Translate

11/24/2013

Category MALICIOUS IP: 80.92.67.155
(Trojan) Heuristic.BehavesLike.Win32.Suspicious.H

The IP Address 80.92.67.155 (IP LOCATIONLuxemburg) is listed in the CBL (Composite Blocking List). It appears to be infected with a spam sending trojan, proxy and/or some other form of botnet. Specific Malware that has been Found: Heuristic.BehavesLike.Win32.Suspicious.H . This Malicious File stood under communication with the Malicious IP. See 80.92.67.155 IP address information at VT for additional information.

Last detection: 20/11/2013 @ CBL

IP 80.92.67.155 is also listed at Spamhaus.org
IP 80.92.67.155 has 66 Bad Host appearances in Spam E-mail or Spam Post URLs

Other information on this IP:


Other Remarkable Detections on this IP:



SCREENSHOT




RELATED POST: Symantec: Blackshades Remote Access Tool still being bargained

Almost 2 Years Ago: Ex-Marine tries to sell Sensitive Military equipment on EBay !

Stumbling over this article. Almost numb:

A recently retired Marine was arrested and arraigned Monday on four counts of attempting to sell sensitive military laser light filters on EBay and ship them overseas, federal authorities said. He pleaded not guilty.




Sean Elias Sayegh, 41, of Rosamond is charged with four counts of making false statements on customs forms in his attempts to ship more than 100 laser light interference filters abroad between December 2009 and February 2010.  U.S. attorney spokesman Thom Mrozek declined to say where the filters were headed but said an undercover investigation led authorities to Sayegh.  

Sayegh worked in the Marine Aviation Supply Office as a staff sergeant at Edwards Air Force Base until his retirement from the Marine Corps in December 2011. Assistant U.S. Atty. Bill Crowfoot would not say if Sayegh procured the filters during his time in the service but confirmed that the alleged wrongdoing occurred during Sayegh’s time in uniform.





“The concern we have to have is that there’s a demand for these things by people whose interests are hostile to the United States,” Crowfoot said. “Irrespective of where somebody intends something to go, it might not end up where they intend.”

Authorities opened a probe into Sayegh after receiving a tip about the possible sale of the light filters on EBay. According to the indictment, Sayegh falsely stated that his packages contained camera lenses, filters and other equipment, when in reality they contained the laser light filters. 

Officials say the sophisticated lights cannot legally be exported without a license from the State Department. The filters, which protect the optics inside night vision goggles from being damaged by lasers, are considered sensitive enough that the military requires that they be destroyed after use. Crowfoot could not comment on the online price of filters, citing the ongoing case; but on Monday, similar filters were selling on EBay for less than $40 a piece.

Sayegh faces a maximum sentence of 20 years in prison, as well as a maximum $1-million fine. He is due back in court March 26.

Source: LATimes

Spam Site: www.ratgeberplatz.com
Germany

English:

www.ratgeberplatz.com is a Spamdomain. Just delete those mails. Do not click "unsuscribe Newsletter". If you do so, they only will register that you have read the Mail, and Spamming will become worse ! See Screenshot.

Related article/Verwandter Artikel:

Für Deutsche Leser:

www.ratgeberplatz.com ist eindeutig eine Spamdomain. Diese Mails sollte man getrost löschen. Bloss nicht auf "Newsletter abbestellen" klicken. Das einzige was anschliessend geschieht, ist dass sie von dieser Domain noch mehr Spam geschickt bekommen, da sie durch ihren Klick sich preisgegeben haben, und nun weiss, dass sie die E-Mail gelesen haben ! Siehe Screenshot.


Hi ,
Lena (19 Jahre) hat dir eine neue Flirt-Nachricht gesendet.
Um diese zu lesen, musst du dich kurz anmelden (Dauer: 2 Minuten).

Klick hier:
www.ratgeberplatz.com/tracker.php?id=

- Natürlich vollkommen kostenlos
- Unverbindlich
- Sofort Frauen treffen

Viel Spaß,
dein Flirt-Team

Impressum: Die Email wurde versendet durch die Address Data Corporation
mit Sitz in 5348 Vegas Dr., Las Vegas, NV 89108, USA. Sie erhalten diesen
Newsletter, weil Sie sich bei einem Gewinnspiel unserer Partner eingetragen haben.
Für den Inhalt der Email ist ausschließlich der Werbekunde verantwortlich.

Bei Beschwerden erreichen Sie uns unter complaint@address-data.net
oder telefonisch unter 001(702)799-9912

Die Werbeeinwilligung ist rechtsgültig und nachweisbar.
Abmelden können Sie sich, in dem Sie auf den folgenden Link klicken:



IF YOU RECEIVE THIS KIND OF SPAM FROM www.ratgeberplatz.com DELETE IT 
DIESEN SPAM KANN MAN GETROST LÖSCHEN !

Header Analysis Quick Report
Originating IP: 13.10.25.20
Originating ISP: Xerox Corporation
City: Norwalk
Country of Origin: United States
* For a complete report on this email header goto ipTRACKERonline

11/23/2013

Analysing Riskware I (Turbo Tool: RegCure Pro)
"It found 18906 problems which it fixed...."



Whenever, wherever you read in forums, blogs or communities about "Tuning Apps", "Boosting Tools" and several other definitions, there is seldom someone who does not mention:
"If you do not have the knowledge about that what you`re doing with that Tool, just leave it, because it is likely that you will damage your System." 
If you trust what those (mostly kind of rogue software, but of course not all) Programs you advise what belongs on your System and what not (especially as a newbie), its your own fault, when your PC gets sicker that promised CURE. I will start with this RegCure Pro(gram), as they claim themselves as a "Microsoft Partner".



Sounds & Looks like theyre old buddies, or kindergarden Pals.

Some Cute Links about its Reputation:

- MyWOT/regcure

- Is Reg Cure Pro a microsoft partner I should use and is it free ?

-  This one is the Best, it kept me ROFLing all Day Long: Disaster with RegCure registry cleaner: It found 18906 problems which it fixed....

I Bet after Fixing almost 19.000 "Problems", that guy in 2007 had to buy a new processor !

However, as i always tend to say: "As long as youre not knowing what the Tool will "do", you should not consider to do it "too" (in acknowledging it).

Sounds like Nike.

Period.

Part I: Just One good reason, why fixing (deleting) those Sys32 Keys...?

ANALYSING PROGRAM:

RegCure Pro

THE FOLLOWING FILES/REGISTRY/KEYS RegCurePro IS WILLING (PROPOSES) TO DELETE, CALLING IT A SYSTEM PROBLEM, EVEN BETTER, CLASSIFYING IT AS A SECURITY RISK:

#1:

RegKeyValue:
HKEY_CLASSES_ROOT\AppID\3382ACA0-42A8-4aad-8035-E12CB03DC0EE

#2:

RegKeyValue:
HKEY_CLASSES_ROOT\CLSID\{C53E5AAF-5F6F-41c2-9F63-ADEBBC9B6B64}\AppID={0B814D20-6161-496f-9002-1539ED2F87CD}

#3:

  • OptPCEE3Prop.DLL
  • MD588BB9530ECF82B6901C163696956A839
  • Publisher: Dolby Laboratories, Inc.
  • Product: Dolby PCEE3 Property Page (32 bit)
  • File Location: C:\Windows\System32
  • No Certificate
RegKeyValue:
HKEY_CLASSES_ROOT\Wow6432Node\AppID\OptPCEE3Prop.DLL

#4:

RegKeyValue:
HKEY_CLASSES_ROOT\CLSID\{8E93A1B1-8EF0-42e9-AC76-D2CA4CF28681}\AppID={3382ACA0-42A8-4aad-8035-E12CB03DC0EE}

Screenshots:





Story will continue...

#5: Part II

11/22/2013

Popular Leicester pub 'The Globe' forced to close after false
anti-military Facebook rumours: Man arrested !

...nothing more important to investigate ( f.ex.: The 3 Slaved Women who have been rescued ) , you have to question this all alone by yourself.

Detectives investigating an offence of malicious communication have arrested a man in connection with the incident. 
The 20-year-old man has been arrested on suspicion of malicious communications against the Globe Public House in Leicester
He has since been released on police bail pending further enquiries. 
In August 2013 police began an investigation after threats were received towards the management at the Globe in Silver Street, Leicester following social media posts claiming the establishment was not allowing military personnel to enter the premises as it was upsetting their customers.
Now this i read a couple of hours ago, and asked myself here, what its all about.

What to the Core is: offence of malicious communication
And what does on suspicion of malicious communications mean

I found out afterwards what its all about:


A popular pub in Leicester was forced to close (in August 2013) amid fears of violent reprisals after its Facebook page was hacked and a message was posted claiming it had banned military personnel.

