• Trend Micro
  • About TrendLabs Security Intelligence Blog
Search:
  • Home
  • Categories
    • Ransomware
    • Vulnerabilities
    • Exploits
    • Targeted Attacks
    • Deep Web
    • Mobile
    • Internet of Things
    • Malware
    • Bad Sites
    • Spam
    • Botnets
    • Social
    • Open source
Home   »   Botnets   »   How to Check if Your Website is Part of the Stealrat Botnet

How to Check if Your Website is Part of the Stealrat Botnet

  • Posted on:August 5, 2013 at 10:07 pm
  • Posted in:Botnets, Malware, Spam
  • Author:
    Jessa De La Torre (Senior Threat Researcher)
0

For a few months now, we have been actively monitoring a spambot named Stealrat, which primarily uses compromised websites and systems in its operations. We have continuously monitored its operations and identified about 195,000 thousand domains and IPs that have been compromised. The common denominator among these compromised sites is that they are running vulnerable CMS software such as WordPress, Joomla and Drupal.

In this entry, we will discuss how website administrators can check if their website is compromised and part of the Stealrat botnet.

The first step is to check for the spammer scripts that are commonly found namely sm13e.php or sm14e.php. But note that these scripts may change in terms of file name, so it would be better to check for any unfamiliar PHP file.

screenshot-phpfile-stealrat
Spamming scripts inside a compromised website

Another way to check for the presence of the malicious PHP file is to search for any of the following strings in the codes:

  • die(PHP_OS.chr(49).chr(48).chr(43).md5(0987654321)
  • die(PHP_OS.chr(49).chr(49).chr(43).md5(0987654321)

For those running on Linux, you can search for the string using the grep command grep “die(PHP_OS.chr(49).chr(48).chr(43).md5(0987654321” /path/to/www/folder/, while for Windows it’s content:”die(PHP_OS.chr(49).chr(48).chr(43).md5(0987654321″.

script-Stealrat-howto
The mentioned strings in the PHP file

These strings are part of the “die” code of the PHP file (e.g. when certain parameters are not met). Our colleagues at DeepEnd Research have already posted a copy of sm14e.php. As far as we know, this is the latest version of the script in the wild and compared to sm13e.php, sm14e.php now supports multiple email addresses to send spam to. Other than that, it is still the same PHP file that accepts the following parameters:

  • l → email address (to send spam to)
  • e → nine randomly generated characters
  • m → mail server (ie. googlemail)
  • d → mail template

Its response varies depending on the parameters supplied, as well as the result of the spamming routine:

parameters
Script responses based on results

For website admins, we recommend the deletion of the files resembling those described above, and the updating of their content management systems – especially WordPress, Joomla or Drupal. More information on this threat, as well as the other components that need to be taken note of are available in our paper, Stealrat: An In-Depth Look at an Emerging Spambot.

Learn how to protect Enterprises, Small Businesses, and Home Users from ransomware:
ENTERPRISE »
SMALL BUSINESS»
HOME»
Tags: botnetcompromised sitesdrupaljoomlaStealRatWordpress

Featured Stories

  • systemd Vulnerability Leads to Denial of Service on Linux
  • qkG Filecoder: Self-Replicating, Document-Encrypting Ransomware
  • Mitigating CVE-2017-5689, an Intel Management Engine Vulnerability
  • A Closer Look at North Korea’s Internet
  • From Cybercrime to Cyberpropaganda

Security Predictions for 2018

  • Attackers are banking on network vulnerabilities and inherent weaknesses to facilitate massive malware attacks, IoT hacks, and operational disruptions. The ever-shifting threats and increasingly expanding attack surface will challenge users and enterprises to catch up with their security.
    Read our security predictions for 2018.

Business Process Compromise

  • Attackers are starting to invest in long-term operations that target specific processes enterprises rely on. They scout for vulnerable practices, susceptible systems and operational loopholes that they can leverage or abuse. To learn more, read our Security 101: Business Process Compromise.

Latest Ransomware Posts

  • qkG Filecoder: Self-Replicating, Document-Encrypting Ransomware
  • Bad Rabbit Ransomware Spreads via Network, Hits Ukraine and Russia
  • A Look at Locky Ransomware’s Recent Spam Activities
  • Magnitude Exploit Kit Now Targeting South Korea With Magniber Ransomware
  • WannaCry Ransomware Sold in the Middle Eastern and North African Underground

Recent Posts

  • Apps Disguised as Security Tools Bombard Users With Ads and Track Users’ Location
  • The Need for Better Built-in Security in IoT Devices
  • Janus Android App Signature Bypass Allows Attackers to Modify Legitimate Apps
  • Digmine Cryptocurrency Miner Spreading via Facebook Messenger
  • CVE-2017-11882 Exploited to Deliver a Cracked Version of the Loki Infostealer

Ransomware 101

  • This infographic shows how ransomware has evolved, how big the problem has become, and ways to avoid being a ransomware victim.
    Check the infographic

Popular Posts

  • Digmine Cryptocurrency Miner Spreading via Facebook Messenger
  • The Need for Better Built-in Security in IoT Devices
  • CVE-2017-11882 Exploited to Deliver a Cracked Version of the Loki Infostealer
  • Untangling the Patchwork Cyberespionage Group
  • Dissecting PRILEX and CUTLET MAKER ATM Malware Families

Latest Tweets

  • Findings on the #Forever21 #DataBreach reveal that the #malware infection may have gone unnoticed for over 7 months. bit.ly/2EJxSKW
    about 41 mins ago
  • Case study: We looked at how internet-connected speakers can be exploited and found three attack scenarios. Analysi… twitter.com/i/web/status/9…
    about 9 hours ago
  • Retailer #Forever21 has just disclosed its findings about the #databreach it reported last November 2017. Details h… twitter.com/i/web/status/9…
    about 12 hours ago

Stay Updated

  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © Trend Micro Incorporated. All rights reserved.