Mare.D is a network worm that propagates by exploiting vulnerabilities in the Mambo content management system and the PHP XML-RPC library. The worm installs several backdoors to the compromised system.
Once detected, the F-Secure security product will automatically disinfect the suspect file by either deleting it or renaming it.
The main component of the Mare.D worm is written in C and compiled with the GNU C compiler. Mare.D consists of several components, written in C, shell script and Perl.
Exploiting these vulnerabilities the worm downloads a small shell script that installs the rest of the components:
- /tmp/.temp/cb - Connectback shell backdoor
- /tmp/.temp/https - IRC-controlled backdoor
- /tmp/.temp/ping.txt - Connectback shell backdoor
- /tmp/.temp/httpd - Main worm component
During infection Mare.D installs several backdoors to the compromised system. Two of them, 'cb' and 'ping.txt' are connectback shell backdoors, that connect to a remote host on 8080/TCP and open an interactive shell on the infected host. The third one is an IRC-controlled backdoor, written in Perl, which joins an IRC channel an awaits commands.
The main component of the worm also listens on 27015/UDP port for commands from the worm author. Through this port the attacker can issue different commands, for example update of the main component.
Mare.D is detected with the following F-Secure Anti-Virus updates:
Detection Type: PC
Description Created: Gergely Erdelyi, February 20, 2006
Technical Details: Gergely Erdelyi, February 20, 2006
Description Last Modified: Gergely Erdelyi, February 20, 2006
SUBMIT A SAMPLE
Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis