Classification

Category: Worm

Type: -

Aliases: Mare.D, Net-Worm.Linux.Mare.d, Linux.Plupii.C, Unix/ShellBot.C

Summary


Mare.D is a network worm that propagates by exploiting vulnerabilities in the Mambo content management system and the PHP XML-RPC library. The worm installs several backdoors to the compromised system.

Removal


Automatic action

Based on the settings of your F-Secure security product, it will either automatically delete, quarantine or rename the detected program or file, or ask you for a desired action.

Knowledge Base

Find the latest advice in our Community Knowledge Base.

About the product

See the manual for your F-Secure product on the Help Center.

Contact Support

Chat with or call an expert for help.

Submit a sample

Submit a file or URL for further analysis.

Technical Details


The main component of the Mare.D worm is written in C and compiled with the GNU C compiler. Mare.D consists of several components, written in C, shell script and Perl.

Propagation

Mare.D scans random hosts for vulnerable installations of the Mambo content management system and PHP XML-RPC.

Exploiting these vulnerabilities the worm downloads a small shell script that installs the rest of the components:

  • /tmp/.temp/cb - Connectback shell backdoor
  • /tmp/.temp/https - IRC-controlled backdoor
  • /tmp/.temp/ping.txt - Connectback shell backdoor
  • /tmp/.temp/httpd - Main worm component
Payload

During infection Mare.D installs several backdoors to the compromised system. Two of them, 'cb' and 'ping.txt' are connectback shell backdoors, that connect to a remote host on 8080/TCP and open an interactive shell on the infected host. The third one is an IRC-controlled backdoor, written in Perl, which joins an IRC channel an awaits commands.

The main component of the worm also listens on 27015/UDP port for commands from the worm author. Through this port the attacker can issue different commands, for example update of the main component.