BadBlood 27374/tcp #[trojan] Bad Blood EGO 27374/tcp #[trojan] EGO FakeSubSeven 27374/tcp #[trojan] Fake SubSeven Lion 27374/tcp #[trojan] Lion Ramen 27374/tcp #[trojan] Ramen Seeker 27374/tcp #[trojan] Seeker Subseven2.1.4DefCon8 27374/tcp #[trojan] Subseven 2.1.4 DefCon 8 SubSeven2.1Gold 27374/tcp #[trojan] SubSeven 2.1 Gold SubSeven2.2 27374/tcp #[trojan] SubSeven 2.2 SubSevenMuie 27374/tcp #[trojan] SubSeven Muie SubSeven 27374/tcp #[trojan] SubSeven SubSeven 27374/tcp #[trojan] SubSeven TheSaint 27374/tcp #[trojan] The Saint Ttfloader 27374/tcp #[trojan] Ttfloader Webhead 27374/tcp #[trojan] Webhead
When a host is compromised, the ramen toolkit is automatically copied to the compromised host, installed in "/usr/src/.poop", and started. The ramen toolkit is controlled by a series of shell scripts that make modifications to the compromised system and initiate attacks on other systems. Several notable system modifications are made in sequence after ramen is started. <snip> For systems with '/etc/inetd.conf' an intruder supplied program is added as '/sbin/asp'. A service named 'asp' is added to '/etc/inetd.conf' and inetd is sent a signal to reload the configuration file. This causes inetd to listen on TCP socket number 27374 for incoming connections. <snip> For systems without '/etc/inetd.conf' an intruder-supplied program is added as '/usr/sbin/asp'. A service named 'asp' is added to '/etc/xinetd.d' and xinetd is sent a signal to reload it's configuration. This causes xinetd to listen on TCP socket number 27374 for incoming connections. <snip>
snort packet dump: =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ 03/01-21:30:33.668485 63.104.113.85:1784 -> 12.82.133.52:27374 TCP TTL:115 TOS:0x0 ID:34220 IpLen:20 DgmLen:48 DF ******S* Seq: 0x3F12A9DE Ack: 0x0 Win: 0x2238 TcpLen: 28 TCP Options (4) => MSS: 1360 NOP NOP SackOK =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ 03/01-21:30:36.618772 63.104.113.85:1784 -> 12.82.133.52:27374 TCP TTL:115 TOS:0x0 ID:34278 IpLen:20 DgmLen:48 DF ******S* Seq: 0x3F12A9DE Ack: 0x0 Win: 0x2238 TcpLen: 28 TCP Options (4) => MSS: 1360 NOP NOP SackOK =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ 03/01-21:30:42.639390 63.104.113.85:1784 -> 12.82.133.52:27374 TCP TTL:115 TOS:0x0 ID:34402 IpLen:20 DgmLen:48 DF ******S* Seq: 0x3F12A9DE Ack: 0x0 Win: 0x2238 TcpLen: 28 TCP Options (4) => MSS: 1360 NOP NOP SackOK =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ ipchains: Mar 1 21:30:33 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 63.104.113.85:1784 12.82.133.52:27374 L=48 S=0x00 I=34220 F=0x4000 T=115 SYN (#64) Mar 1 21:30:36 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 63.104.113.85:1784 12.82.133.52:27374 L=48 S=0x00 I=34278 F=0x4000 T=115 SYN (#64) Mar 1 21:30:42 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 63.104.113.85:1784 12.82.133.52:27374 L=48 S=0x00 I=34402 F=0x4000 T=115 SYN (#64) p0f: Fri Mar 1 21:30:33 2002 63.104.113.85: UNKNOWN [8760:115:1360:1:-1:1:1:48]. 63.104.113.85:1784 -> 12.82.133.52:27374 Fri Mar 1 21:30:36 2002 63.104.113.85: UNKNOWN [8760:115:1360:1:-1:1:1:48]. 63.104.113.85:1784 -> 12.82.133.52:27374 Fri Mar 1 21:30:42 2002 63.104.113.85: UNKNOWN [8760:115:1360:1:-1:1:1:48]. 63.104.113.85:1784 -> 12.82.133.52:27374 BW whois 2.9 by Bill Weinman (http://whois.bw.org/) © 1999-2001 William E. Weinman UUNET Technologies, Inc. (NETBLK-UUNET63) UUNET63 63.64.0.0 - 63.127.255.255 RTL Systems Inc (NETBLK-UU-63-104-113) UU-63-104-113 63.104.113.0 - 63.104.113.255 RTL Systems Inc (NETBLK-UU-63-104-113) 1046 East Commercial Lowell, IN 46356 US Netname: UU-63-104-113 Netblock: 63.104.113.0 - 63.104.113.255 Maintainer: RTLS Coordinator: Felder, Tom (TF242-ARIN) felder@xvi.net 219-696-4984 Record last updated on 31-May-2000. Database last updated on 1-Mar-2002 19:57:27 EDT. host: [toot@sparky /home/www/html/sys_docs/snort]# host 66.186.213.43 43.213.186.66.in-addr.arpa. domain name pointer NODE-43.HOSTING-NETWORK.COM. http to 63.104.113.85: "Could not connect to remote server
