malspam campaign uses Snowden’s new book as lure
https://blog.malwarebytes.com/botnets/2019/09/emotet-malspam-campaign-uses-snowdens-new-book-as-lure/



Offline Michael (alan1998)

  • Massive Poster
  • ****
  • Posts: 2768
  • Volunteer
Re: Malware and vulnerabilities on a eu.server Apache HTTP server
« Reply #6 on: October 02, 2019, 06:58:56 PM »
yepp, and for those interested

Let’s talk Emotet malware 
https://www.malwarebytes.com/emotet/

Emotet malspam campaign uses Snowden’s new book as lure
https://blog.malwarebytes.com/botnets/2019/09/emotet-malspam-campaign-uses-snowdens-new-book-as-lure/

I will add it to the list of known IOC we pull from the ineterwebs and check for it. (Emotet has been on our radar for the last month).

Cheers
VOLUNTEER

Senior Security Analyst; Sys Admin (Linux); Forensics/Incident Response.

Security is a mindset, not an application. Think BEFORE you click.