Skip to content

Latest commit

 

History

History

62.201.237.42-2018-04-30a

Another IndoXploit Web Shell

Origin

IP address 62.201.237.42

62.201.237.42 does not have a PTR record associated. It is in Iraq, and owned by iqnet.com:

% Information related to '62.201.237.0/24AS44217'

route:          62.201.237.0/24
descr:          IQ-NETWORKS-SULY-SUBNET
origin:         AS44217
mnt-by:         IQNET-LIR-MNT
created:        2014-01-08T10:04:14Z
last-modified:  2014-01-08T10:04:14Z

Download

My first IndoXploit got downloaded via a honey pot email spamming tool. This one got downloaded via a honey pot fake WSO web shell. The attacker used the "FilesMAn" action, "uploadFile" sub-action, which is a typical use of WSO. The code would have ended up in a file indodb.php Nobody has tried to invoke indodb.php so far.

Analysis

Both reference stale URL http://pastebin.com/EpP671gK

Original references http://pastebin.com/Lj46KxFT, which claims to be "CGI-Telnet Version 1.3"

Reference to stale URL http://pastebin.com/raw.php?i=XTUFfJLg Many pastebin uploads associated with that stale URL.