The false posting, which claimed the pub had enforced the new scheme for fear of upsetting ‘local non British citizens’, was picked up by a nationalist blog and led to the pub being flooded with a storm of allegedly abusive phone calls from people who believed the claim.

The owners of The Globe on Silver Street was forced to shut their doors down on August 17th while security staff were brought in. Leicestershire Police were starting Investigation to an offence of malicious communication.


Everards managing director, Stephen Gould, told the BBC:
"We were placed in a position that throughout the day our staff had to respond to very aggressive people obviously believing that the policy was true.""Ourselves and the manager will have to monitor that very, very carefully over the coming days."
Gould added:
"We have no idea why The Globe was targeted but we will be working with police to find out why this happened."
The pub stated on its Twitter feed:
"The globe has been the victim of a malicious and false news story which states we are no longer servin military personnel. This is false. This pub never has and never will adopt a policy towards the service of either current or ex-military personnel. We understand the delicate nature of this situation and we would sincerely ask for people to stop making threats towards the pub or its staff."
Now, after they arrested a person of interest, i would like to know as well, WHY he did this !

But after the year 2013 will close with all those Leaks, Espionage etc. i guess this could get classified as "TOP SECRET", especially because this Incident was ment against Military Personnel. Lets hope the story continues.

MUSKATNUSS

Something for the funny ones.

Some Like it, most don`t. Nutmeg ! The german term is Muskatnuss, MUSKATNUSS ! And if you remember Louis de Funès, you`ll love this one. I Bet Herr Müller !!

CLICK HERE TO SEE THE VIDEO ON YOUTUBE: MUSKATNUSS !


11/21/2013

419 SCAM OF THE DAY: 41.138.97.161
(Mrs. Linda Adama from Burkina Faso)

Mrs. Linda Adama from Burkina Faso wrote:

"Dear Friend,
Greetings to you and your family; However, it's just my urgent need for foreign partner that made me to contact you for this transaction. I work in Bank of Africa foreign department. I want to place your name as the beneficiary to Ten Million Five Hundred Thousand United States Dollars (USD10.5M).
The said funds is right here in the bank, it's the balance deposited funds by one of our late customer from France Mr. Paul Louis Halley since then nobody has come up for the claim. Therefore, I solicit for your cooperation to collaboration with me to have this done; it will be transferred into an account you will provide any where of your choice.
If you are interested, please send me your full contact information as below and thereafter I will send to you text of application form to apply for the fund next of kin (Beneficiary). "
Expecting your urgent reply!
1. Full name:.........
2. Current Address:.........
3. Telephone N=B0:...........
4. Occupation:.............
5. Copy of your identity...
6. Age:............
7. Country:........
          Yours trulyMrs. 
          Linda Adama

Screenshots:




Malicious IP:      41.138.97.161

Spamhaus.org
Dictionary Attacker & More
- Reputationauthority.org
- LOOK UP


Header Analysis Quick Report
Originating IP: 41.138.97.161
Originating ISP: Onatel/fasonet's
City: n/a
Country of Origin: Burkina Faso
* For a complete report on this email header goto ipTRACKERonline

DotBigBang.org ! The Internet is Changing Forever...
Will Fraudsters profit from the upcoming revolutionary change ?

Over the next year, the Internet Corporation for Assigned Names and Numbers (ICANN) will introduce over 1000 new, industry-specific Top Level Domains (TLD) to the internet addressing system. The new top-level domain extensions will act as alternative options to .COM or .NET. New domain extensions will be created in many categories including .Brands (.google, .netflix, .gucci), .Cities (.NYC, .London, .Berlin), professions (.doctor, .law, .cpa), interests (.art, .fashion, .cars) and more.



The purpose of DotBigBang.org is to raise awareness and educate consumers about this revolutionary change to the internet addressing system. Goals are to minimize harm, maximize benefits and help create a smoother transition to a new dot-anything internet environment. The approach is to create an engaging and relatable message to enhance consumer knowledge in the short window of time before new .addresses emerge online.


About New Dot Media

New Dot Media is a Utah, USA company focused on ICANN New Top-Level Domains. New Dot Media principles are to raise awareness, facilitate understanding, minimize confusion, reduce harms, increase benefits, and accelerate adoption and use of New Top Level Domains.


