Wow Ken, Thanks for the thorough
research. I just did a whois and figured it wasn't an attack.
But being a complete rookie (no experience with linux or servers
prior to creating a droplet on DO 2 weeks ago)
I was curious to not see any request prefix
(GET|POST|CONNECT...etc...) and then I saw that the request was
successful (status 200) instead of a 404. And what 11k of data did
my server send in response...
In 13 days of logs this IP has only hit my server once and this is
the only time I've seen such a request... So no issue with their
legitimate research...
Thanks for tracking this down and please keep me in the loop if
you hear back from them again.
dave
On 7/8/2016 2:41 PM, Spork Schivago wrote:
Okay Red-Tail Books, I got more information for
you! This is the latest response I got:
"The malware is installed via a
range of vulnerabilities including
social engineering. This scan is
really testing for the malware's
rendezvous protocol for command
and control. As a rule, we have been
informing law enforcement about
infected machines and they have been
doing victim notification and
thus if your correspondent is infected
they will be contacted. However,
I believe that this particular
malware works exclusively with
IIS and thus an Apache user is unlikely
ot have much to worry about.
Unfortunately, I don't know the precise
meaning of the string or what it
elicits and Paul (cc'd) who is the
grad student lead on this project
is currently away on his honeymoon,
but I'm sure we can respond more
succinctly once he returns"
So, it seems that you're in the clear and have nothing to
worry about, mainly because you're running Apache and not IIS.
I wish I could answer what the actual hex string means and
what Apache responded with. Perhaps when Paul gets back from
his honeymoon, we'll receive an answer.
Best of luck.
Ken.
--
Red-Tail Books
204 N Florence St
Casa Grande, Az
520-836-0370