Advertisement
Guest User

finfisher

a guest
Sep 3rd, 2014
6,929
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 20.28 KB | None | 0 0
  1. [source https://pad.riseup.net/p/OmJHHd0z1SGb]
  2.  
  3. TEmail-addresses mentioned in feedback and support requests:
  4. [email protected] (mongolia) (person's e-mail adress was for sale?!)
  5.  
  6. @h2FinSpy Mobile
  7.  
  8. Firstname: E7549C72 at: 2011-12-12 19:14:22
  9.  
  10. Description: To whom it may concern We are currently investigating the possibility of adding the FinSpy Mobile package to our cyber solution. Brydon was always our contact person and he was in contact with our general manager, but he was moved to another structure. Can you please ask him to prepare a proposal and forward it to [email protected]. Regards ZAR
  11.  
  12. [email protected] (mongolia)
  13. [email protected] (nothing known)
  14.  
  15. Possible links from this person:
  16.  
  17. * http://forum.xda-developers.com/search.php?searchid=297151718
  18.  
  19. * https://twitter.com/mnkhzrg
  20.  
  21. * https://secure.flickr.com/photos/7623302@N03/
  22.  
  23. Description: Dear Sirs. We tried to send infected pdf file to gmail account. It giving error message even we had zipped it please give us reference as soon as possible Odmagnai.S [email protected] [email protected] [email protected]
  24.  
  25. [email protected] (mongolia) (http://wq.apnic.net/apnic-bin/whois.pl?searchtext=MAINT-MN-NITSYSTEM&form_type=advanced)
  26.  
  27. Customers I've identified:
  28. 29 - the Bahraini group, in support requests they ask for help setting up a
  29. website targetting activists in 14 Feb, and in another support request they
  30. attach their C&C server logs. The names of people with admin access to the
  31. FinSpy server are in the server logs, grep for "user name:"
  32. Abdulla Husain, Ahmad, Abdulla Al Eid, Yousif Al Sadiq, Rizwan Saleem, Sayed
  33. Ansar Husain, Humayun, and Mohammed Al Majed
  34. From metadata in attached word documents.
  35. 69 - PCS Security Pte Ltd
  36. 49 - Cliff Harris
  37. New names:
  38. Rostislav Psota
  39. From text in support_request or feedback table:
  40. 21 - Nasser Alnuaimi Qatar state security bureau
  41. 82 - Sanjin Custovic, Intelligence-Security Agency of Bosnia and Herzegovina
  42. 73 - Peter Balogh, SSNS - NBSZ hungary secret service
  43. 61 - Wim Bordeyne, gives work e-mail of [email protected] although skynet.be is
  44. an ISP?
  45. 48 - Vietnam
  46. 65 - Nigeria
  47. 18 - Mongolia, and their email [email protected] appears in this whois record:
  48. http://wq.apnic.net/apnic-bin/whois.pl?searchtext=MAINT-MN-NITSYSTEM&form_type=advanced
  49. From their username in customer table:
  50. 34 - Dyplex
  51. 9 - Trovicor (http://www.trovicor.com/images/pdf/release_c02_2013.pdf & ./www/FinFisher/Trovicor/)
  52. 10 - Elaman
  53. 23 - Cobham
  54. Countries mentioined in feedback and support requests:
  55. Bangladesh
  56. Bosnia & Herzegowina
  57. Czech Republic
  58. Hungary
  59. Latvia
  60. Mongolia ([email protected])
  61. Nigeria
  62. Vietnam
  63. https://news.ycombinator.com/item?id=8146200
  64. 0x03CE7ED9F158ADF2
  65. 0x053650A2977E9F54
  66. 0x0ADA0B76695D98C9
  67. 0x151BDCA37774F144
  68.  
  69.  
  70. 0x1B7061956ABDF71F
  71. 0x1E2E1F1E00BE9690
  72.  
  73. Jochen van der Wal
  74.  
  75. 1024 bit DSA key 0x5A14D578, created: 2003-02-21
  76.  
  77. 0x22C5C361BA87B977
  78. 0x2643AF650FEB4CFF
  79. 0x2F36489D58143658
  80. 0x33A057DC6ABDA7D0
  81. 0x371B124C7704B771
  82. 0x4CA1E3C2780E8451
  83. 0x4D510F44A7A4AC21
  84.  
  85. Hari Purnama (pgp) <[email protected]>
  86.  
  87. 2048 bit RSA key 0xA7A4AC21, created: 2013-03-05
  88.  
  89. 0x6A4F8FA29BBDD293
  90. 0x771696752C52A5C8
  91. 0x77A0959F280AD26F
  92. 0x79EAEE7A42C2DDCE
  93. 0x92B299A48E037629
  94. 0x93C082CED81082F4
  95.  
  96. Melvin Teoh (Gamma Group) <[email protected]>
  97.  
  98. 2048 bit RSA key 0xD81082F4, created: 2012-03-08
  99.  
  100. 0x971A4906B03A5EA9
  101. 0xA013DEEEE061DE51
  102. 0xA4B525F406E990A5
  103. 0xA89933AD6225EAA0
  104. 0xB35A54CC2B9A229A
  105. 0xCB75BDEAF5946EA8
  106. 0xCCDB5A9B77B11C19
  107. 0xD2EFAD8FF166F2CA
  108.  
  109. Alexander Hagenah <[email protected]>
  110.  
  111. 2048 bit RSA key 0x88E6111F3F895273, created: 2013-03-05, expires: 2018-03-04
  112.  
  113. https://twitter.com/xaitax/
  114.  
  115. https://gist.github.com/xaitax
  116.  
  117. 0xDD85E2EB8269976E
  118.  
  119. Alfons Rauscher <[email protected]>
  120.  
  121. 1024 bit DSA key 0x3B76A10166878388, created: 2013-04-17 --> http://buggedplanet.info/index.php?title=VERVIS
  122.  
  123. 0xE366AE080FC82479
  124. 0xE4FB3038C47B1004
  125. 0x4CA1E3C2780E8451
  126. 0x22C5C361BA87B977
  127. 0x1B7061956ABDF71F
  128. 0xCCDB5A9B77B11C19
  129. 0x771696752C52A5C8
  130. 0x371B124C7704B771
  131. 0xE4FB3038C47B1004
  132. 0x4AA946DCC56A85E9
  133. 0xF820192E4FB534CB
  134. 0x6A4F8FA29BBDD293
  135. 0x33A057DC6ABDA7D0
  136. 0x79EAEE7A42C2DDCE
  137. 0xA4B525F406E990A5
  138. 0x79EAEE7A42C2DDCE
  139. 0xA4B525F406E990A5
  140. 0xB35A54CC2B9A229A
  141. 0xA013DEEEE061DE51
  142. 0x10789AA7CF246B05
  143. 0xE366AE080FC82479
  144. 0x82301882C3F3EC1B
  145.  
  146.  
  147. 1024 bit DSA key 0x85E86971, created: 2009-06-12
  148.  
  149. 0x007B9D3E3471B217
  150. 0xF852D5DACBFF2AB4
  151. 0x7F02DE5F6D531E64
  152. 0xA95DEAED331A704A
  153. 0x8444467B1B14387E
  154. 0x49F2E9B065BACA20
  155. 0x1E2E1F1E00BE9690
  156. 0x7CA282A470A03877
  157.  
  158. USB on Fire <[email protected]>
  159.  
  160. 2048 bit DSA key 0x89A4703C, created: 2013-07-04
  161.  
  162. Export that and do:
  163.  
  164. for key in `cat fin-keys.txt | grep 0x`; do torsocks gpg --batch --search-keys $key; done
  165.  
  166. Countries mentioined in country statistics for visitors to customer support website: https://twitter.com/GammaGroupPR/status/497005097533321217
  167.  
  168. Australia
  169.  
  170. Austria
  171.  
  172. Belgium
  173.  
  174. Canada
  175.  
  176. Cameroon
  177.  
  178. Chech Republic
  179.  
  180. Columbia
  181.  
  182. Costa Rica
  183.  
  184. China
  185.  
  186. Chile
  187.  
  188. Brazil
  189.  
  190. Bulgaria
  191.  
  192. Denmark
  193.  
  194. Ethiopia
  195.  
  196. France
  197.  
  198. Germany
  199.  
  200. Hong Kong
  201.  
  202. Hungary
  203.  
  204. Indonesia
  205.  
  206. Iran
  207.  
  208. Japan
  209.  
  210. Jordan
  211.  
  212. Korea (South)
  213.  
  214. Lebanon
  215.  
  216. Luxembourgh
  217.  
  218. Netherlands
  219.  
  220. Oman
  221.  
  222. Russian Federation
  223.  
  224. Spain
  225.  
  226. South Africa
  227.  
  228. Sweden
  229.  
  230. Switzerland
  231.  
  232. Taiwan
  233.  
  234. Thailand
  235.  
  236. Tunisia
  237.  
  238. Turkey
  239.  
  240. Trinidad and Tobago
  241.  
  242. United Arab Emirates
  243.  
  244. United States
  245.  
  246. Ukraine
  247.  
  248. Uraguay
  249.  
  250. Logfile of Bahrain government detailing FinFisher victims and the watchers controlling FinSpy
  251.  
  252. www/GGI/Support/Attachments/A169FE42.
  253.  
  254. Usernames extracted from logfiles contained in A169FE42 (urls result of google search for name
  255.  
  256. that may be the person). Extraction done via "if ('user name' in line)":
  257.  
  258. DETIAL: https://pad.riseup.net/p/0QG54xefh1Q3
  259.  
  260. USER ENTRIES:
  261.  
  262. User name Login name Passphrase
  263.  
  264. Abdulla Al Eid 'abdulla' '$@!?09b9ec794320d57719f50c79f8a3ba4c5f78c67bb19a60d258a858bb056d5b79d'
  265.  
  266. https://twitter.com/TheAbdullaa
  267.  
  268. Abdulla Husain 'Abdulla' '$@!?0a80b6b35bce67f9b78f1c6c0b4bee176a1a4265813b7eed6c569b3ca78420713'
  269.  
  270. http://adhrb.org/tag/husain-abdulla/
  271.  
  272. Ahmad 'Ahmad' '$@!?06e56b3ab96c3d1bdd8b091ef3a29012d269c145117eba7ae99d44d6c4527c5ae'
  273.  
  274. finspy 'finspy' '$@!?099c78c062ba994359ff8be008c5a86a79acaafaba4f2e87e22196bfd94e0d0a3'
  275.  
  276. Humayun 'Humayun' '$@!?06fe762d2faca772673650ae31201d9c85b569b2246e9ef0b4d9373db97e24fc7'
  277.  
  278. Mohammed Al Majed 'Mohammed' '$@!?0a9bd7592012a789c382fe9082d464898895abc37b59cab920e310eeb56b7f58c'
  279.  
  280. Rizwan Saleem 'Rizwan' '$@!?02182bd412679669cc0c26ba37ef7a1f764e529661896dd2b64d488f665889dd3'
  281.  
  282. Sayed Ansar Husain 'S.Ansar' '$@!?0340668373c5a88fc0309ddd971a57a138b564f0b2311fbbe9eebb623715d054a'
  283.  
  284. http://www.wayn.com/profiles/nastyrasna
  285.  
  286. Yousif Al Sadiq 'Yousif' '$@!?0abe3717f036da2d30debd96224169bc18ed8334c1289d07ec214b1f4639b644c'
  287.  
  288. TARGET ENTRIES:
  289.  
  290. Target ID User Computer Global IP NOTES
  291.  
  292. 0x10000f2 'USER' 'USER-PC' '109.130.30.82'
  293.  
  294. 0x1538f44c 'ADMIN' 'DIA079' '89.148.9.221'
  295.  
  296. 0x15719405 'SYSTEM' 'ZABEEL-4CA838AD' '78.105.48.42'
  297.  
  298. 0x167a3705 'FAlali' 'FATIMAALALI-PC' '217.17.237.231' http://www.lawyers.com/manama/bahrain/fatima-hussain-al-ali-41383740-a/
  299.  
  300. 0x18a2c941 'SYSTEM' 'USER-84FEEF1356' '178.61.76.42'
  301.  
  302. 0x1abd5e97 'scorpion' 'SCORPION-PC' '46.184.166.133'
  303.  
  304. 0x1b6bdd7e 'SYSTEM' 'COMPUTER-6618DA' '188.220.240.165'
  305.  
  306. 0x1de66f19 'SYSTEM' 'WW' '77.69.229.147'
  307.  
  308. 0x265010fe 'SYSTEM' 'DARYA-SYSTEM' '31.57.114.98'
  309.  
  310. 0x2c0561cb 'mmad' 'MMAD-HP' '188.116.228.164'
  311.  
  312. 0x2dba1fd1 'ALWEFAQ' 'ALWEFAQ-1E731B6' '89.148.29.246'
  313.  
  314. 0x2e3093d8 'HadiMosawi' 'HADIMOSAWI-PC' '88.201.63.24' https://twitter.com/SHalMosawi
  315.  
  316. 0x3433f1fe 'SYSTEM' 'JALILA-PC' '89.148.21.240'
  317.  
  318. 0x36e1dccb '' '' ''
  319.  
  320. 0x38584dbc 'mahmood.aloraibi' 'MAHMOOD-PC' '217.17.237.231' https://twitter.com/LawOraibi
  321.  
  322. 0x3b21966d 'alsayed.jaffer' 'ALSAYED-PC' '217.17.237.231' http://hassanradhi.com/team/mr-al-sayed-jaffer-mohammedassociate/
  323.  
  324. 0x3cae0814 'user' 'WINCTRL-Q2KVLM1' '188.116.249.129'
  325.  
  326. 0x3f5349f9 'SPIDER' 'SPIDER-PC' '89.148.17.52'
  327.  
  328. 0x4189d7d1 'Malalawi' 'MOHSIN-PC' '217.17.237.231'
  329.  
  330. 0x4239bd37 'Mahdi' 'MAHDI-VAIO' '83.136.59.211'
  331.  
  332. 0x48b21bec 'Owner' 'HOME-9526399744' '88.201.63.19'
  333.  
  334. 0x49d98a82 'KMA' 'KMA-VAIO' '77.69.225.196'
  335.  
  336. 0x4cda494f '' '' ''
  337.  
  338. 0x4d8fc8fe 'krishna' 'KRISHNA-PC' '109.161.177.205'
  339.  
  340. 0x4ff60c5c 'Ebrahim' 'EBRAHIM-SONYPC' '84.255.129.88'
  341.  
  342. 0x5075d4c0 'SYSTEM' 'SHIP' '84.255.190.3'
  343.  
  344. 0x51025829 '' '' ''
  345.  
  346. 0x5bf0415a 'SYSTEM' 'USER-PC' '94.76.9.136'
  347.  
  348. 0x5ec9ec9b 'SYSTEM' 'PC' '83.136.59.166'
  349.  
  350. 0x5ff47b05 '' '' ''
  351.  
  352. 0x606ce376 'fars' 'FOREIGNP-2-159' '109.70.143.210'
  353.  
  354. 0x609316da 'Douglass' 'DOUGLAS-HD' '77.69.225.196'
  355.  
  356. 0x60cf8481 'hanan.taqi' 'HUDA-PC' '217.17.237.231'
  357.  
  358. 0x6aef6d29 'SYSTEM' 'USER-CF6420EBAA' '62.215.128.21'
  359.  
  360. 0x700700c7 'Drdoos' 'DRDOOS-PC' '77.69.220.131'
  361.  
  362. 0x7123a0cb 'SYSTEM' 'SA-L-KH1943A' '188.116.192.231'
  363.  
  364. 0x712ff44c 'ADMIN' 'DIA077' '89.31.192.209'
  365.  
  366. 0x757b7e92 'SYSTEM' 'MAHERPC' '217.17.237.231'
  367.  
  368. 0x79d8f34c 'com4a' 'DIA092' '89.31.192.209'
  369.  
  370. 0x7db8bdfe 'user' 'USER-TOSH' '78.105.54.70'
  371.  
  372. 0x82b1a3f9 'User' 'USER-PC' '41.137.70.82'
  373.  
  374. 0x82d93e4c 'comet' 'COMET-PC' '46.64.70.95'
  375.  
  376. 0x835cb0e4 'SYSTEM' 'MATAM-H9074NLYU' '46.184.183.111'
  377.  
  378. 0x86cdbab8 'ehussab' 'EV002481025A9E' '194.237.142.3'
  379.  
  380. 0x8a6be029 'SYSTEM' 'E13889741FA94B9' '217.86.164.76'
  381.  
  382. 0x8c47f176 'SYSTEM' 'LAWPC02' '217.17.237.231'
  383.  
  384. 0x951f6ecb 'user' 'USER-PC' '78.110.70.141'
  385.  
  386. 0x9729f44c 'com1b' 'DIA084' '89.31.192.209'
  387.  
  388. 0x986208c7 'RomelT' 'ROMELTABAJA' '80.83.21.34' http://investing.businessweek.com/research/stocks/private/person.asp?personId=241673142&privcapId=38061438&previousCapId=38061438&previousTitle=Trust%20International%20Insurance%20&%20Reinsurance%20Co.%20B.S.C.%28c%29
  389.  
  390. 0x98987cc0 '0208' '1-PC' '77.69.217.118'
  391.  
  392. 0x9b18b5fa 'SYSTEM' 'USER-PC' '46.42.64.154'
  393.  
  394. 0x9b7b1dcb 'ASUS' 'ASUS-PC' '82.114.188.17'
  395.  
  396. 0x9df4b316 'SYSTEM' 'ALTAGER-PC' '89.148.0.38'
  397.  
  398. 0xa07289a 'abrar' 'ABRAR-PC' '86.145.66.174'
  399.  
  400. 0xa4626b7e 'SYSTEM' 'MYNAME-893A225C' '95.84.119.14'
  401.  
  402. 0xab87739c 'USER' 'USER-PC' '46.184.208.207'
  403.  
  404. 0xabf6064e 'Lenovo' 'LENOVO-PC' '115.67.192.74'
  405.  
  406. 0xae3eeeb9 'com1a' 'DIA086' '89.31.192.209'
  407.  
  408. 0xaed5ec50 '' '' ''
  409.  
  410. 0xb1f51f10 'yousif' 'AL-ARRAYED' '46.42.76.129'
  411.  
  412. 0xb3c17c17 'RMajeed' '455-36BBBBCE1AE' '217.17.237.231'
  413.  
  414. 0xb4a68721 'SYSTEM' 'KHALIL-PC' '217.17.237.231'
  415.  
  416. 0xb609d22b 'user' 'USER-PC' '46.42.104.19'
  417.  
  418. 0xb8bc95a0 'SYSTEM' 'ABRAR-DRGOQH912' '86.145.64.24'
  419.  
  420. 0xbacffba9 'SYSTEM' 'HASANMUSHAIM' '74.115.3.64' https://en.wikipedia.org/wiki/Hasan_Mushaima
  421.  
  422. 0xc2ce5700 'WAFA COMPUTERS' 'WAFACOMPUTERS' '94.187.18.47' ?? http://wikimapia.org/4867042/al-wafa-computers ??
  423.  
  424. 0xc93f83f9 'My Documents' 'DELL' '77.69.173.183'
  425.  
  426. 0xd405e672 'SYSTEM' 'PC-13' '93.97.55.83'
  427.  
  428. 0xdd3bf44c 'ADMIN' 'DIA080' '89.31.192.209'
  429.  
  430. 0xdf2bf44c 'com2c' 'DIA087' '89.31.192.209'
  431.  
  432. 0xdfb41f10 'aya' 'AYA-PC' '89.148.39.32'
  433.  
  434. 0xe3ad7d7e 'SYSTEM' 'SALVATIO-1424E9' '188.220.240.165'
  435.  
  436. 0xe4163efb 'Moosa' 'MOOSA-PC' '94.195.190.251'
  437.  
  438. 0xe51a26fe 'SYSTEM' 'USER-A5CEA6FD42' '46.184.160.135'
  439.  
  440. 0xe5339505 'SYSTEM' 'THE-1A72E930F5E' '78.145.20.73'
  441.  
  442. 0xe56d7b6d 'Qasim' 'ALHASHMI' '46.64.70.95'
  443.  
  444. 0xebbe9ab3 'nader' 'NADER-PC' '82.194.39.198'
  445.  
  446. 0xeee0d4fa 'halmahfoodh' 'HUSSAIN' '77.69.216.195'
  447.  
  448. 0xf5a11f10 'scorpion' 'SCORPION-PC' '46.184.205.228'
  449.  
  450. 0xf627f44c 'com2b' 'DIA096' '89.31.192.209'
  451.  
  452. 0xfd9a1310 'com3b' 'DIA088' '89.31.192.209'
  453.  
  454. 0xfe3ac5af 'Saeed 'JAAFAR' '78.149.123.155' https://en.wikipedia.org/wiki/Saeed_al-Shehabi
  455.  
  456. Email addresses extracted from logfiles contained in A169FE42 (urls result of google search, not
  457.  
  458. from logfiles). Extraction done via "if ('Emailaddress' in line)":
  459.  
  460.  
  461.  
  462. NOTE: These addresses show in the log files for "alarm" entries per target. This may indicate that alarms are sent to these email address for a given subset of targets.