snort packet dump: =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ 03/01-22:02:12.414480 68.41.113.212:3968 -> 12.82.140.53:27374 TCP TTL:115 TOS:0x0 ID:5854 IpLen:20 DgmLen:48 DF ******S* Seq: 0x2FCA561 Ack: 0x0 Win: 0x2000 TcpLen: 28 TCP Options (4) => MSS: 1460 NOP NOP SackOK =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ 03/01-22:02:15.434798 68.41.113.212:3968 -> 12.82.140.53:27374 TCP TTL:115 TOS:0x0 ID:21726 IpLen:20 DgmLen:48 DF ******S* Seq: 0x2FCA561 Ack: 0x0 Win: 0x2000 TcpLen: 28 TCP Options (4) => MSS: 1460 NOP NOP SackOK =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ 03/01-22:02:21.535513 68.41.113.212:3968 -> 12.82.140.53:27374 TCP TTL:115 TOS:0x0 ID:60638 IpLen:20 DgmLen:48 DF ******S* Seq: 0x2FCA561 Ack: 0x0 Win: 0x2000 TcpLen: 28 TCP Options (4) => MSS: 1460 NOP NOP SackOK =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ 03/01-22:02:33.766764 68.41.113.212:3968 -> 12.82.140.53:27374 TCP TTL:115 TOS:0x0 ID:2272 IpLen:20 DgmLen:48 DF ******S* Seq: 0x2FCA561 Ack: 0x0 Win: 0x2000 TcpLen: 28 TCP Options (4) => MSS: 1460 NOP NOP SackOK =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ ipchains: Mar 1 22:02:12 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 68.41.113.212:3968 12.82.140.53:27374 L=48 S=0x00 I=5854 F=0x4000 T=115 SYN (#64) Mar 1 22:02:15 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 68.41.113.212:3968 12.82.140.53:27374 L=48 S=0x00 I=21726 F=0x4000 T=115 SYN (#64) Mar 1 22:02:21 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 68.41.113.212:3968 12.82.140.53:27374 L=48 S=0x00 I=60638 F=0x4000 T=115 SYN (#64) Mar 1 22:02:33 greatwall kernel: Packet log: input DENY ppp0 PROTO=6 68.41.113.212:3968 12.82.140.53:27374 L=48 S=0x00 I=2272 F=0x4000 T=115 SYN (#64) p0f: Fri Mar 1 22:02:12 2002 68.41.113.212: UNKNOWN [8192:115:1460:1:49:1:1:48]. 68.41.113.212:3968 -> 12.82.140.53:27374 Fri Mar 1 22:02:15 2002 68.41.113.212: UNKNOWN [8192:115:1460:1:49:1:1:48]. 68.41.113.212:3968 -> 12.82.140.53:27374 Fri Mar 1 22:02:21 2002 68.41.113.212: UNKNOWN [8192:115:1460:1:49:1:1:48]. 68.41.113.212:3968 -> 12.82.140.53:27374 Fri Mar 1 22:02:33 2002 68.41.113.212: UNKNOWN [8192:115:1460:1:49:1:1:48]. 68.41.113.212:3968 -> 12.82.140.53:27374 BW whois 2.9 by Bill Weinman (http://whois.bw.org/) © 1999-2001 William E. Weinman Request: 68.41.113.212 connecting to whois.arin.net [192.149.252.22:43] ... Comcast Cable Communications, Inc. (NETBLK-JUMPSTART-1)JUMPSTART-1 68.32.0.0 - 68.63.255.255 Comcast Cable Communications, Inc. (NETBLK-JUMPSTART-MICHIGAN-A) JUMPSTART-MICHIGAN-A 68.40.0.0 - 68.43.255.255 Request: NETBLK-JUMPSTART-MICHIGAN-A@whois.arin.net connecting to whois.arin.net [192.149.252.22:43] ... Comcast Cable Communications, Inc. (NETBLK-JUMPSTART-MICHIGAN-A) 1275 Ball Road Jonesville, MI US Netname: JUMPSTART-MICHIGAN-A Netblock: 68.40.0.0 - 68.43.255.255 Coordinator: Zeibari, Greg (GZ64-ARIN) gzeibari@comcastpc.com 856-661-7929 Domain System inverse mapping provided by: NS01.JDC01.PA.COMCAST.NET66.45.25.71 NS02.JDC01.PA.COMCAST.NET66.45.25.72 host: [toot@sparky /home/www/html/sys_docs/snort]# host 68.41.113.212 212.113.41.68.in-addr.arpa. domain name pointer bgp956615bgs.derbrh01.mi.comcast.net. http to 68.41.113.212: "Could not connect to remote server"