Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Missing response to "cat /bin/echo" command #9

Closed
morgajp opened this issue Jan 25, 2017 · 2 comments
Closed

Missing response to "cat /bin/echo" command #9

morgajp opened this issue Jan 25, 2017 · 2 comments

Comments

@morgajp
Copy link
Contributor

morgajp commented Jan 25, 2017

The Mirai scanners run the command "cat /bin/echo" in order to determine system architecture, after which the scanner will run a wget command to fetch the mirai malware.

The following response is sufficient to trigger the wget command: '\x7fELF\x01\x01\x01\x03\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00\x08\x00\x00\x00\x00\x00'

Unfortunately, this string can't be included in the json "commands", since it includes control characters. If you would like to include this functionality, and have an idea for how to include it, I will put it in a pull request. In my local branch I just added a special check for this inside get_busybox_response(), but that is kind of a hacky/ugly solution.

@itamarsher
Copy link
Contributor

itamarsher commented Jan 26, 2017

Correct me if I'm wrong but can't you just do this - "\\x7fELF\\x01\\x01\\x01\\x03\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x00\\x02\\x00\\x08\\x00\\x00\\x00\\x00\\x00"

Tested it locally via telnet and I got the correct response (didn't test if with actual Mirai scanner)

@itamarsher
Copy link
Contributor

Solved with pull request #10

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants