Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- =========================================
- #MalwareMustDie - A quest of TDS Sutra CNC
- *) This is a team work of crusaders.
- Thanks to DL for great effort figuring the links
- =========================================
- Case of Suspectted TDS Sutra CNC 188.40.204.81 & 199.21.149.60
- Which 199.21.149.60 - had Sutra, confirmed(closed).
- From the second one - SUtraTDS forward us in case you have correct referer:
- h00p://sparc-ftp[.]de/~artem/index.html to uqzzxgwg.lflinkup.com -
- its Dynamic switching DNS service lead to 206.212.240.202
- Ref: http://www.projecthoneypot.org/ip_46.4.179.69 (DAG Randomized comparison pattern)
- Ref1: http://pastebin.com/raw.php?i=0VM5ycgq (first type of deobfs burped urls)
- Ref2: http://pastebin.com/raw.php?i=xjwM4gfy (second type of deobfs burped urls)
- 0) Additional (see the random feedback domain)
- Nmap scan report for flpwgfdzcjppotrp.pro (188.40.204.81)
- Host is up (0.099s latency).
- rDNS record for 188.40.204.81: static.81.204.40.188.clients.your-server.de
- Nmap scan report for rfhwhftjormwjzfj.pro (188.40.204.81)
- Host is up (0.10s latency).
- rDNS record for 188.40.204.81: static.81.204.40.188.clients.your-server.de
- Nmap scan report for whwfcjiwplgmriew.pro (188.40.204.81)
- Host is up (0.096s latency).
- rDNS record for 188.40.204.81: static.81.204.40.188.clients.your-server.de
- Nmap scan report for fzrttttthlzcewjd.pro (188.40.204.81)
- Host is up (0.11s latency).
- rDNS record for 188.40.204.81: static.81.204.40.188.clients.your-server.de
- Nmap scan report for rhofafmfwfgwwgpw.pro (188.40.204.81)
- Host is up (0.10s latency).
- rDNS record for 188.40.204.81: static.81.204.40.188.clients.your-server.de
- Nmap scan report for wpefzadawawhhirl.pro (188.40.204.81)
- Host is up (0.12s latency).
- rDNS record for 188.40.204.81: static.81.204.40.188.clients.your-server.de
- Nmap scan report for wflippciqffirplr.pro (188.40.204.81)
- Host is up (0.10s latency).
- rDNS record for 188.40.204.81: static.81.204.40.188.clients.your-server.de
- Nmap scan report for iwwqcwacppghdwch.pro (188.40.204.81)
- Host is up (0.10s latency).
- rDNS record for 188.40.204.81: static.81.204.40.188.clients.your-server.de
- Nmap done: 145 IP addresses (8 hosts up) scanned in 884.02 seconds
- 1) These below domains is currently alive and up,
- -----------------------------------------
- flpwgfdzcjppotrp.pro,188.40.204.81
- rfhwhftjormwjzfj.pro,188.40.204.81
- whwfcjiwplgmriew.pro,188.40.204.81
- fzrttttthlzcewjd.pro,188.40.204.81
- rhofafmfwfgwwgpw.pro,188.40.204.81
- wpefzadawawhhirl.pro,188.40.204.81
- wflippciqffirplr.pro,188.40.204.81
- iwwqcwacppghdwch.pro,188.40.204.81
- dirohpdwcrfppqji.pro,199.21.149.60
- agogfwfwpjfhedfp.pro,199.21.149.60
- gfeimowjdeirhfjj.pro,199.21.149.60
- djgreepfomichmah.pro,199.21.149.60
- affqdfmtffpjzhop.pro,199.21.149.60
- whzwpzeriodiqwlo.pro,199.21.149.60
- oqjlwrzrwrrhtgil.pro,199.21.149.60
- fcgcfmzrpiwwtizp.pro,199.21.149.60
- lighhrwweiaztapc.pro,199.21.149.60
- prpmphwjfjwpjmac.pro,199.21.149.60
- fwichowrpgaperwf.pro,199.21.149.60
- riwhzhwagwejffcm.pro,199.21.149.60
- jalfwrjcajwcezep.pro,199.21.149.60
- foqriiwqwwidwhow.pro,199.21.149.60
- grrgcjgrjrpzwhhe.pro,199.21.149.60
- hcwwewhgwgtjpeow.pro,199.21.149.60
- zeehpwewpiwgqahm.pro,199.21.149.60
- wmljjfqgrrwwitez.pro,199.21.149.60
- hfqhhcwegwcmrepz.pro,199.21.149.60
- zfzlpwwlzgcwijow.pro,199.21.149.60
- qffioftzzaglfhrj.pro,199.21.149.60
- hhahfzwctwdhwcwo.pro,199.21.149.60
- cwcotghdcqwirfoz.pro,199.21.149.60
- pcfpwedjzwircdpw.pro,199.21.149.60
- iizwpcrprjdjzgrh.pro,199.21.149.60
- frfzwcippeleghmg.pro,199.21.149.60
- jwagermjwfrcemfc.pro,199.21.149.60
- iiddpofwiwhrppwh.pro,199.21.149.60
- fafttwtagccwrwcr.pro,199.21.149.60
- rocrelfemepjrcch.pro,199.21.149.60
- wrwrwdzqigcdqwhh.pro,199.21.149.60
- ecjepiiwepaewiwm.pro,199.21.149.60
- eewdzjjiciclhpli.pro,199.21.149.60
- mpcwicfmefcpicpl.pro,199.21.149.60
- ifhjthtgffrmfahg.pro,199.21.149.60
- dpwpewdcewwficcr.pro,199.21.149.60
- mwodwwgijowogiar.pro,199.21.149.60
- gdegwflhwieawjrf.pro,199.21.149.60
- twpiirawhgrqrihp.pro,199.21.149.60
- fjhfweqffghppdgh.pro,199.21.149.60
- ljcwfejwatejwmep.pro,199.21.149.60
- petwtmfrrjwiwmdi.pro,199.21.149.60
- fewzqzjffqeflpiw.pro,199.21.149.60
- lmhazdjfcicfhqjp.pro,199.21.149.60
- ptifprwwwizgztzj.pro,199.21.149.60
- fldrjdjcwjdaprfh.pro,199.21.149.60
- gfjwddcorwmfzrgp.pro,199.21.149.60
- hhgwfcrtwoigfdtw.pro,199.21.149.60
- zqwhpghgwjgftgwg.pro,199.21.149.60
- dcjfgzwgjwcdwwhe.pro,199.21.149.60
- hpotwehpfdjrmjaf.pro,199.21.149.60
- zfeipreiipwiepap.pro,199.21.149.60
- wwlfghcwpgdigwwf.pro,199.21.149.60
- hdmawgrdmwewehtf.pro,199.21.149.60
- wwwoefrjhplamgwj.pro,199.21.149.60
- ojofafiipflthilf.pro,199.21.149.60
- jjefptgiarpwdpef.pro,199.21.149.60
- relizfjdwzpjwwef.pro,199.21.149.60
- pefwrpqpwwmmmhhf.pro,199.21.149.60
- imwwzfcwegceftgw.pro,199.21.149.60
- rtrwtrcccrtimwop.pro,199.21.149.60
- jlwletjjgwtlzfjw.pro,199.21.149.60
- cfejwwlggfwhjcji.pro,199.21.149.60
- ehfwprfifjrgeghw.pro,199.21.149.60
- ewzwzpgjpfjwlaaw.pro,199.21.149.60
- wcjchprowwffwpip.pro,199.21.149.60
- eprhiehomiwaacwz.pro,199.21.149.60
- efmfwtrwfhfgfewf.pro,199.21.149.60
- wwffrrrwrjcwghaf.pro,199.21.149.60
- mwtwfjwpcfwpwrfo.pro,199.21.149.60
- ggihihgfwhtfeiih.pro,199.21.149.60
- tfrfwocdfwchwhgw.pro,199.21.149.60
- fpmrwmcwiljmfgrz.pro,199.21.149.60
- igfgfmazrpprgwja.pro,199.21.149.60
- thpcwwopwoeiwigw.pro,199.21.149.60
- fqwiqfwmfhjlwewj.pro,199.21.149.60
- lcemwctqgezwchfc.pro,199.21.149.60
- pifppfepggawwzhd.pro,199.21.149.60
- rrzlgijwwwjmfwwo.pro,199.21.149.60
- wwfcwwprrfllmwjj.pro,199.21.149.60
- wdazirmtwfljidwf.pro,199.21.149.60
- iweapwfrmegjrrwg.pro,199.21.149.60
- gocdwwhwgjtgjpfa.pro,199.21.149.60
- hrtcgqigfrrhwtih.pro,199.21.149.60
- ichjpwpitwczwheg.pro,199.21.149.60
- deirztiwairgrrjg.pro,199.21.149.60
- agaafrdgpwfwfrgp.pro,199.21.149.60
- wfccpgrwweweowzp.pro,199.21.149.60
- optrrpiphpcgfrac.pro,199.21.149.60
- jghrwowepaetpifw.pro,199.21.149.60
- whgptdchwrwfrgwq.pro,199.21.149.60
- owpeihfawzejihrl.pro,199.21.149.60
- jcwzpcooalffiroi.pro,199.21.149.60
- ripgwpfoeiwgwgcr.pro,199.21.149.60
- jrhjelhcqfwrzgzf.pro,199.21.149.60
- cwwprcwwzzffwtpc.pro,199.21.149.60
- edoeaejcwhclwgcl.pro,199.21.149.60
- hwzwzjeiqihacoij.pro,199.21.149.60
- coeewhrirpgpffzl.pro,199.21.149.60
- erlaicwidrpphqco.pro,199.21.149.60
- ecwtwcjamtgdwort.pro,199.21.149.60
- werrflhwrjpqghra.pro,199.21.149.60
- qhtwotipizlwpzcm.pro,199.21.149.60
- hphazfrfpedhaeic.pro,199.21.149.60
- cfifpeeidwwcgfjw.pro,199.21.149.60
- pwdreawwhrdpczew.pro,199.21.149.60
- gwzjfwgehjwmwpmg.pro,199.21.149.60
- tdfrjewdgehrpllr.pro,199.21.149.60
- pwgeqrdjzwlwcirr.pro,199.21.149.60
- ijgqwwrwahpflrmc.pro,199.21.149.60
- fjptwretwhdwwfhh.pro,199.21.149.60
- reiigailcwfpwwfw.pro,199.21.149.60
- wwrfelwfcrwqhchz.pro,199.21.149.60
- wghifhrjgcgcffww.pro,199.21.149.60
- rtqwwgfjdewgpgwp.pro,199.21.149.60
- wlrwwcpwjwdecpfp.pro,199.21.149.60
- ihefpmcaflpziwwf.pro,199.21.149.60
- dqlrgeezrctocfdl.pro,199.21.149.60
- apqmqcrfremjerwg.pro,199.21.149.60
- wfrwtwpdcdwjwpwf.pro,199.21.149.60
- twwiejclegoirjgi.pro,199.21.149.60
- awafaccwiwgawoaz.pro,199.21.149.60
- wdcrcjwpzwgwfrpe.pro,199.21.149.60
- owfgrwpflgejtmdw.pro,199.21.149.60
- jjziwwwtwzwhfjpj.pro,199.21.149.60
- ljfhwrmdrqmdqfah.pro,199.21.149.60
- peafefrmdaazlwfp.pro,199.21.149.60
- fwcfrefroptththe.pro,199.21.149.60
- ggpeppwpifrlzcjm.pro,199.21.149.60
- jtccirgcffghhjpw.pro,199.21.149.60
- clwhrwwpjwwhwtjr.pro,199.21.149.60
- gfjmwpwmgflrgtwi.pro,199.21.149.60
- hhwcwrwfrpreidwe.pro,199.21.149.60
- zwplfefiwccmcqha.pro,199.21.149.60
- wcwwrcrpptrwwwif.pro,199.21.149.60
- hrwmpcddmeiwoqcp.pro,199.21.149.60
- ccjowfwdjtmwejtz.pro,199.21.149.60
- 2) And evil-ly DNS hosted by:
- ;; AUTHORITY SECTION:
- flpwgfdzcjppotrp.pro. 3419 IN NS east.inapple.com.
- flpwgfdzcjppotrp.pro. 3419 IN NS north.inapple.com.
- flpwgfdzcjppotrp.pro. 3419 IN NS west.inapple.com.
- flpwgfdzcjppotrp.pro. 3419 IN NS south.inapple.com.
- ;; ADDITIONAL SECTION:
- east.inapple.com. 3420 IN A 184.173.149.221
- east.inapple.com. 3420 IN A 184.173.149.222
- east.inapple.com. 3420 IN A 184.173.150.57
- east.inapple.com. 3420 IN A 184.173.150.58
- west.inapple.com. 3420 IN A 67.15.47.189
- west.inapple.com. 3420 IN A 67.15.253.219
- west.inapple.com. 3420 IN A 67.15.253.220
- west.inapple.com. 3420 IN A 67.15.47.188
- north.inapple.com. 3420 IN A 50.23.136.230
- north.inapple.com. 3420 IN A 50.23.136.173
- north.inapple.com. 3420 IN A 50.23.136.174
- north.inapple.com. 3420 IN A 50.23.136.229
- south.inapple.com. 3420 IN A 50.23.75.97
- south.inapple.com. 3420 IN A 50.23.75.44
- south.inapple.com. 3420 IN A 50.23.75.45
- south.inapple.com. 3420 IN A 50.23.75.96
- 3) Some infector hosts + TDS CNC followed....
- 206.212.240.202
- PORT STATE SERVICE
- 80/tcp open http
- 443/tcp open https
- Device type: broadband router|media device|general purpose
- Running (JUST GUESSING) : Linux 2.4.6 - 2.4.21/ Linux 2.4.X
- Is an embedd/ router gateway...
- The EK servers are behind this.. I suggest stop attempt, is the innocent Data Center.
- With the infected EK inside.
- Checked on:
- Suspected TDS Sutra server (199.21.149.60) report:
- Uptime 27.923 days (since Wed Oct 3 22:58:34 2012)
- Interesting ports on 199.21.149.60
- PORT STATE SERVICE
- 22/tcp open ssh
- 68/tcp filtered dhcpclient
- 80/tcp open http
- 135/tcp filtered msrpc <--- windozzzz
- 136/tcp filtered profile
- 137/tcp filtered netbios-ns <--- windozzzz
- 138/tcp filtered netbios-dgm <--- windozzzz
- 139/tcp filtered netbios-ssn <--- windozzzz
- 445/tcp filtered microsoft-ds <--- windozzzz
- ps /admin is authed... cant b***, access rejected on 9th attempt.
- (188.40.204.81) <=================== CNC
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 25/tcp open smtp
- 53/tcp open domain
- 80/tcp open http
- 81/tcp open hosts2-ns
- 110/tcp open pop3
- 135/tcp filtered msrpc
- 136/tcp filtered profile
- 137/tcp filtered netbios-ns
- 138/tcp filtered netbios-dgm
- 139/tcp filtered netbios-ssn
- 143/tcp open imap
- 443/tcp open https
- 445/tcp filtered microsoft-ds
- 465/tcp open smtps
- 587/tcp open submission
- 993/tcp open imaps
- 995/tcp open pop3s
- 1500/tcp open vlsi-lm // Smalls a VPS server on this.. lets check on whois...
- inetnum: 188.40.204.64 - 188.40.204.95
- netname: VPSSERVER
- descr: vpsserver
- country: DE
- admin-c: VK1952-RIPE
- tech-c: VK1952-RIPE
- person: Viacheslav Krivosheev // maybe bingo....
- address: vps-server
- address: Poliykovskaiy 8a
- address: 153011 IVANOVO
- address: RUSSIAN FEDERATION
- phone: +79270563774
- nic-hdl: VK1952-RIPE
- (((while 199.21.149.60)))
- PORT STATE SERVICE
- 22/tcp open ssh
- 68/tcp filtered dhcpclient // can't believe.. he's using DHCP to get global IP, too honest....
- 80/tcp open http // a victim....
- 135/tcp filtered msrpc
- 136/tcp filtered profile
- 137/tcp filtered netbios-ns
- 138/tcp filtered netbios-dgm
- 139/tcp filtered netbios-ssn
- 445/tcp filtered microsoft-ds
- Device type: general purpose
- Running: Linux 2.4.X|2.5.X|2.6.X
- //BTW we can contact this guy for cleaning his web service up....
- NetRange: 199.21.148.0 - 199.21.151.255
- CIDR: 199.21.148.0/22
- OriginAS: AS22923
- NetName: YESUP-COM
- NetHandle: NET-199-21-148-0-1
- Parent: NET-199-0-0-0-0
- NetType: Direct Allocation
- RegDate: 2010-08-10
- Updated: 2012-03-02
- OrgName: Yesup Ecommerce Solutions Inc.
- OrgId: YESUP
- Address: 565 Gordon Baker Road
- City: North York
- StateProv: ON
- PostalCode: M2H-2W2
- Country: CA
- ----
- #MalwareMustDie!
- End of Oct Investgation Log as Team.
Advertisement
Add Comment
Please, Sign In to add comment