A principle concern for introducing new top-level domains to the world wide web was the potential for consumer confusion and possible harm that may result out of it. Users will be unfamiliar and disorientated with the first new dot-addresses, and will have difficulty identifying and/or recognizing new web addresses as they appear online. There is also an anticipated increase in frequency and variety of methods used by fraudsters that consumers should be on the lookout for.

"The Dot Big Bang is a transformative event that will change how internet users navigate the web and interact with the world around them," states New Dot Media TLD-Vangelist-in Chief Tom 'Not-Com Tom' Gilles. "Our aim is to help make the transition a smooth one."



The DotBigBang.org approach uses terms and phrasing that most internet users and consumers can relate to and understand today, as opposed to introducing new vocabulary and new views. It is believed this path will assist in reaching the largest audience, and have the most effective bang on user understanding.

DotBigBang.org contains detailed articles explaining aspects of the .address expansion in simple, understandable terms and easy interpretation.

There are also specific user guides tailored specifically for consumers, parents, website owners, small business, professionals and trademark owners. How do you see it.....????? This will make the all complex system of today, more complicated FOR the Future. Some may say later: "Back to the Future"...



Sexiest Man Alive 2013: Secure ? Adam Levine (MAROON 5)

Yes he is (and i am not gay !). Adam Levine (Maroon 5) catched me with his Voice from the very beginning with that first "Bestseller" First Love, recognizable in every aspect.



I`d prognose, that (MAYBE, keeping it left to the Wild) in a few years, Ryan Tedder, Leadsinger of One Republic will possibly end this way as well (as i said: in a few years, and MAYBE, no Very Possibly).

Their latest song (Something i need (Who does not need something) is a predictable forthcoming (just like the last couple of songs), always including Gospel Music alike...



OMG. I realize now, that the older you get, the faster time evades...Just like those old days Music Tapes. When the tape starts, you think "how slowly it (life) turns". The further you come to the end, the quicker it runs.

Sounds like life...to me at l(e)ast. We will see...

11/20/2013

Category MALICIOUS IP: 94.242.204.74
Worm:Win32/Boinberg (CnC Botnet)

The IP Address 94.242.204.74 (IP LOCATION: Luxemburg) is listed in the CBL (Composite Blocking List). It appears to be infected with a spam sending trojan, proxy and/or some other form of botnet. It was last detected on 19th November 2013. It has been relisted following a previous removal on 12th November.

This IP address is infected with, and/or is NATting for a machine infected with the Worm.Boinberg. This Worm:Win32/Boinberg is part of the Malware-family of IRC-controlled worms that may be ordered to spread via Windows Live Messenger (ICQ, AOL Instant Messenger, Yahoo Pager, Skype, etc.) and/or USB drives. It may also spread through USB drives, RAR and ZIP files by adding a copy of itself into the target archive. Its first detection has been made in March 2011, and the threat level almost 4 years later is classified as severe. In order to spread, IM-Worms usually send a link (URL) to a list of message contacts. The link leads to a network resource where a file containing the body of the worm has been placed. This tactic is almost exactly the same as that used by Email-Worms.


This Worms Aliases by AVVendors:
  • Malware.Shadesrat (PCTools)
  • W32.Shadesrat (Symantec)
  • Backdoor.Win32.IRCBot.abgt (Kaspersky Lab)
  • W32/IRCbot.gen.a (McAfee)
  • Mal/VBCheMan-A (Sophos)
  • Worm:Win32/Boinberg (Microsoft)
  • Worm.Win32.Boinberg (Ikarus)
And not to forget that it is packed UPX (Ultimate Packer for eXecutables)
-----------------------------------------------------------------------------

It`s Installation:

When executed, Worm:Win32/Boinberg copies itself with a variable file name to the %APPDATA% directory, then executes this dropped copy.

The malware creates the following registry entries to ensure that its copy executes each Windows start:

In subkey: HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "<random string>"
With data: "%APPDATA%\<random file name>.exe"

In subkey: HKLM\Software\Microsoft\Windows\CurrentVersion\Run
Sets value: "<random string>"
With data: "%APPDATA%\<random filename>.exe"

In the background, the worm injects itself into known Windows running processes, such as 'winlogon', 'svchost' and 'Explorer'.

The following mutex indicates the presence of the worm on the affected computer:

"__PDH_PLA_MUTEX__"
"<random string>"
"<empty / blank>"

Spreads via...

Instant messenger

The worm may send messages to the affected user's Windows Live Messenger contacts containing a URL pointing to the worm, or an attachment containing a copy of the worm.

Removable drives

Worm:Win32/Boinberg copies itself to the following locations on removable drives:

<targeted drive>:\<malware file>.exe
<targeted drive>:\autorun.ini - detected as Worm:Win32/Boinberg

It attempts to download an updated version from a remote server and spread this latest copy via removable drive.

It also places an autorun.inf file in the root directory of the targeted drive. Such autorun.inf files contain execution instructions for the operating system (OS), so that when the removable drive is accessed from another computer supporting the Autorun feature, the malware is launched automatically.

File infection 

It searches for RAR and ZIP files on the system and, if found, infects them by adding a copy of the worm into the target archive file. This may enable the worm to spread itself through file sharing or emailing.

IMPORTANT: PAYLOAD...

...allows backdoor access and control

Worm:Win32/Boinberg attempts to connect to an IRC server and join a channel to receive commands.

The following is a list of servers and TCP ports that Worm:Win32/Boinberg has been observed to use in this manner:



For more details on this Worm, visit Microsoft here.
-------------------------------------------------------------
The CBL detection is being made using sinkholing techniques.

To find an infected computer on a NATted network you will have to search through your firewall logs for connections to port 4042 TCP. In additional, evidence can be found in DNS logs by searching for the domain name "hi5fotos.info", for example:

cash.hi5fotos.info
xsi.hi5fotos.info
kkk.hi5fotos.info

This was detected by a TCP/IP connection from 94.242.204.74 on port 56501 going to IP address 87.255.51.229 (the sinkhole) on port 4042.

The botnet command and control domain for this connection was "hi5fotos.info".

Behind a NAT, you should be able to find the infected machine by looking for attempted connections to IP address 87.255.51.229 or host name hi5fotos.info on any port with a network sniffer such as Wireshark.

Equivalently, you can examine your DNS server or proxy server logs to references to 87.255.51.229 or hi5fotos.info. See Advanced Techniques for more detail on how to use Wireshark & ignore the references to port 25/SMTP traffic, the identifying activity is NOT on port 25.

This detection corresponds to a connection at 2013-11-19.

These infections are rated as a "severe threat" by Microsoft. It is a trojan downloader, and can download and execute ANY software on the infected computer, so better stay Awake. ;-)

RELATED POST: Symantec: Blackshades Remote Access Tool still being bargained

11/19/2013

Google & Microsoft announce to combat together against Online Child Porn

Google and Microsoft announced today (November 18th 2013) that they will introduce new software controls aimed at reducing the distribution of child pornography online. Eric Schmidt, Executive Chairman of Google, announced today that the Multi-Business-Concern Google in Cooperation with MS will roll out new Control(ed)-Software designed to curb child porn searches on the Google Searchengine(s).
 


In a joint announcement, both Companies have introduced on the British summit on Internet safety 2013, a software that makes it harder for Pedophiles, Sadists and wannabe`s to search for child abuse material online.



Writing ahead of that British summit on Internet safety, Google's executive chairman Eric Schmidt said his company has fine-tuned Google Search to clean up results for over 100.000 search terms in connection to child porn. When users (Pedophiles) type in queries that may be related to child sexual abuse, they will find no results that link to illegal content.

(My opinion: If this would be possible (and not only a trying promise), this would be one of the biggest breakthrough(s) in this disturbing and growing Internetcrime(s), that "kills" Children emotionally, for the rest of their lives, if they come away without killing after an sexual raping act).

Schmidt wrote in the Daily Mail newspaper: "We will soon roll out these changes in more than 150 languages, so the impact will be truly global". Globalization ?

The restrictions are being launched in the United Kingdom and other English-speaking countries first and similar changes are being brought out on Microsoft's Bing search engine (Where is YAHOO ?). The two companies are sharing picture detection technology to identify child abuse photographs whenever they appear on their systems, and Google is also testing technology to identify and remove illegal videos.


Other measures include warnings shown at the top of Google search for more than 13.000 queries to make it clear that child abuse is not only illegal but a crime indescribable. Schmidt acknowledged that no algorithm is perfect and Google cannot prevent pedophiles adding new images to the web. Maybe someday they will be able, on the long run. Campaigners welcomed the move but doubted how much impact the changes would bring. Pedophiles tend to share images away from the public search engines, they say...

Jim Gamble, the former chief of Britain's Child Exploitation and Online Protection Center said: "They don't go on to Google to search for images, they go on to the dark corners of the Internet on peer-to-peer websites."




Jim Gamble


According to a briefing issued by Mr. Cameron's office, changes to be introduced by the search engines include, but not limited :


- The introduction of new algorithms that will block child abuse images, videos and pathways that lead to illegal content, covering 100.000 unique searches on Google (Worldwide).

Stopping auto-complete features from offering people (...with Pedophilia disorder...), child abuse search terms.

- Google as well as Microsoft will now work with the National Crime Agency and the Internet Watch Foundation to bring forward a plan to tackle peer to peer networks featuring child abuse images.

Google will bring forward new technology that will put a unique identification mark on illegal child abuse videos, which will mean all copies are removed from the web once a single copy is identified or uploaded.

OTHER LINKS TO THIS TOPIC:
-  http://www.telegraph.co.uk/news/uknews/10457458/Google-New-technology-to-identify-child-abuse.html
http://www.fbi.gov/stats-services/publications/parent-guide
https://www.gov.uk/government/news/internet-safety-summit-at-downing-street-communique
http://www.theguardian.com/technology/2013/nov/18/uk-us-dark-web-online-child-abuse-internet

11/18/2013

Category MALICIOUS IP: 46.165.228.246
(Interception of a Rogue ad Campaign) with Thanks to Dancho Danchev

Another rogue ad campaign (Not to be confused with Advertising campaign) has been intercepted, attempting to trick users into installing the EzDownloaderpro PUA (Potentially Unwanted Application). Primarily relying on that catchy attitude “Play Instantly, Download Now” banners, the visual social engineering tactic of this campaign is similar to other PUA related campaigns that had previously profiled. Let’s take a look at this new rogue ad campaign, and provide relevant threat intelligence on the infrastructure behind it.



Domain  surveillance of some specific Redirects: 

Location Data: San Francisco
------------------------------------
superfilesdocumentsy.asia/v944/?a=1
  • https://www.virustotal.com/de/url/062d123c7599a52d5cd1c42edc8a6971c91ddfe2f336b1bac72860611b8f2702/analysis/1384701938/
PUA: not-a-virus:Downloader.Win32.AdLoad.fwz
  • https://www.virustotal.com/de/file/8567bc9279ca8e7c2be23bfb513eb285d662233bd8528416afb509faef14b389/analysis/1384701943/
IPs:
141.101.117.252 (Cloudflare)
  • https://www.virustotal.com/de/url/89163a510d694d5717eb5dcb88036e7366c96620f36aec26e62e879efeddbc9e/analysis/1384702693/
  • https://www.virustotal.com/de/ip-address/141.101.117.252/information/
141.101.116.252 (Cloudflare)
  • https://www.virustotal.com/de/url/5df0642b589152b807eeb5910b26fe8e9c8c2bf4415f9e3a437d8f5ad4836c37/analysis/1384703661/

------------------------------------------------------------------------------------------------------------------------

applicationscenterforally.asia/v944/?INm
  • https://www.virustotal.com/de/url/110f167f8b1a5c45cfa1531db3226a1b1bd00f191529b3a3e8c222b992a82df9/analysis/1384704601/
Application.Win32.InstalleRex.LL
  • https://www.virustotal.com/de/file/242c3638ad824d612d6ed91823671aaefb503a83f744d6d472d402595d720aac/analysis/1384704604/
  • http://urlquery.net/report.php?id=7774362
  • http://app.webinspector.com/public/reports/18450113
IPs:
108.162.197.34 (Cloudflare)
  • https://www.virustotal.com/de/url/43ee0d2d8d7a39dc1791a85ded58b26f566d60f704069ebeadd465d2ce13a6e7/analysis/1384705270/
  • https://www.virustotal.com/de/ip-address/108.162.197.34/information/
108.162.196.34 (Cloudflare)
  • https://www.virustotal.com/de/url/9f497a74dc2bd7ea5c115c98199212d5bbdbaa625b7e612d17144191b5cec29a/analysis/1384707723/
  • https://www.virustotal.com/de/ip-address/108.162.196.34/information/

------------------------------------------------------------------------------------------------------------------------ 

op.applicationscenterforally.asia/sspcQA/ssa/
  • https://www.virustotal.com/de/url/5311fc57b109651eb8e1a49d70a580881a9e23e7de21e5676f20c6c4df0cd92d/analysis/1384708370/
ADWARE/InstallRex.Gen
  • https://www.virustotal.com/de/file/18a813f5bc905194c727424a17e9b2578d7ee8d76d23804799934b3d76001436/analysis/1384708600/

 ------------------------------------------------------------------------------------------------------------------------ 

Other Domains connecting to the same IP 46.165.228.246 :

• amu.downurfiles.info
• downloadkeeper.info
• driveridentifier-download.com
• ezdownloadpro.info
• iframe.applicationsforentirey.asia
• iframe.applicationsforeveryy.asia
• iframe.filesaredirecty.asia
• iframe.filesareonliney.asia
• iframe.superfilesdatay.asia
• lp.ezdownloadpro.info
• lp.livetrafficall.info
• op.alllinuxapplicationsy.asia
• op.applicationsforcompletey.asia
• op.applicationsforentirey.asia
• op.applicationsforeveryy.asia
• op.bestfilesarey.asia
• op.bestfilesdatay.asia
• op.documentsguidey.asia
• op.documentssitey.asia

Domains who responded to 141.101.117.252:

• 2upl.com
• amu.domainforcompany.info
• andyrohr.com
• bookmarkspiral.com
• filecm.net
• hackstore.net
• happysky.heartbrea.kr
• icephoenixbot.com
• krazywap.ws
• octavis.net

Malicious Message Digest Algorithm 5s known to have been downloaded from 141.101.117.252:

MD5: fd4195ef1af7fb49a673633ed57b87ab
MD5: c0d9713acfc46c2a466a9de77292636d
MD5: d3119ed48cb5896d41aeae4b51f2667a
MD5: c6799f5425fbe038778c4c4a22b35a41
MD5: 840fa1e6c0f81f6da1a347ecb3b2db2e
MD5: c27d4537d24aa55df9837479da2ae111
MD5: c77fc69c7b96c53ce762b87c98831327
MD5: dce1c89d7a267b2a4ae925b5a387e5cd
MD5: a868964e1fe66e4a7638f46ba7844b52
MD5: 2acc54f86694e8d7674e8e1afff86aa1
MD5: 5f078de83a9ce3ee2d9d2fe174cd234c
MD5: 0426e6c1fe2aa8681c683428bb3d2dd7
MD5: efcd92d3be23e624bca2db8515f0df20
MD5: 30ac6dd3290ab3c9281e81c2cba2097e
MD5: 9b35dcacd42e6ba1c596a8bc0425d646

Domains who responded to 108.162.197.34:

• 4agent.info
• advancedchirocenter.com
• albertomolteni.altervista.org
• applicationscenterforally.asia
• asoiaf.westeros.org
• br.singlesfind.us
• buker.ru
• chaochui88.com
• client.ferocitybooter.net
• habbokekos.net
• hentaimate.com
• horny-locals.com
• img.b2bage.com
• onvideogames.net
• op.applicationscenterforally.asia
• papermashup.com
• pdiva.ro
• pinoyhideout.com.ph
• prestamosdinerolosangeles.com
• sdx.cc

 -------------------------------------------------------------------------------



The following File has been downloaded from 108.162.197.34 :
Download.exe 

REFERENCE & Regards to Dancho


11/13/2013

The Virus: DEADBABE.SC.Replicator
(In Memory to Peter Szor)

DEADBABE is a Malicious Virus (Win32) whos first appearence was catched "in the Wild" 2007 in Denmark.

It stays resident in memory and infects all EXE files that are executed. The virus does not activate in any way. It  is named after it's "are-you-there" call: it calls INT 6Bh with hex value BABE and expects to find the return value DEAD. Deadbabe will reinfect already infected files. As a result your files can have dozens of infections and they will be several kilobytes larger after the reinfection(s). An Intersting Virus (1989) Article in connection to INT 6Bh called  "Saddam Virus" can be read here.

According to F-Secure its anti-virus products will disinfect DEADBABE, but because of a bug in the virus, the disinfected file(s) will sometimes be longer than the original. This extra area might also contain pieces of the virus, which could cause false alarms or Type I errors (F/P). If encountering problems like this, you should delete these files and reinstall, restore or (in case you do not need them anymore (except for OS-Files) simply delete them.

A Notable magic number from this Malware is: 0xDEADBABE ("Dead Babe") is used by IBM Jikes RVM as a sanity check of the stack of the primary thread.

Some other Variant of This Malware is: Deadbabe.494.B which Threat Level is kindly Low on the affected Platform MS-DOS. It carries out damaging actions on the affected computer. It does not spread automatically using its own means. This Variant 494.B was detected exactly on this day eleven years ago (13/11/2002).

Brief Description:

Deadbabe.494.B needs an attacking user's intervention in order to reach the affected System. The means of transmission used include, among others, floppy disks (Old days), CD-ROMs (DVDs), E-mail messages with attached files, Internet downloads, FTPs (File Transfer Protocol), IRC channels, peer-to-peer (P2P) file sharing networks and more. Deadbabe.494.B uses the following infection strategies:

- Once it has been run, the virus goes memory resident and stops functions belonging to the operating system (OS). Therefore, every time the operating system or an application tries to access any of these functions, the virus will activate and infect new files. The Malicious Code is written in the programming language Assembler x86-16 bit.

NOTE: If you think your PC is infected with this Virus visit Pandasecurity, take a download and follow the mentioned step by step instructions.

DEADBABE is also committed to HPS, a polymorphic Windows 95 virus which contains this sarcastic text:

"< Hantavirus Pulmonary Syndrome (HPS) Virus BioCoded by GriYo / 29A >"

Technical Details of HPS:

It stays active in memory and infects Win32 EXE files as they are accessed, encrypting its own code with variable polymorphic encryption layer.

HPS activates itself on Saturdays. If a non-compressed Windows bitmap (BMP) file has been opened, the virus horizontally flips the picture.


HPS patches the value DEADBABE (in hex) to the end of the bitmap header area to avoid flipping the same image again. Since non-compressed bitmap files are frequently used by Windows 95 and 98, this causes all kinds of weird effects - such as the start-up and power-down screen of Windows being "mirrorized" (See Image).

REFERENCEs

Responsible for the Technical Details of this Threat is Mikko Hypponen & Peter Szor, F-Secure, 1997

In Memory of Peter Szor
(by McAfee Labs)

11/11/2013

Happy Wheels with Grandpa Lemon!

THE Newest Famous Annoying Orange Video:



                                       
                                    Why does Orange has yellow Teeth ? ADBright...

Houston resident Edward Jorodge Gladney
jailed for 60 yrs for producing child porn

Back in March 2012 E.G., a Houston (Texas) Resident, entered a plea of guilty for producing and advertising child pornography, producing child pornography as far back as 2002 as well as advertising those images for sale via the Internet. The case was initiated following an anonymous tip to crime stoppers advising of an adult male being indecent with young boys. The investigation revealed he manipulated four (possibly more) boys for the purposes of capturing their images and then advertising those images for sale on the WorldWideWeb.


The exploitation continued for years and allowed Gladney to create thousands of images and hundreds of videos of young children which were disseminated via the Internet. The images and videos included graphic depictions of boys in provocative positions and boys and adults engaging in oral and anal sex.

Additionally, Gladney had collected thousands of images and videos containing children other than his personal victims, one of the which included a forcible sexual assault of a young boy in which the screams of the child can be heard.

The charges are the result of an investigation conducted by members of the Innocent Images Unit of the FBI, including task force officers from the Houston Police Department, which focuses its attention on investigating offenses involving the exploitation of children via the Internet.

This case, prosecuted by Assistant United States Attorney Sherri Zack, was brought as part of Project Safe Childhood, a nationwide initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation andabuse.

Pedophile Gladney
Investigators in the Houston Police Department Juvenile Division have arrested a male suspect for possession of child pornography and believe other children were victimized too.

The suspect, Edward G. has been charged with 5 counts of possession of child pornography in the 230th State District Court.  A photo of G. is attached to this news release because investigators believe there may be other victims who might be able to recognize the suspected Pedophile.

HPD Juvenile Division Senior Police Officer J. Barnes reported:

On June 16, a search warrant was executed on G’s home at 13927 Grafton Bridge Lane. During the course of the search, multiple pornographic photographs were found in the suspect’s residence. G. admitted the photographs had been taken in his car, a 2003 Tan with Texas license plates.

G. was arrested the following day (June 17).

Investigators believe that photos found in the suspect’s possession indicated there are other children he might have had contact with.

Anyone with information on other possible victims is urged to call the HPD Juvenile Division at 713-731-5335.

LATEST: Edward G. has been sentenced to serve a total of 720 months inprison following his convictions for producing and advertising childpornography