PHP_FLOOD.A

 Analysis by: Anthony Joe Melgarejo

 ALIASES:

Troj/PHPFlood-A (Sophos)

 PLATFORM:

Linux, Unix

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted: No

  • In the wild: Yes


  TECHNICAL DETAILS

File Size:

1298 bytes

File Type:

Script

Memory Resident:

No

Initial Samples Received Date:

01 Oct 2014

Payload:

Compromises system security

Arrival Details

This Trojan may be downloaded from the following remote sites:

  • http://{BLOCKED}.{BLOCKED}.225.119/conf.txt

This malware arrives via the following means:

  • CVE-2014-6271

NOTES:

It accepts the following parameters through HTTP GET:

  • host
  • port
  • timeout
  • password

It will use the parameters it receives to perform UDP flooding consisting of 65,000 random alphanumeric characters.

If no port is passed, it will randomly pick from ports 79 to 65,000.

It checks if the password is microstresser14.

  SOLUTION

Minimum Scan Engine:

9.700

FIRST VSAPI PATTERN FILE:

11.184.04

FIRST VSAPI PATTERN DATE:

01 Oct 2014

VSAPI OPR PATTERN File:

11.185.00

VSAPI OPR PATTERN Date:

02 Oct 2014

Scan your computer with your Trend Micro product to delete files detected as PHP_FLOOD.A. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.


Did this description help? Tell us how we did.