Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [source https://pad.riseup.net/p/OmJHHd0z1SGb]
- TEmail-addresses mentioned in feedback and support requests:
- [email protected] (mongolia) (person's e-mail adress was for sale?!)
- @h2FinSpy Mobile
- Firstname: E7549C72 at: 2011-12-12 19:14:22
- Description: To whom it may concern We are currently investigating the possibility of adding the FinSpy Mobile package to our cyber solution. Brydon was always our contact person and he was in contact with our general manager, but he was moved to another structure. Can you please ask him to prepare a proposal and forward it to [email protected]. Regards ZAR
- [email protected] (mongolia)
- [email protected] (nothing known)
- Possible links from this person:
- * http://forum.xda-developers.com/search.php?searchid=297151718
- * https://twitter.com/mnkhzrg
- * https://secure.flickr.com/photos/7623302@N03/
- Description: Dear Sirs. We tried to send infected pdf file to gmail account. It giving error message even we had zipped it please give us reference as soon as possible Odmagnai.S [email protected] [email protected] [email protected]
- [email protected] (mongolia) (http://wq.apnic.net/apnic-bin/whois.pl?searchtext=MAINT-MN-NITSYSTEM&form_type=advanced)
- Customers I've identified:
- 29 - the Bahraini group, in support requests they ask for help setting up a
- website targetting activists in 14 Feb, and in another support request they
- attach their C&C server logs. The names of people with admin access to the
- FinSpy server are in the server logs, grep for "user name:"
- Abdulla Husain, Ahmad, Abdulla Al Eid, Yousif Al Sadiq, Rizwan Saleem, Sayed
- Ansar Husain, Humayun, and Mohammed Al Majed
- From metadata in attached word documents.
- 69 - PCS Security Pte Ltd
- 49 - Cliff Harris
- New names:
- Rostislav Psota
- From text in support_request or feedback table:
- 21 - Nasser Alnuaimi Qatar state security bureau
- 82 - Sanjin Custovic, Intelligence-Security Agency of Bosnia and Herzegovina
- 73 - Peter Balogh, SSNS - NBSZ hungary secret service
- 61 - Wim Bordeyne, gives work e-mail of [email protected] although skynet.be is
- an ISP?
- 48 - Vietnam
- 65 - Nigeria
- 18 - Mongolia, and their email [email protected] appears in this whois record:
- http://wq.apnic.net/apnic-bin/whois.pl?searchtext=MAINT-MN-NITSYSTEM&form_type=advanced
- From their username in customer table:
- 34 - Dyplex
- 9 - Trovicor (http://www.trovicor.com/images/pdf/release_c02_2013.pdf & ./www/FinFisher/Trovicor/)
- 10 - Elaman
- 23 - Cobham
- Countries mentioined in feedback and support requests:
- Bangladesh
- Belgium ([email protected] / [email protected])
- Bosnia & Herzegowina
- Czech Republic
- Hungary
- Latvia
- Mongolia ([email protected])
- Nigeria
- Qatar ([email protected] / [email protected])
- Vietnam
- https://news.ycombinator.com/item?id=8146200
- 0x03CE7ED9F158ADF2
- 0x053650A2977E9F54
- 0x0ADA0B76695D98C9
- 0x151BDCA37774F144
- 0x1B7061956ABDF71F
- 0x1E2E1F1E00BE9690
- Jochen van der Wal
- 1024 bit DSA key 0x5A14D578, created: 2003-02-21
- 0x22C5C361BA87B977
- 0x2643AF650FEB4CFF
- 0x2F36489D58143658
- 0x33A057DC6ABDA7D0
- 0x371B124C7704B771
- 0x4CA1E3C2780E8451
- 0x4D510F44A7A4AC21
- Hari Purnama (pgp) <[email protected]>
- 2048 bit RSA key 0xA7A4AC21, created: 2013-03-05
- 0x6A4F8FA29BBDD293
- 0x771696752C52A5C8
- 0x77A0959F280AD26F
- 0x79EAEE7A42C2DDCE
- 0x92B299A48E037629
- 0x93C082CED81082F4
- Melvin Teoh (Gamma Group) <[email protected]>
- 2048 bit RSA key 0xD81082F4, created: 2012-03-08
- 0x971A4906B03A5EA9
- 0xA013DEEEE061DE51
- 0xA4B525F406E990A5
- 0xA89933AD6225EAA0
- 0xB35A54CC2B9A229A
- 0xCB75BDEAF5946EA8
- 0xCCDB5A9B77B11C19
- 0xD2EFAD8FF166F2CA
- Alexander Hagenah <[email protected]>
- 2048 bit RSA key 0x88E6111F3F895273, created: 2013-03-05, expires: 2018-03-04
- https://twitter.com/xaitax/
- https://gist.github.com/xaitax
- 0xDD85E2EB8269976E
- Alfons Rauscher <[email protected]>
- 1024 bit DSA key 0x3B76A10166878388, created: 2013-04-17 --> http://buggedplanet.info/index.php?title=VERVIS
- 0xE366AE080FC82479
- 0xE4FB3038C47B1004
- 0x4CA1E3C2780E8451
- 0x22C5C361BA87B977
- 0x1B7061956ABDF71F
- 0xCCDB5A9B77B11C19
- 0x771696752C52A5C8
- 0x371B124C7704B771
- 0xE4FB3038C47B1004
- 0x4AA946DCC56A85E9
- 0xF820192E4FB534CB
- 0x6A4F8FA29BBDD293
- 0x33A057DC6ABDA7D0
- 0x79EAEE7A42C2DDCE
- 0xA4B525F406E990A5
- 0x79EAEE7A42C2DDCE
- 0xA4B525F406E990A5
- 0xB35A54CC2B9A229A
- 0xA013DEEEE061DE51
- 0x10789AA7CF246B05
- 0xE366AE080FC82479
- 0x82301882C3F3EC1B
- [email protected] (New key 12/6/09) <[email protected]>
- 1024 bit DSA key 0x85E86971, created: 2009-06-12
- 0x007B9D3E3471B217
- 0xF852D5DACBFF2AB4
- 0x7F02DE5F6D531E64
- 0xA95DEAED331A704A
- 0x8444467B1B14387E
- 0x49F2E9B065BACA20
- 0x1E2E1F1E00BE9690
- 0x7CA282A470A03877
- USB on Fire <[email protected]>
- 2048 bit DSA key 0x89A4703C, created: 2013-07-04
- Export that and do:
- for key in `cat fin-keys.txt | grep 0x`; do torsocks gpg --batch --search-keys $key; done
- Countries mentioined in country statistics for visitors to customer support website: https://twitter.com/GammaGroupPR/status/497005097533321217
- Australia
- Austria
- Belgium
- Canada
- Cameroon
- Chech Republic
- Columbia
- Costa Rica
- China
- Chile
- Brazil
- Bulgaria
- Denmark
- Ethiopia
- France
- Germany
- Hong Kong
- Hungary
- Indonesia
- Iran
- Japan
- Jordan
- Korea (South)
- Lebanon
- Luxembourgh
- Netherlands
- Oman
- Russian Federation
- Spain
- South Africa
- Sweden
- Switzerland
- Taiwan
- Thailand
- Tunisia
- Turkey
- Trinidad and Tobago
- United Arab Emirates
- United States
- Ukraine
- Uraguay
- Logfile of Bahrain government detailing FinFisher victims and the watchers controlling FinSpy
- www/GGI/Support/Attachments/A169FE42.
- Usernames extracted from logfiles contained in A169FE42 (urls result of google search for name
- that may be the person). Extraction done via "if ('user name' in line)":
- DETIAL: https://pad.riseup.net/p/0QG54xefh1Q3
- USER ENTRIES:
- User name Login name Passphrase
- Abdulla Al Eid 'abdulla' '$@!?09b9ec794320d57719f50c79f8a3ba4c5f78c67bb19a60d258a858bb056d5b79d'
- https://twitter.com/TheAbdullaa
- Abdulla Husain 'Abdulla' '$@!?0a80b6b35bce67f9b78f1c6c0b4bee176a1a4265813b7eed6c569b3ca78420713'
- http://adhrb.org/tag/husain-abdulla/
- Ahmad 'Ahmad' '$@!?06e56b3ab96c3d1bdd8b091ef3a29012d269c145117eba7ae99d44d6c4527c5ae'
- finspy 'finspy' '$@!?099c78c062ba994359ff8be008c5a86a79acaafaba4f2e87e22196bfd94e0d0a3'
- Humayun 'Humayun' '$@!?06fe762d2faca772673650ae31201d9c85b569b2246e9ef0b4d9373db97e24fc7'
- Mohammed Al Majed 'Mohammed' '$@!?0a9bd7592012a789c382fe9082d464898895abc37b59cab920e310eeb56b7f58c'
- Rizwan Saleem 'Rizwan' '$@!?02182bd412679669cc0c26ba37ef7a1f764e529661896dd2b64d488f665889dd3'
- Sayed Ansar Husain 'S.Ansar' '$@!?0340668373c5a88fc0309ddd971a57a138b564f0b2311fbbe9eebb623715d054a'
- http://www.wayn.com/profiles/nastyrasna
- Yousif Al Sadiq 'Yousif' '$@!?0abe3717f036da2d30debd96224169bc18ed8334c1289d07ec214b1f4639b644c'
- TARGET ENTRIES:
- Target ID User Computer Global IP NOTES
- 0x10000f2 'USER' 'USER-PC' '109.130.30.82'
- 0x1538f44c 'ADMIN' 'DIA079' '89.148.9.221'
- 0x15719405 'SYSTEM' 'ZABEEL-4CA838AD' '78.105.48.42'
- 0x167a3705 'FAlali' 'FATIMAALALI-PC' '217.17.237.231' http://www.lawyers.com/manama/bahrain/fatima-hussain-al-ali-41383740-a/
- 0x18a2c941 'SYSTEM' 'USER-84FEEF1356' '178.61.76.42'
- 0x1abd5e97 'scorpion' 'SCORPION-PC' '46.184.166.133'
- 0x1b6bdd7e 'SYSTEM' 'COMPUTER-6618DA' '188.220.240.165'
- 0x1de66f19 'SYSTEM' 'WW' '77.69.229.147'
- 0x265010fe 'SYSTEM' 'DARYA-SYSTEM' '31.57.114.98'
- 0x2c0561cb 'mmad' 'MMAD-HP' '188.116.228.164'
- 0x2dba1fd1 'ALWEFAQ' 'ALWEFAQ-1E731B6' '89.148.29.246'
- 0x2e3093d8 'HadiMosawi' 'HADIMOSAWI-PC' '88.201.63.24' https://twitter.com/SHalMosawi
- 0x3433f1fe 'SYSTEM' 'JALILA-PC' '89.148.21.240'
- 0x36e1dccb '' '' ''
- 0x38584dbc 'mahmood.aloraibi' 'MAHMOOD-PC' '217.17.237.231' https://twitter.com/LawOraibi
- 0x3b21966d 'alsayed.jaffer' 'ALSAYED-PC' '217.17.237.231' http://hassanradhi.com/team/mr-al-sayed-jaffer-mohammedassociate/
- 0x3cae0814 'user' 'WINCTRL-Q2KVLM1' '188.116.249.129'
- 0x3f5349f9 'SPIDER' 'SPIDER-PC' '89.148.17.52'
- 0x4189d7d1 'Malalawi' 'MOHSIN-PC' '217.17.237.231'
- 0x4239bd37 'Mahdi' 'MAHDI-VAIO' '83.136.59.211'
- 0x48b21bec 'Owner' 'HOME-9526399744' '88.201.63.19'
- 0x49d98a82 'KMA' 'KMA-VAIO' '77.69.225.196'
- 0x4cda494f '' '' ''
- 0x4d8fc8fe 'krishna' 'KRISHNA-PC' '109.161.177.205'
- 0x4ff60c5c 'Ebrahim' 'EBRAHIM-SONYPC' '84.255.129.88'
- 0x5075d4c0 'SYSTEM' 'SHIP' '84.255.190.3'
- 0x51025829 '' '' ''
- 0x5bf0415a 'SYSTEM' 'USER-PC' '94.76.9.136'
- 0x5ec9ec9b 'SYSTEM' 'PC' '83.136.59.166'
- 0x5ff47b05 '' '' ''
- 0x606ce376 'fars' 'FOREIGNP-2-159' '109.70.143.210'
- 0x609316da 'Douglass' 'DOUGLAS-HD' '77.69.225.196'
- 0x60cf8481 'hanan.taqi' 'HUDA-PC' '217.17.237.231'
- 0x6aef6d29 'SYSTEM' 'USER-CF6420EBAA' '62.215.128.21'
- 0x700700c7 'Drdoos' 'DRDOOS-PC' '77.69.220.131'
- 0x7123a0cb 'SYSTEM' 'SA-L-KH1943A' '188.116.192.231'
- 0x712ff44c 'ADMIN' 'DIA077' '89.31.192.209'
- 0x757b7e92 'SYSTEM' 'MAHERPC' '217.17.237.231'
- 0x79d8f34c 'com4a' 'DIA092' '89.31.192.209'
- 0x7db8bdfe 'user' 'USER-TOSH' '78.105.54.70'
- 0x82b1a3f9 'User' 'USER-PC' '41.137.70.82'
- 0x82d93e4c 'comet' 'COMET-PC' '46.64.70.95'
- 0x835cb0e4 'SYSTEM' 'MATAM-H9074NLYU' '46.184.183.111'
- 0x86cdbab8 'ehussab' 'EV002481025A9E' '194.237.142.3'
- 0x8a6be029 'SYSTEM' 'E13889741FA94B9' '217.86.164.76'
- 0x8c47f176 'SYSTEM' 'LAWPC02' '217.17.237.231'
- 0x951f6ecb 'user' 'USER-PC' '78.110.70.141'
- 0x9729f44c 'com1b' 'DIA084' '89.31.192.209'
- 0x986208c7 'RomelT' 'ROMELTABAJA' '80.83.21.34' http://investing.businessweek.com/research/stocks/private/person.asp?personId=241673142&privcapId=38061438&previousCapId=38061438&previousTitle=Trust%20International%20Insurance%20&%20Reinsurance%20Co.%20B.S.C.%28c%29
- 0x98987cc0 '0208' '1-PC' '77.69.217.118'
- 0x9b18b5fa 'SYSTEM' 'USER-PC' '46.42.64.154'
- 0x9b7b1dcb 'ASUS' 'ASUS-PC' '82.114.188.17'
- 0x9df4b316 'SYSTEM' 'ALTAGER-PC' '89.148.0.38'
- 0xa07289a 'abrar' 'ABRAR-PC' '86.145.66.174'
- 0xa4626b7e 'SYSTEM' 'MYNAME-893A225C' '95.84.119.14'
- 0xab87739c 'USER' 'USER-PC' '46.184.208.207'
- 0xabf6064e 'Lenovo' 'LENOVO-PC' '115.67.192.74'
- 0xae3eeeb9 'com1a' 'DIA086' '89.31.192.209'
- 0xaed5ec50 '' '' ''
- 0xb1f51f10 'yousif' 'AL-ARRAYED' '46.42.76.129'
- 0xb3c17c17 'RMajeed' '455-36BBBBCE1AE' '217.17.237.231'
- 0xb4a68721 'SYSTEM' 'KHALIL-PC' '217.17.237.231'
- 0xb609d22b 'user' 'USER-PC' '46.42.104.19'
- 0xb8bc95a0 'SYSTEM' 'ABRAR-DRGOQH912' '86.145.64.24'
- 0xbacffba9 'SYSTEM' 'HASANMUSHAIM' '74.115.3.64' https://en.wikipedia.org/wiki/Hasan_Mushaima
- 0xc2ce5700 'WAFA COMPUTERS' 'WAFACOMPUTERS' '94.187.18.47' ?? http://wikimapia.org/4867042/al-wafa-computers ??
- 0xc93f83f9 'My Documents' 'DELL' '77.69.173.183'
- 0xd405e672 'SYSTEM' 'PC-13' '93.97.55.83'
- 0xdd3bf44c 'ADMIN' 'DIA080' '89.31.192.209'
- 0xdf2bf44c 'com2c' 'DIA087' '89.31.192.209'
- 0xdfb41f10 'aya' 'AYA-PC' '89.148.39.32'
- 0xe3ad7d7e 'SYSTEM' 'SALVATIO-1424E9' '188.220.240.165'
- 0xe4163efb 'Moosa' 'MOOSA-PC' '94.195.190.251'
- 0xe51a26fe 'SYSTEM' 'USER-A5CEA6FD42' '46.184.160.135'
- 0xe5339505 'SYSTEM' 'THE-1A72E930F5E' '78.145.20.73'
- 0xe56d7b6d 'Qasim' 'ALHASHMI' '46.64.70.95'
- 0xebbe9ab3 'nader' 'NADER-PC' '82.194.39.198'
- 0xeee0d4fa 'halmahfoodh' 'HUSSAIN' '77.69.216.195'
- 0xf5a11f10 'scorpion' 'SCORPION-PC' '46.184.205.228'
- 0xf627f44c 'com2b' 'DIA096' '89.31.192.209'
- 0xfd9a1310 'com3b' 'DIA088' '89.31.192.209'
- 0xfe3ac5af 'Saeed 'JAAFAR' '78.149.123.155' https://en.wikipedia.org/wiki/Saeed_al-Shehabi
- Email addresses extracted from logfiles contained in A169FE42 (urls result of google search, not
- from logfiles). Extraction done via "if ('Emailaddress' in line)":
- NOTE: These addresses show in the log files for "alarm" entries per target. This may indicate that alarms are sent to these email address for a given subset of targets.
- GeoIP entries extracted form logfiles contained in A169FE42. Extraction done via "if ('GeoIP entry, item' in line):"
- and reading the next 4 lines:
- See file here: https://pad.riseup.net/p/anQZDggEMhh5
- Targeted computers extracted from 417B7B13.rar. ITACA(?) as source?
- $ grep -i name 2013-10-09_16-29-24-System.log | sort -k 8 | perl -nle '@a=split; print join " ", @a[6..7], @a[10..20]' | sort | uniq -c | sed -e 's/target//g'|sed 's/(Trojan://g'|sed 's/Comp-Name://g'|sed 's/Inst-Mode:.*//g' | column -s " " -t | sort -k 4
- N Target_ID Trojan_Name Comp-Name
- 109 0x71832C7E bolzano-01mbr CARLOS-PC
- 8 0x82266CA2 new_pc DELL-DEMO-02
- 7 0x61A39D54 galaxydemo6 DEMO3
- 2 0x9D1AECF9 csal001 DILORENZO-A
- 118 0x4B17A31D TestVenPie GENESIMOBILE-PC
- 3 0x4B17A31D testlat-01 GENESIMOBILE-PC
- 1 0x1F87136A demo-hsd-at1 GENESIMOBILE-PC
- 6 0x33595444 GalaxyMacBook1 hamzas-macbook-pro.local
- 15 0xC9F3E1E3 test_srv01 ITACAAGENT06
- 2 0x55474150 mac-demo macbook-pro-di-mario-luzi.local
- 2 0x549DA3AA lin2607 netsiever
- 1 0x61043D56 test-ancona PICCOLOP-XP
- 1 0x61043D56 demohsd-02sys PICCOLOP-XP
- 9 0xFEBBE8BA demo-gl01 TARGET-NB-01
- 236 0xFEBBE8BA cristian_1 TARGET-NB-01
- 13 0xFEBBE8BA demogalaxy4 TARGET-NB-01
- 1 0xFEBBE8BA DemoGalaxy02 TARGET-NB-01
- 11 0xFEBBE8BA DemoGalaxy_5 TARGET-NB-01
- 9 0xFEBBE8BA demogalaxy01 TARGET-NB-01
- 1 0xFEBBE8BA demohsd-02sys TARGET-NB-01
- 5 0xA7821F10 caserta-01e TERMINALE-PC2
- 1 0xC9F3E1E3 demogalaxy01mbr TEST02-THINK
- 1 0x3EF3E1E3 nola-01 TEST-THINK
- 86 0x3EF3E1E3 demo-at02 TEST-THINK
- 31 0x3EF3E1E3 Demo Trojan Windows 01 DEMO-THINK
- 2 0x61043D56 Demo Trojan Windows 01 PICCOLOP-XP
- 7 0x37145D29 Demo Trojan Windows 02 DEMO-PC
- 2 0x24E785D6 Aprilia-01mbr UTENTE-PC1
- 3 0xDA22C929 bolzano-01mbr WIN-JT981OVE4SK
- 40 0x37AABA29 TestVenPie WIN-O2ABT18KLG8
- First column (N) relates to the number of times the entry showed up in the log. An entry is added with the note "comes online" each time. So the N column likely indicates number of times the system noticed this target came online.
- Phone numbers from same log file:
- $ grep mobile 2013-10-09_16-29-24-System.log | grep 'having phone number' |sort -k 19 | awk '{print $19}' | uniq -c
- 2 '+393206562399' (30=Italy)
- 2 '+393311870439'
- 1 '+393351346777'
- 4 '+393351515103'
- 3 '+393355669618'
- 4 '+393425621143'
- 2 '+393463536394'
- IMSI's:
- $ grep -i imsi 2013-10-09_16-29-24-System.log | cut -d " " -f 6- | sort -k 7 | sed 's/^ *//g'
- INFO: The IMSI of mobile target 0x00000B82F07A417F has changed to 0x0000CAD0180D0DEB
- INFO: The IMSI of mobile target 0x00000B82F07A417F has changed to 0x0000D1328A7C0A84
- INFO: The IMSI of mobile target 0x00000B82F07A417F has changed to 0x0000D1328A7C0A84
- INFO: The IMSI of mobile target 0x00013FFAF45193CB has changed to 0x0000CA00924A71FE
- INFO: The IMSI of mobile target 0x00013FFAF4519C55 has changed to 0x0000D1328A7C0A84
- INFO: The IMSI of mobile target 0x00013FFAF4519C55 has changed to 0x0000D1328A7C0A84
- INFO: The IMSI of mobile target 0x00013FFAF4519C55 has changed to 0x0000D1328A7C0A84
- INFO: The IMSI of mobile target 0x00013FFAF4519C55 has changed to 0x0000D1328A7C0A84
- INFO: The IMSI of mobile target 0x0001470CFA848E76 has changed to 0x0000CA00924A717A
- INFO: The IMSI of mobile target 0x0001470CFA848E76 has changed to 0x0000CA00924A71DC
- MMC location change:
- $ grep -i mcc 2013-10-09_16-29-24-System.log | sed 's/.*INFO: //g' | uniq
- The MCC value of mobile target 0x00013FFAF4519C55 has changed to '222' (Italy)
- The MCC value of mobile target 0x00000B82F07A417F has changed to '222'
- The MCC value of mobile target 0x00013FFAF4519C55 has changed to '222'
- The MCC value of mobile target 0x00000B82F07A417F has changed to '222'
- The MCC value of mobile target 0x00013FFAF4519C55 has changed to '222'
- The MCC value of mobile target 0x00000B82F07A417F has changed to '000' (???)
- The MCC value of mobile target 0x00000B82F07A417F has changed to '230' (Czech Republic)
- The MCC value of mobile target 0x00013FFAF4519C55 has changed to '222'
- The MCC value of mobile target 0x00000B82F07A417F has changed to '000'
- The MCC value of mobile target 0x00000B82F07A417F has changed to '230'
- The MCC value of mobile target 0x00013FFAF45193CB has changed to '222'
- Support/6E51EFE8.txt
- [Feb 4 22:57:25] WARNING[3629] chan_sip.c: Retransmission timeout reached on transmission 1754558912 for seqno 1 (C3:53:00:0c:31:96:5c:06:08:00 SRC=188.138.32.16 DST=213.168.28.54 LEN=52 TOS=0x02 PREC=0x00 TTL=1Mar 3 08:42:39 F-MP-20-12 kernel: [431659.401063] InDrop IN=eth0.100 OUT= MAC=00:19:99:cb:53:53:00:0c:31:96:5c:06:08:00 SRC=188.138.32.16 DST=213.168.28.54 LEN=52 TOS=0x02 PREC=0x00 TTL=119 ID=8381 DF PROTO=TCP SPT=63683 DPT=16566 WINDOW=32 RES=0x00 CWR ECE SYN URGP=0
- 19 ID=8233 DF PROTO=TCP SPT=49394 DPT=16565 WINDOW=32 RES=0x00 CWR ECE SYN URGP=0
- ...
- The ip's mentioned above:
- SRC:188.138.32.16 = intergenia AG German Service provider - subblock for Plusserver AG
- DST:213.168.28.54 = Static Links for Elion Ettevotted Aktsiaselts (Estonian Telco)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement