Author Topic: DarkLeech - malware mod for Apache  (Read 1462 times)

0 Members and 1 Guest are viewing this topic.

Offline hacker@sr.gov.yu

  • VIP
  • Peasant
  • *
  • Posts: 142
  • Cookies: 25
  • Tools don't make hackers, hackers make tools!
    • View Profile
DarkLeech - malware mod for Apache
« on: September 17, 2012, 11:18:03 am »

DarkLeech - malware mod for Apache


Next level of infecting web server gone public:

Code: [Select]
http://ondailybasis.com/blog/?p=1368

Offline s3my0n

  • Knight
  • **
  • Posts: 276
  • Cookies: 58
    • View Profile
    • ::1
Re: DarkLeech - malware mod for Apache
« Reply #1 on: September 17, 2012, 12:00:13 pm »
Good job Russians :P

Code: [Select]
System requirements:
Webserver: Apache2 server,
Operating system: Linux, BSD,
Access Level: root
Price: 1000$
Installation instructions: Place mod in any folder, edit Apache config file to add 1 string and restart server.
Major features:
- insert frames in php, html,js on the fly
- frame delivered to unique users only, no frame on repeat. << known anti-forensics. Interesting, how this implemented here, external logs or based on Apache2?
- possibility framing of traffic, that came from search engines only << looks like again Referer field?
- different modes of framing – low, standard, aggressive
- update of malicious frame from external URL
- Admins of webserver, that have ssh access to it, excluded from frame delivery. System also able to detect Admin’s IP by URL of administrative access and ban Admin IP from framing procedure.
- When root or any user in sudo group login into server, module transfer to “quiet mode”, and only when IP of the admin banned or filtered out, server proceed with infecting visitors.
- users filtered out by origin, OS version, local IP requests etc. << this is based on User-Agent, as far as I understand.
- When module detect any suspicious process in memory(tcpdump, rkhunter etc), it stop the activity
- option to encryption of framing.
As seller claim, module was used in private for 2 last years, now available for sell. Current version is 14.0
Major reason to going public – reticently researchers came close to find it out. So there is no reason to stay private.
Mode written in C and PHP
« Last Edit: September 17, 2012, 12:01:18 pm by s3my0n »
Easter egg in all *nix systems: E(){ E|E& };E

Offline Mioskava

  • /dev/null
  • *
  • Posts: 7
  • Cookies: 0
    • View Profile
Re: DarkLeech - malware mod for Apache
« Reply #2 on: September 17, 2012, 12:29:27 pm »
That's pretty smart and a good way to stay hidden. I wonder if they'll start porting it to nginx. Bit less common but people are starting to use it more.

Offline Stackprotector

  • Administrator
  • Titan
  • *
  • Posts: 2515
  • Cookies: 205
    • View Profile
Re: DarkLeech - malware mod for Apache
« Reply #3 on: September 17, 2012, 01:26:12 pm »
Lol nice, but i this method is to easy to fix and detect:P
~Factionwars