  463.  
  464. GeoIP entries extracted form logfiles contained in A169FE42. Extraction done via "if ('GeoIP entry, item' in line):"
  465.  
  466. and reading the next 4 lines:
  467.  
  468. See file here: https://pad.riseup.net/p/anQZDggEMhh5
  469.  
  470. Targeted computers extracted from 417B7B13.rar. ITACA(?) as source?
  471.  
  472. $ grep -i name 2013-10-09_16-29-24-System.log | sort -k 8 | perl -nle '@a=split; print join " ", @a[6..7], @a[10..20]' | sort | uniq -c | sed -e 's/target//g'|sed 's/(Trojan://g'|sed 's/Comp-Name://g'|sed 's/Inst-Mode:.*//g' | column -s " " -t | sort -k 4
  473.  
  474. N Target_ID Trojan_Name Comp-Name
  475.  
  476. 109 0x71832C7E bolzano-01mbr CARLOS-PC
  477.  
  478. 8 0x82266CA2 new_pc DELL-DEMO-02
  479.  
  480. 7 0x61A39D54 galaxydemo6 DEMO3
  481.  
  482. 2 0x9D1AECF9 csal001 DILORENZO-A
  483.  
  484. 118 0x4B17A31D TestVenPie GENESIMOBILE-PC
  485.  
  486. 3 0x4B17A31D testlat-01 GENESIMOBILE-PC
  487.  
  488. 1 0x1F87136A demo-hsd-at1 GENESIMOBILE-PC
  489.  
  490. 6 0x33595444 GalaxyMacBook1 hamzas-macbook-pro.local
  491.  
  492. 15 0xC9F3E1E3 test_srv01 ITACAAGENT06
  493.  
  494. 2 0x55474150 mac-demo macbook-pro-di-mario-luzi.local
  495.  
  496. 2 0x549DA3AA lin2607 netsiever
  497.  
  498. 1 0x61043D56 test-ancona PICCOLOP-XP
  499.  
  500. 1 0x61043D56 demohsd-02sys PICCOLOP-XP
  501.  
  502. 9 0xFEBBE8BA demo-gl01 TARGET-NB-01
  503.  
  504. 236 0xFEBBE8BA cristian_1 TARGET-NB-01
  505.  
  506. 13 0xFEBBE8BA demogalaxy4 TARGET-NB-01
  507.  
  508. 1 0xFEBBE8BA DemoGalaxy02 TARGET-NB-01
  509.  
  510. 11 0xFEBBE8BA DemoGalaxy_5 TARGET-NB-01
  511.  
  512. 9 0xFEBBE8BA demogalaxy01 TARGET-NB-01
  513.  
  514. 1 0xFEBBE8BA demohsd-02sys TARGET-NB-01
  515.  
  516. 5 0xA7821F10 caserta-01e TERMINALE-PC2
  517.  
  518. 1 0xC9F3E1E3 demogalaxy01mbr TEST02-THINK
  519.  
  520. 1 0x3EF3E1E3 nola-01 TEST-THINK
  521.  
  522. 86 0x3EF3E1E3 demo-at02 TEST-THINK
  523.  
  524. 31 0x3EF3E1E3 Demo Trojan Windows 01 DEMO-THINK
  525.  
  526. 2 0x61043D56 Demo Trojan Windows 01 PICCOLOP-XP
  527.  
  528. 7 0x37145D29 Demo Trojan Windows 02 DEMO-PC
  529.  
  530. 2 0x24E785D6 Aprilia-01mbr UTENTE-PC1
  531.  
  532. 3 0xDA22C929 bolzano-01mbr WIN-JT981OVE4SK
  533.  
  534. 40 0x37AABA29 TestVenPie WIN-O2ABT18KLG8
  535.  
  536. First column (N) relates to the number of times the entry showed up in the log. An entry is added with the note "comes online" each time. So the N column likely indicates number of times the system noticed this target came online.
  537.  
  538. Phone numbers from same log file:
  539.  
  540. $ grep mobile 2013-10-09_16-29-24-System.log | grep 'having phone number' |sort -k 19 | awk '{print $19}' | uniq -c
  541.  
  542. 2 '+393206562399' (30=Italy)
  543.  
  544. 2 '+393311870439'
  545.  
  546. 1 '+393351346777'
  547.  
  548. 4 '+393351515103'
  549.  
  550. 3 '+393355669618'
  551.  
  552. 4 '+393425621143'
  553.  
  554. 2 '+393463536394'
  555.  
  556. IMSI's:
  557.  
  558. $ grep -i imsi 2013-10-09_16-29-24-System.log | cut -d " " -f 6- | sort -k 7 | sed 's/^ *//g'
  559.  
  560. INFO: The IMSI of mobile target 0x00000B82F07A417F has changed to 0x0000CAD0180D0DEB
  561.  
  562. INFO: The IMSI of mobile target 0x00000B82F07A417F has changed to 0x0000D1328A7C0A84
  563.  
  564. INFO: The IMSI of mobile target 0x00000B82F07A417F has changed to 0x0000D1328A7C0A84
  565.  
  566. INFO: The IMSI of mobile target 0x00013FFAF45193CB has changed to 0x0000CA00924A71FE
  567.  
  568. INFO: The IMSI of mobile target 0x00013FFAF4519C55 has changed to 0x0000D1328A7C0A84
  569.  
  570. INFO: The IMSI of mobile target 0x00013FFAF4519C55 has changed to 0x0000D1328A7C0A84
  571.  
  572. INFO: The IMSI of mobile target 0x00013FFAF4519C55 has changed to 0x0000D1328A7C0A84
  573.  
  574. INFO: The IMSI of mobile target 0x00013FFAF4519C55 has changed to 0x0000D1328A7C0A84
  575.  
  576. INFO: The IMSI of mobile target 0x0001470CFA848E76 has changed to 0x0000CA00924A717A
  577.  
  578. INFO: The IMSI of mobile target 0x0001470CFA848E76 has changed to 0x0000CA00924A71DC
  579.  
  580. MMC location change:
  581.  
  582. $ grep -i mcc 2013-10-09_16-29-24-System.log | sed 's/.*INFO: //g' | uniq
  583.  
  584. The MCC value of mobile target 0x00013FFAF4519C55 has changed to '222' (Italy)
  585.  
  586. The MCC value of mobile target 0x00000B82F07A417F has changed to '222'
  587.  
  588. The MCC value of mobile target 0x00013FFAF4519C55 has changed to '222'
  589.  
  590. The MCC value of mobile target 0x00000B82F07A417F has changed to '222'
  591.  
  592. The MCC value of mobile target 0x00013FFAF4519C55 has changed to '222'
  593.  
  594. The MCC value of mobile target 0x00000B82F07A417F has changed to '000' (???)
  595.  
  596. The MCC value of mobile target 0x00000B82F07A417F has changed to '230' (Czech Republic)
  597.  
  598. The MCC value of mobile target 0x00013FFAF4519C55 has changed to '222'
  599.  
  600. The MCC value of mobile target 0x00000B82F07A417F has changed to '000'
  601.  
  602. The MCC value of mobile target 0x00000B82F07A417F has changed to '230'
  603.  
  604. The MCC value of mobile target 0x00013FFAF45193CB has changed to '222'
  605.  
  606. Support/6E51EFE8.txt
  607.  
  608. [Feb 4 22:57:25] WARNING[3629] chan_sip.c: Retransmission timeout reached on transmission 1754558912 for seqno 1 (C3:53:00:0c:31:96:5c:06:08:00 SRC=188.138.32.16 DST=213.168.28.54 LEN=52 TOS=0x02 PREC=0x00 TTL=1Mar 3 08:42:39 F-MP-20-12 kernel: [431659.401063] InDrop IN=eth0.100 OUT= MAC=00:19:99:cb:53:53:00:0c:31:96:5c:06:08:00 SRC=188.138.32.16 DST=213.168.28.54 LEN=52 TOS=0x02 PREC=0x00 TTL=119 ID=8381 DF PROTO=TCP SPT=63683 DPT=16566 WINDOW=32 RES=0x00 CWR ECE SYN URGP=0
  609.  
  610. 19 ID=8233 DF PROTO=TCP SPT=49394 DPT=16565 WINDOW=32 RES=0x00 CWR ECE SYN URGP=0
  611.  
  612. ...
  613.  
  614. The ip's mentioned above:
  615.  
  616. SRC:188.138.32.16 = intergenia AG German Service provider - subblock for Plusserver AG
  617.  
  618. DST:213.168.28.54 = Static Links for Elion Ettevotted Aktsiaselts (Estonian Telco)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement