Translate

Posts mit dem Label Luxembourg werden angezeigt. Alle Posts anzeigen
Posts mit dem Label Luxembourg werden angezeigt. Alle Posts anzeigen

4/04/2014

POTENTIALLY SUSPICIOUS Advertiser:
Several HIDDEN IFRAME(s) @ www.123website.lu (IP: 194.36.0.218) W32.HfsIframe
DENMARK & LUXEMBOURG




POTENTIALLY SUSPICIOUS AD:

HIDDEN IFRAME(s) (SEE SCREENSHOT) AND DETAILS:


Just some of the Hidden IframeS (SCREENSHOT)
DOMAIN:

http://www.123website.lu/
  • https://www.virustotal.com/de/url/a03823518f3671592887260096bec16c1b1d5d79edabf13876494abf6bdbc169/analysis/1396635445/
W32.HfsIframe
  • https://www.virustotal.com/de/file/869d5dbd685251eb3d0e81b63ddf38a3ed677aa4f0c58e8fe645f6f188282980/analysis/1396636218/

AD-LINK:

  • http://www.googleadservices.com/pagead/aclk?sa=L&ai=CY1txnNU-U9_pDYuO7ga4toGYCO6FoJEE_sWnpm_AjbcBEAEgjsCUI1CutKrh-P____8BYLsDoAHi_KLfA8gBAakC8_NBOZOpiD6oAwHIA8MEqgSCAU_Qxzwdn7KWqRkRgEqP-T0vCCDpT44e1v2EMEWMlPZmGtNUjbWFauJ31RkoXcGUlHrSZW_S7lahvV8xTs9rTzDbpLJs1QWIAuWqGJxA1QTGIVvK1tUjAWhTVMBe2_JSVODMNpQ2hgAlPgJElHizxqeOTvCIxGeWCptETkwcW4cMOCCIBgGAB4aD3SA&num=1&cid=5GjjiwBrtH0oojSrRRBwcn6u&sig=AOD64_2c2xtAyodTjj5mcs8xvK-DC8EBoA&client=ca-pub-5585202032329389&adurl=http://www.123website.lu/pages/receive.aspx%3Fpartnerkey%3Dlugoogle:EUR_LU_DE_Display_Website_Unspecified%26target%3Dftp3:crea%26culturekey%3Dde-LU&nm=28&mb=2&bg=!A0TdBD8XrW8UnQIAAABMUgAAABQqAOF0Oumc1QQKA-9W_LeBTiOCxun8ZxWfdRem_F0bW-qK-wC960UMEfC8AcaJisf20I4gWBiWGSkXF5gxXUkhw8X3-3kBqNjIBeysSTArHdQiCF2sWtlU5vK5EoFhweYlm8ndXrGDG3Grtu4c04Bh-tMRVBo4Q4vx7-4w4z_jhfgIEF3W9zdNxC2J38p3j4YNT9afqougU3fgvWsg-9kWtG-eA9flGkBJx_eZp0EHZW8X4riKOV3mB-zd8MSr51EvB3WkFoZ2vO712pj4NQIfzPAC4Eb3nN_ffhvaUlqqTfzhoR8


VT ANALYSIS:

  • https://www.virustotal.com/de/url/56a610f0efb79b3cd860e31539a63842561f7815b80d74f17c192178d31d5342/analysis/1396634713/
W32.HfsIframe
  • https://www.virustotal.com/de/file/e0330f31fefdb10b055254a29d50485550861431465106f1ba0c00e31392bae2/analysis/1396634933/
  • https://www.virustotal.com/de/file/7db994d76f40d736213871786c4a2649e4bfe11375b778666efade39256b92df/analysis/1396635163/

IFRAME: <--- iframe src="//www.googletagmanager.com/ns.html?id=GTM-2MMH"height="0" width="0" style="display:none;visibility:hidden" --->

URL after Redirect:
http://www.123website.lu/pages/receive.aspx?partnerkey=lugoogle:EUR_LU_DE_Display_Website_Unspecified&target=ftp3:crea&culturekey=de-LU
  • https://www.virustotal.com/de/url/191f4624274d721cf7e96e4dbfc3eeaf7563aea0444baec0bef3c6c1c6169385/analysis/
W32.HfsIframe
  • https://www.virustotal.com/de/file/ed8c114ffafcfa4b2d80a3168f285e277692a0bd5374af60fbb642c6db987d77/analysis/1396635893/
IP:
http://194.36.0.218/
  • https://www.virustotal.com/de/url/b049d416dee632649e02a94fe72d79be607f7437547f3a5811bfe51b26041ce6/analysis/1396636806/
  • https://www.virustotal.com/de/ip-address/194.36.0.218/information/

1/18/2014

Hoax.Win32.ArchSMS.udj
anonymousdelivers.us
(LUXEMBOURG)


MALICIOUS SITE & DOWNLOADS: SMS-MALWARE

anonymousdelivers.us
  • https://www.virustotal.com/de/url/03de0a668ec42d07702ff9a0ae92e2ab6c33ff615b21258a1123a7eed1cbd0e9/analysis/1390056718/
MALICIOUS LINK:

anonymousdelivers.us/uploads/cedf02628adb80ac4c496f46eeb8dd54.exe/Steam.exe
  • https://www.virustotal.com/de/url/f5055ce00998776507d164e26f181ac7244f2f6952be5d7f77a36bba62b70f14/analysis/1390054480/
Hoax.Win32.ArchSMS.udj
  • https://www.virustotal.com/de/file/96fe4b020bee2580a0d75fd22224bb0e29faed4a0268fa23a6a9a4561bd80a7e/analysis/1390038437/
-----------------------

IP: 


94.242.228.95
  • https://www.virustotal.com/de/url/9fd0f6ccb7fd0abc7944e7be469985fcb0d16f2e456efe93fbfa1f8715dab625/analysis/1390055364/
-----------------------

LISTED AT hpHOSTS:
  • http://hosts-file.net/?s=anonymousdelivers.us
-----------------------

SEE ALSO: 
 
  • http://app.webinspector.com/public/reports/19544566
  • http://zulu.zscaler.com/submission/show/9202a0de6ce8ca392949aa4d7f411f22-1390054501
  • http://threatlog.com/search/anonymousdelivers.us/domain/
  • http://www.browserdefender.com/site/anonymousdelivers.us/
  • http://safeweb.norton.com/report/show?url=anonymousdelivers.us
  • http://www.urlvoid.com/scan/anonymousdelivers.us/
  • https://www.virustotal.com/de/ip-address/94.242.228.95/information/



11/26/2013

Symantec:
Blackshades Remote Access Tool (RAT) still being bargained

Cybercriminals are increasingly using the Blackshades Remote Access Tool (RAT), a malicious program whose source code was leaked three years ago, according to an analysis by Symantec.


Santiago Cortes, a security response engineer at Symantec, wrote in a blog post, that Blackshades, which Symantec identifies as W32.Shadesrat”, has been infecting more MS Windows computers and is being controlled by many hundreds of CnC Botnets worldwide, despite the alleged arrest of Michael Hogue (a/k/a “xVisceral,”) in June 2012, the author who wrote the malicious code (program, tool).



As already mentioned, Blackshades is a Remote Access Tool (RAT) that collects usernames and passwords for email and/or Web services, Instant Messaging applications (like ICQ), FTP clients and many more. It has been sold on Black Hat Forums since at least 2010.

It’s common for hackers to use RAT’s, which can be used to upload other Malicious Software to a computer or to destroy and manipulate files. To avoid AV-Software, the program itself is often frequently modified, that is why a Malware Variant changes its name in the eyes of AV-Softwareanalytics, for instance this file is called W32.Shadesrat.C, usually means (like in this case), it’s the 3rd (A,B,C) modified (Variant) or, Generation, if you want so.

In his post, Cortes mentions that Lithuania and the United States have the highest number of command-and-control servers. Mostly all of those "Servers" have hosted exploit kits at some point in time, a type of baited trap that delivers additional malware to CPU’s with software vulnerabilities (don’t forget to update). Referring to Blackshades, Cortes says, that India, the U.S. and the U.K. have the most computers infected with this RAT.

Cortes writes:

“The distribution of the threats suggests that the attackers attempted to infect as many computers as possible, the attackers do not seem to have targeted specific people or companies.”

Earlier this year, Symantec articled in a blog that a license to use Blackshades may cost around $40 to $100 a year.


To this graph, i’d like to point out to 2 earlier Posts of Malicious IPs , that likely shows how involved the small country Luxembourg, in the heart of Europe, is, inbetween Malicious Activity:


Symantec wrote as well that Blackshades had been promoted on underground forums by a person going by the nickname “xVisceral,”


In June 2012, the U.S. Attorney’s Office for the Southern District of New York announced the arrest of Michael Hogue (Rogue?) in Tucson, Arizona. Hogue was arrested with 23 others in a “carding” scheme, which involved trafficking in financial details.


FBI Article: Two-Year FBI Undercover “Carding” Operation Protected Over 400,000 Potential Cyber Crime Victims and Prevented Over $205 Million in Losses

He was charged with conspiracy to commit computer hacking and distribution of malware.

11/24/2013

Category MALICIOUS IP: 80.92.67.155
(Trojan) Heuristic.BehavesLike.Win32.Suspicious.H

The IP Address 80.92.67.155 (IP LOCATIONLuxemburg) is listed in the CBL (Composite Blocking List). It appears to be infected with a spam sending trojan, proxy and/or some other form of botnet. Specific Malware that has been Found: Heuristic.BehavesLike.Win32.Suspicious.H . This Malicious File stood under communication with the Malicious IP. See 80.92.67.155 IP address information at VT for additional information.

Last detection: 20/11/2013 @ CBL

IP 80.92.67.155 is also listed at Spamhaus.org
IP 80.92.67.155 has 66 Bad Host appearances in Spam E-mail or Spam Post URLs

Other information on this IP:


Other Remarkable Detections on this IP:



SCREENSHOT




RELATED POST: Symantec: Blackshades Remote Access Tool still being bargained

11/20/2013

Category MALICIOUS IP: 94.242.204.74
Worm:Win32/Boinberg (CnC Botnet)

The IP Address 94.242.204.74 (IP LOCATION: Luxemburg) is listed in the CBL (Composite Blocking List). It appears to be infected with a spam sending trojan, proxy and/or some other form of botnet. It was last detected on 19th November 2013. It has been relisted following a previous removal on 12th November.

This IP address is infected with, and/or is NATting for a machine infected with the Worm.Boinberg. This Worm:Win32/Boinberg is part of the Malware-family of IRC-controlled worms that may be ordered to spread via Windows Live Messenger (ICQ, AOL Instant Messenger, Yahoo Pager, Skype, etc.) and/or USB drives. It may also spread through USB drives, RAR and ZIP files by adding a copy of itself into the target archive. Its first detection has been made in March 2011, and the threat level almost 4 years later is classified as severe. In order to spread, IM-Worms usually send a link (URL) to a list of message contacts. The link leads to a network resource where a file containing the body of the worm has been placed. This tactic is almost exactly the same as that used by Email-Worms.


This Worms Aliases by AVVendors:
  • Malware.Shadesrat (PCTools)
  • W32.Shadesrat (Symantec)
  • Backdoor.Win32.IRCBot.abgt (Kaspersky Lab)
  • W32/IRCbot.gen.a (McAfee)
  • Mal/VBCheMan-A (Sophos)
  • Worm:Win32/Boinberg (Microsoft)
  • Worm.Win32.Boinberg (Ikarus)
And not to forget that it is packed UPX (Ultimate Packer for eXecutables)
-----------------------------------------------------------------------------

It`s Installation:

When executed, Worm:Win32/Boinberg copies itself with a variable file name to the %APPDATA% directory, then executes this dropped copy.

The malware creates the following registry entries to ensure that its copy executes each Windows start:

In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "<random string>"
With data: "%APPDATA%\<random file name>.exe"

In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "<random string>"
With data: "%APPDATA%\<random filename>.exe"

In the background, the worm injects itself into known Windows running processes, such as 'winlogon', 'svchost' and 'Explorer'.

The following mutex indicates the presence of the worm on the affected computer:

"__PDH_PLA_MUTEX__"
"<random string>"
"<empty / blank>"

Spreads via...

Instant messenger

The worm may send messages to the affected user's Windows Live Messenger contacts containing a URL pointing to the worm, or an attachment containing a copy of the worm.

Removable drives

Worm:Win32/Boinberg copies itself to the following locations on removable drives:

<targeted drive>:\<malware file>.exe
<targeted drive>:\autorun.ini - detected as Worm:Win32/Boinberg

It attempts to download an updated version from a remote server and spread this latest copy via removable drive.

It also places an autorun.inf file in the root directory of the targeted drive. Such autorun.inf files contain execution instructions for the operating system (OS), so that when the removable drive is accessed from another computer supporting the Autorun feature, the malware is launched automatically.

File infection 

It searches for RAR and ZIP files on the system and, if found, infects them by adding a copy of the worm into the target archive file. This may enable the worm to spread itself through file sharing or emailing.

IMPORTANT: PAYLOAD...

...allows backdoor access and control

Worm:Win32/Boinberg attempts to connect to an IRC server and join a channel to receive commands.

The following is a list of servers and TCP ports that Worm:Win32/Boinberg has been observed to use in this manner:



For more details on this Worm, visit Microsoft here.
-------------------------------------------------------------
The CBL detection is being made using sinkholing techniques.

To find an infected computer on a NATted network you will have to search through your firewall logs for connections to port 4042 TCP. In additional, evidence can be found in DNS logs by searching for the domain name "hi5fotos.info", for example:

cash.hi5fotos.info
xsi.hi5fotos.info
kkk.hi5fotos.info

This was detected by a TCP/IP connection from 94.242.204.74 on port 56501 going to IP address 87.255.51.229 (the sinkhole) on port 4042.

The botnet command and control domain for this connection was "hi5fotos.info".

Behind a NAT, you should be able to find the infected machine by looking for attempted connections to IP address 87.255.51.229 or host name hi5fotos.info on any port with a network sniffer such as Wireshark.

Equivalently, you can examine your DNS server or proxy server logs to references to 87.255.51.229 or hi5fotos.info. See Advanced Techniques for more detail on how to use Wireshark & ignore the references to port 25/SMTP traffic, the identifying activity is NOT on port 25.

This detection corresponds to a connection at 2013-11-19.

These infections are rated as a "severe threat" by Microsoft. It is a trojan downloader, and can download and execute ANY software on the infected computer, so better stay Awake. ;-)

RELATED POST: Symantec: Blackshades Remote Access Tool still being bargained