mostpopularscan.com - Rogueware browser hijacker | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Analysis: | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Result when running: | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
HTTP Request: 209.44.126.14 GET: mostpopularscan. com/ [install/ws.zip]
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Application screenshot: | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Domain sharing IP with mostpopularscan.com | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Name Server: NS1.FUCKMONEYCASH.COM OrgName:Netelligent Hosting Services Inc. And finally on this network we have 2 bad IP's which host the same malware 209.44.126.16
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Look's very similar to these domain. Same template, same malware and some redirect to site like mostpopularscan.com, bestfiresfull.com, easywinscanner17.com etc... PandaLabs - Rash of Rogue Security Malware This is just a sample: goscanfull.com gohardscan.com goscanfull.com goscanhard.com goscanopen.com gomodescan.com goscanmind.com goscanport.com goscanquick.com goscanslot.com goscanway.com goscanwith.com goquickscan.com goscanany.com goscanmode.com gotscan.com Redirection change every day with new site purchased. Most of them are on the IP: 78.159.101.27 - netdirekt e.K Also host on the same network a ton of similar websites. 78.159.99.52 x 6 78.159.100.22 x 2 line4scan.com log4scan.com 78.159.101.11 x 3 megascan4.com safe4scan.com scanmain4.com 78.159.101.22 x 6 scan4tool.com tool4scan.com 78.159.101.27 x 40 scanmega4.com truescan4.com Here are some of them - hosted by Zlkon, Starlines Web Service and a lot by NT-COLO Netcraft for netdirekt e.K Netcraft for Zlkon Netcraft for Starline Web Service - Site for redirections - Also host: onlinedetect.com Netcraft for NT-COLO |