Advertisement
unixfreaxjp

TO ISEC Labsre: w***wet bug PoC with fixing ADVICE

Oct 19th, 2012
291
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.56 KB | None | 0 0
  1. // As promised to Mr. Marco Cova, I did send the email below
  2. // regarding to the w***wet bug of PseudoDomain multilayer+packer obfuscation scan.
  3. // Ref: http://malwaremustdie.blogspot.jp/2012/10/fuzzy-in-manual-cracking-of.html
  4. // Looks like he cannot receive email from GMAIL I don't know how to contact so I pasted
  5. // the report here instead, and tweet the bug to him.
  6.  
  7. Delivery to the following recipient failed permanently:
  8. ========================================
  9. ========================================
  10. Technical details of permanent failure:
  11. Google tried to deliver your message, but it was rejected by the recipient domain. We recommend contacting the other email provider for further information about the cause of this error. The error that the other server returned was: 550 550 Encrypted zip attachments are not allowed (state 17).
  12.  
  13. ----- Original message -----
  14.  
  15. DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
  16. d=gmail.com; s=20120113;
  17. h=mime-version:in-reply-to:references:date:message-id:subject:from:to
  18. :content-type;
  19. bh=Dw9pzl4ZPN/QK1b6xi4EC8L7l2odRNM+Ymv0gkLNgQY=;
  20. b=xiB+7bNu8mJCyJkiqejh5Z/HjwlPrY4j6/mWh3PRJ7I0sVFxvcJJInfaiXj1pcI3Xw
  21. ZA5zp3p59eGFqRCr5OajcNe8AR+Wy4ACd0zA85PgGR5VKH7yA02IS8SEjKhL70+O+dsT
  22. Y4jQJNkB9qNk8qNlRgeCHBKeG/l4xl70xhRoyikUxqE7zsOSH83clxK4wQumYc9Ujm6R
  23. kHF0fG5Gizb5GlgzmMVqCB+YREjByfh6R8ZjxSF9Gx6pjNVa7QfYCSEWWhU5qI1F+JBo
  24. KEdRMg7mPsB5RMO3Y7HAwOf2rK0Mp8RUp2usZTZwIjmw01jBiwzizoiLkcnhlDkFFR0f
  25. EMSQ==
  26. MIME-Version: 1.0
  27. Received: by 10.224.176.201 with SMTP id bf9mr583304qab.80.1350648059201; Fri,
  28. 19 Oct 2012 05:00:59 -0700 (PDT)
  29. Received: by 10.49.87.71 with HTTP; Fri, 19 Oct 2012 05:00:58 -0700 (PDT)
  30. In-Reply-To: <CAAhuQpNgR15GE1U2PVbGwZ1GqTXJEK3fMeBG84s69eq_WY5g2w@mail.gmail.com>
  31. References: <[email protected]>
  32. <CAAhuQpNgR15GE1U2PVbGwZ1GqTXJEK3fMeBG84s69eq_WY5g2w@mail.gmail.com>
  33. Date: Fri, 19 Oct 2012 21:00:58 +0900
  34. Message-ID: <CAAhuQpMSzb=Pykecs-9dWsazepnYkhYRs1Lyoq+4uv+11V87Rg@mail.gmail.com>
  35. Subject: Re: wepawet
  36. From: =?ISO-2022-JP?B?GyRCJSIlSSVqJSIlcyVYJXMlSSVqJUMlLxsoQg==?= <[email protected]>
  37. To: Marco Cova <[email protected]>
  38. Content-Type: multipart/mixed; boundary=20cf30334e41c907e004cc6841b6
  39.  
  40. Hello Mr. Cova,
  41.  
  42. Allow me to report the obfuscation that cannot be cracked well by wepawet.
  43. The infected files contains the obfuscated JavaScript is as per attached
  44. index.html.zip/pass: infected.
  45.  
  46. It is an obfuscation of the Pseudorandom JavaScript which is currently used
  47. by some Exploit Kit malware infectors as per described
  48. here<http://malwaremustdie.blogspot.jp/2012/10/fuzzy-in-manual-cracking-of.html>
  49. But this time this "thing" was obfuscated 2 times, get packed one time
  50. (with what so-called JS/Packer that often being used by these malware
  51. makers) and get obfuscated again.
  52.  
  53. The result of the current scan is as per below url in wepawet:
  54. http://wepawet.iseclab.org/view.php?hash=000bcb872c056f3702e80cab6dbbfeb6&type=js&t=1350578657
  55.  
  56. Interesting part of it was the message shown in the result as per pasted
  57. below:
  58. ===============================
  59.  
  60. Malware
  61.  
  62. *No additional malware was retrieved.*
  63. ================================
  64.  
  65. ↑ the above statement is wrong, we received the exploit kit payload as per
  66. desribed in our blog, the messages can make other developer thinks a non infected
  67. page... Please fix the wepawet logic regardingly.
  68.  
  69. ---------------
  70. @unixfreaxjp
  71. #MalwareMustDie!
  72. http://malwaremustdie.blogspot.jp
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement